Comparison and detail study of attacks and detection methods for wireless sensor network

  • Authors

    • T Karthik Krishnan
    • S Sridevi
    • G Bindu
    • R Anandan
    2018-04-20
    https://doi.org/10.14419/ijet.v7i2.21.12453
  • WSN, security, malicious node, machine learning, black hole attack.
  • Wireless sensor network is emanating technology in the field of telecommunications. WSNs can be applied in many fields like machine surveillance, precision agriculture, home automation and intelligent building environments. However the major aspect of WSN is the security as the sensor nodes are limited because of these facing several security threats such as black hole attack, worm hole attack, flooding etc. which is finally affecting the functioning of the whole network. These attacks are maximizing the consumption of power in the node and also it decreases life of the battery. In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes in the WSN. And also we discuss about the different intrusion detection methods with the help of machine learning algorithms. In future these techniques can be helpful to create a safe and sophisticated network.

     

     

  • References

    1. [1] Kahina CHELLI, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasuresâ€, Proceedings of the World Congress on Engineering, Vol.1, (2015).

      [2] Sumathi K & Dr. Venkatesan M, “A Survey on Detecting Compromised Nodes in Wireless Sensor networksâ€, International Journal of Computer Science and Information Technologies, Vol.5, No.6, (2014), pp.7720-7722.

      [3] Qusay I.S, “Security Attacks and Countermeasures for Wireless Sensor Networks: Surveyâ€, International Journal of Current Engineering and Technology, (2013).

      [4] Benenson Z, Cholewinski M & Freiling C, “Vulnerabilities and Attacks in Wireless Sensor Networksâ€, Laboratory for Dependable Distributed Systems, University of Mannheim, (2010).

      [5] David M & Herve G, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Surveyâ€, 13th International Conference on Network-Based Information Systems (NBiS), (2010).

      [6] Anitha SS, Shazia S & Dr. Vagdevi S, “Security Threats in Wireless Sensor Networks in Each Layerâ€, International Journal of Advanced Networking and Applications, Vol.4 No.4, (2013), pp.1657-1661.

      [7] Kaplantzis S, Mani N, Palaniswanmi M & Egan G, “Security models for wireless sensor networksâ€, Conversion report, Monash University, Vol.20, (2006).

      [8] Chris K & David W, “Secure routing in wireless sensor networks: attacks and countermeasuresâ€, Ad Hoc Networks Journal, Vol.1, No.2-3, (2003), pp.293-315.

      [9] Yan S, Zhu H & Ray Liu KJ, “Defense of Trust Management Vulnerabilities in Distributed Networksâ€, IEEE Communications Magazine, Vol.46, No.2, (2008), pp.112-119.

      [10] Yanli Y, Keqiu L, Wanlei Z & Ping L, “Trust mechanisms in wireless sensor networks: attack analysis and countermeasuresâ€, Journal of Network and Computer Applications, Elsevier, (2011).

      [11] Xu W, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networksâ€, Mobi Hoc ’05: Proc. 6th ACM Int. Symp. Mobile Ad Hoc Net. and Comp., (2005), pp.46–57.

      [12] Xu W, Trappe W & Zhang Y, “Channel Surfing: Defending Wireless Sensor Networks from Interferenceâ€, Information Processing in Sensor Networks, (2007).

      [13] Shih E, Cho S, Ickes N, Min R, Sinha A, Wang A & Chandrakasan A, “Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networksâ€, Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (2013), pp.272-287.

      [14] Woo A & Culler D, “A Transmission Control Scheme for Media Access in Sensor Networksâ€, Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom, (2001).

      [15] Sohrabi K, Gao J, Ailawadhi V & Pottie GJ, “Protocols for Self-Organization of a Wireless Sensor Networkâ€, IEEE Personal Communications, (2000), pp.16-27.

      [16] David RR & Scott FM, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defensesâ€, IEEE Pervasive Computing, Vol.7, No.1, (2008), pp.74-81.

      [17] Parno B, Perrig A & Gligor V, “Distributed Detection of Node Replication Attacks in Sensor Networksâ€, IEEE Symposium on Security and Privacy (S&P’05), (2005).

