Neighbor-based Intrusion Detection for Wireless Sensor Networks
File version
Author(s)
Folkman, Lukas
Matyas, Vashek
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Lloret Mauri, Jaime
Loo, Jonathan
Noll, Josef
Penttinen, Jyrki
Date
Size
181124 bytes
File type(s)
application/pdf
Location
Valencia, Spain
License
Abstract
The neighbor-based detection technique explores the principle that sensor nodes situated spatially close to each other tend to have a similar behavior. A node is considered malicious if its behavior significantly differs from its neighbors. This detection technique is localized, unsupervised and adapts to changing network dynamics. Although the technique is promising, it has not been deeply researched in the context of wireless sensor networks yet. In this paper, we present symptoms which can be used in the neighbor-based technique for detection of selective forwarding, jamming and hello flood attacks. We implemented an intrusion detection system which employs the neighbor-based detection technique. The system was designed for and works on the TinyOS operating system running the Collection Tree Protocol. We evaluated accuracy of the technique in the detection of selective forwarding, jamming and hello flood attacks. The results show that the neighbor-based detection technique is highly accurate, especially in the case when collaboration among neighboring nodes is used.
Journal Title
Conference Title
The Sixth International Conference on Wireless and Mobile Communications ICWMC 2010 Proceedings
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Item Access Status
Note
Access the data
Related item(s)
Subject
Other information and computing sciences not elsewhere classified