Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey of Intrusion Detection Systems in Wireless Sensor Networks

A. Gomathi, C. Gayathri, V. Suriya

Abstract


Wireless Sensor Networking is one of the most promising technologies that have applications ranging from health care to tactical military. Although Wireless Sensor Net-works (WSNs) have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), the security of such networks is a big concern, especially for the applications where confidentiality has prime importance. Therefore, in order to operate WSNs in a secure way, any kind of intrusions should be detected before attackers can harm the network (i.e., sensor nodes) and/or information destination (i.e., data sink or base station). In this article, a survey of the state-of-the- art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided. Secondly, a brief survey of IDSs proposed for Mobile Ad- Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented. This is followed by the analysis and comparison of each scheme along with their advantages and disadvantages. Finally, guidelines on IDSs that are potentially applicable to WSNs are provided. Our survey is concluded by highlighting open research issues in the field.


Full Text:

PDF

References


I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, vol. 40, num. 8, pp. 102-114, 2002.

Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: A survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 11, num. 2, pp. 52-73, 2009.

Y. Zhou, Y. Fang and Y. Zhang, “Securing wireless sensor networks: a survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 10, num. 3, pp. 6-28, 2008.

E. Cayirci and C. Rong, “Security in Wireless Ad Hoc and Sensor Networks”, book published by Wiley, 2009.

Y. Wang, G. Attebury and B. Ramamurthy, “A survey of security issues in wireless sensor networks”, IEEE Journal of Communications Surveys and Tutorials, vol. 8, num. 2, pp. 2– 23, 2006.

G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, Interna-tional Journal of Computer Science, vol. 4, num. 1, pp. 1–9, 2009.

Fuchsberger, “Intrusion detection systems and intrusion prevention systems”, Elsevier Journal of Information Security Technical Report, vol. 10, num. 3, pp. 134-139, 2005.

Butun and R. Sankar, “A Brief Survey of Access Control in Wireless Sensor Networks,” in Proc. of IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, January 2011.

M. Ngadi, A.H. Abdullah, and S. Mandala, “A survey on MANET intrusion detection”, International Journal of Computer Science and Security, volume 2, number 1, pages 1- 11, 2008.

Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks”, Journal of Wireless Networks, vol. 9, num. 5, pp. 545-556, 2003.

Butun, Y. Wang, Y. Lee and R. Sankar, “Intrusion prevention with two– level user authentication in heterogeneous wireless sensor networks”, International Journal of Security and Networks, vol. 7, no. 2, pp. 107– 121, 2012.

Patcha and J.M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends”, Elsevier Journal of Computer Networks, volume 51, number 12, pages 3448-3470, 2007.

T.S. Sobh, “Wired and wireless intrusion detection system: Classifi-cations, good characteristics and state-of-the-art”, Elsevier Journal of Computer Standards and Interfaces, volume 28, number 6, pages 670-694, 2006.

T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks”, Springer Journal of Wireless Network Security, pages 159-180, 2007.

P. Albers, O. Camp, J. Percher, B. Jouga, L. M, and R. Puttini, “Security in Ad Hoc Networks: A General Intrusion Detection Architecture En-hancing Trust Based Approaches,” Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.

P. Michiardi and R. Molva, “Core: A Collaborative Reputation mecha-nism to enforce node cooperation in Mobile Ad Hoc Networks,” Com-munication and Multimedia Security Conference (CMS’02), September 2002.

O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), p. 57.1, January 2003.

P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges”, Elsevier Journal of Computers and Security, vol. 28, num. 1-2, pp. 18-28, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.