[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1764677.1764684guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

SAID: a self-adaptive intrusion detection system in wireless sensor networks

Published: 28 August 2006 Publication History

Abstract

Intrusion Detection System (IDS) is usually regarded as the second secure defense of network. However, traditional IDS cannot be suitable to deploy in Wireless Sensor Networks (WSN) because of the nature of WSN (e.g. self-origination, resource-constraint, etc). In this paper, we propose a kind of three-logic-layer architecture of Intrusion Detection System (IDS)-SAID by employing the agent technology and thought of immune mechanism. It has two work modes: 1) active work mode to improve the effectiveness and intelligence for unknown attacks; 2) passive work mode to detect and defend known attacks. The basic functions of these three layers, intrusion response, evolution approach of agent and knowledge base are also presented in this paper. Furthermore, we take advantages of local intrusion detection system and distributive & cooperative intrusion detection system to have a tradeoff among the security of WSN and communication overhead. We also design three kinds of light-weight agents: monitor agents, decision agents and defense agents in order to reduce communication overhead, computation complexity and memory cost. The analysis and experiment result illustrate that SAID has nice properties to defend attacks, and suitable to deploy in WSN.

References

[1]
Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International. Workshop on Sensor Network Protocols and Applications, Anchorage, AK,. May 11, 2003.
[2]
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, IPSN'04, April 26-27, 2004.
[3]
Y-C Hu, A. Perrig, D.B. Johnso, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Proc of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2003), San Francisco, April, 2003: 1976-1986.
[4]
Tansu Alpcan and Tamer Basar, A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detecion, Proceeding of the 42nd IEEE conference on Decision and Control, December, 2003.
[5]
Afrand Agah Dajal K. Das and Kalyan Basu, A game theory based approach for security in wireless sensor networks, IPCCC 2004 IEEE, 2004.
[6]
Ambareen Siraj Rayford B. Vaughn Susan M. Bridges, Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture, Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9, 2004.
[7]
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch, Gary B. Lamont, An artificial immune system architecture for computer security applications. IEEE Trans. Evolutionary Computation 6(3): 252-280, 2002.
[8]
Christopher Kruegel, Thomas Toth, Applying Mobile Agent Technology to Intrusion Detection Proceedings of the ICSE Workshop on Software Engineering and Mobility. Canada, May 2001.
[9]
Patrick Albers, Olivier Camp. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, First International Workshop on Wireless Information System, 4th International Conference on Enterprise Information System 2002.
[10]
O. Kachirski and R. Guha, Elective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03), p. 57.1, January 2003.
[11]
Soumya Banerjee, Crina Grosan, Ajith Abraham and P.K. Mahanti, Intrusion Detection on Sensor Networks Using Emotional Ants, International Journal of Applied Science and Computations, USA, Vol.12, No.3, pp.152-173, 2005.
[12]
Y. Zhang, W. Lee, and Y. Huang, Intrusion Detection Techniques for Mobile Wireless Networks, ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
[13]
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, A General Cooperative Intrusion Detection Architecture for MANETs, Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, March 2005.
[14]
Tiranuch Anantvalee, Jie Wu, A Survey on Intrusion Detection in Mobile Ad Hoc, Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Wireless/Mobile Network Security, Springer, pp. 170 -196, 2006.
[15]
Chien-Chung Su, Ko-Ming Chang, Mong-Fong Horng, Yau-Hwang Kuo, The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks, 2005 IEEE Wireless Communications and Networking Conference (WCNC05), Mar. 2005, New Orleans, USA.

Cited By

View all
  • (2016)A System for Response and Prevention of Security Incidents in Wireless Sensor NetworksACM Transactions on Sensor Networks10.1145/299619513:1(1-38)Online publication date: 19-Dec-2016
  • (2014)KinesisProceedings of the 12th ACM Conference on Embedded Network Sensor Systems10.1145/2668332.2668351(148-162)Online publication date: 3-Nov-2014
  • (2013)Detecting intrusive activities from insiders in a wireless sensor network using game theoryProceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments10.1145/2504335.2504350(1-8)Online publication date: 29-May-2013
  • Show More Cited By
  1. SAID: a self-adaptive intrusion detection system in wireless sensor networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      WISA'06: Proceedings of the 7th international conference on Information security applications: PartI
      August 2006
      406 pages
      ISBN:9783540710929
      • Editors:
      • Jae-Kwang Lee,
      • Okyeon Yi,
      • Moti Yung

      Sponsors

      • KIISC: Korea Institute of Information Security and Cryptology
      • MIC: Ministry of Information and Communication
      • ETRI: Electronics and Telecommunications Research Institute

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 28 August 2006

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)A System for Response and Prevention of Security Incidents in Wireless Sensor NetworksACM Transactions on Sensor Networks10.1145/299619513:1(1-38)Online publication date: 19-Dec-2016
      • (2014)KinesisProceedings of the 12th ACM Conference on Embedded Network Sensor Systems10.1145/2668332.2668351(148-162)Online publication date: 3-Nov-2014
      • (2013)Detecting intrusive activities from insiders in a wireless sensor network using game theoryProceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments10.1145/2504335.2504350(1-8)Online publication date: 29-May-2013
      • (2013)Survey An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence techniqueEngineering Applications of Artificial Intelligence10.1016/j.engappai.2013.04.01026:9(2105-2127)Online publication date: 1-Oct-2013
      • (2013)A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor NetworksRevised Selected Papers of 7th IFIP TC 6 International Workshop on Self-Organizing Systems - Volume 822110.1007/978-3-642-54140-7_15(157-162)Online publication date: 9-May-2013
      • (2011)BIOSARPProceedings of the 11th WSEAS international conference on Applied computer science10.5555/2051254.2051284(158-165)Online publication date: 3-Oct-2011
      • (2011)An intelligent information security mechanism for the network layer of WSNProceedings of the 4th international conference on Computational intelligence in security for information systems10.5555/2023430.2023447(118-126)Online publication date: 8-Jun-2011

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media