      [18] Atakli IM, Hu H, Chen Y, Ku WS & Su Z, “Malicious node detection in wireless sensor networks using weighted trust evaluationâ€, Proceedings of the Spring simulation multi conference, Society for Computer Simulation, (2008), pp.836-843.

      [19] Arolkar HA, Sheth SP & Tamhane VP, “Ant colony based approach for intrusion detection on cluster heads in WSNâ€, Proceedings of the International Conference on Communication, Computing & Security (2011), pp.523-526.

      [20] Ezeife CI, Ejelike M & Aggarwal, AK, “WIDS: a sensor-based online mining wireless intrusion detection systemâ€, Proceedings of the international symposium on Database engineering & applications, (2008), pp.255-261.

      [21] Sa M & Rath AK, “A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networksâ€, Proceedings of the International Conference on Communication, Computing & Security, (2011), pp.67-70.

      [22] Bao F, Chen R, Chang M & Cho JH, “Trust-based intrusion detection in wireless sensor networksâ€, IEEE International Conference on Communications (ICC), (2011), pp.1-6.

      [23] Song X, Chen G & Li X, “A weak hidden Markov model based intrusion detection method for wireless sensor networksâ€, International Conference on Intelligent Computing and Integrated Systems (ICISS), (2010), pp.887-889.

      [24] Stetsko A, Folkman L & Matyas V, “Neighbor-based intrusion detection for wireless sensor networksâ€, IEEE 6th International Conference on Wireless and Mobile Communications (ICWMC), (2010), pp.420-425.

      [25] Estiri M & Khademzadeh A, “A theoretical signaling game model for intrusion detection in wireless sensor networksâ€, 14th International conference on Telecommunications Network Strategy and Planning Symposium (NETWORKS), (2010), pp.1-6.

      [26] Yan KQ, Wang SC, Wang SS & Liu CW, “Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor networkâ€, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Vol.1, (2010), pp.114-118.

      [27] Strikos AA, “A full approach for intrusion detection in wireless sensor networksâ€, School of Information and Communication Technology, (2007).

      [28] Mao Y, “A semantic-based intrusion detection framework for wireless sensor networkâ€, IEEE 6th International Conference on Networked Computing (INC), (2010), pp.1-5.

      [29] Misra S, Krishna PV & Abraham KI, “Energy efficient learning solution for intrusion detection in wireless sensor networksâ€, IEEE Second International Conference on Communication Systems and Networks (COMSNETS), (2010), pp.1-6.

      [30] Crosby GV, Hester L & Pissinou N, “Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networksâ€, IJ Network Security Vol.12, No.2, (2011), pp.107-117.

      [31] Chen RC, Hsieh CF & Huang YF, “An isolation intrusion detection system for hierarchical wireless sensor networksâ€, JNW, Vol.5, No.3, (2010), pp.335-342.

      [32] Yan KQ, Wang SC & Liu CW, “A hybrid intrusion detection system of cluster-based wireless sensor networks. In Proceedings of the International Multi Conference of Engineers and Computer Scientists, Vol.1, (2009), pp.18-20.

      [33] Idris MA, Hongbing H, Yu C, Wei SK & Zhou S, “Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluationâ€, The Symposium on Simulation of Systems Security (SSSS’08), (2008).

      [34] Huo G & Wang X, “DIDS: A dynamic model of intrusion detection system in wireless sensor networksâ€, IEEE International Conference on Information and Automation, (2008), pp.374-378.

      [35] Chen RC, Haung YF & Hsieh CF, “Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontologyâ€, New Aspects of Applied Informatics, Biomedical Electronics and Informatics and Communications, (2010).

  • Downloads

  • How to Cite

    Karthik Krishnan, T., Sridevi, S., Bindu, G., & Anandan, R. (2018). Comparison and detail study of attacks and detection methods for wireless sensor network. International Journal of Engineering & Technology, 7(2.21), 405-409. https://doi.org/10.14419/ijet.v7i2.21.12453