Neighbor-based Intrusion Detection for Wireless Sensor Networks

Loading...
Thumbnail Image
File version
Author(s)
Stetsko, Andriy
Folkman, Lukas
Matyas, Vashek
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Lloret Mauri, Jaime

Loo, Jonathan

Noll, Josef

Penttinen, Jyrki

Date
2010
Size

181124 bytes

File type(s)

application/pdf

Location

Valencia, Spain

License
Abstract

The neighbor-based detection technique explores the principle that sensor nodes situated spatially close to each other tend to have a similar behavior. A node is considered malicious if its behavior significantly differs from its neighbors. This detection technique is localized, unsupervised and adapts to changing network dynamics. Although the technique is promising, it has not been deeply researched in the context of wireless sensor networks yet. In this paper, we present symptoms which can be used in the neighbor-based technique for detection of selective forwarding, jamming and hello flood attacks. We implemented an intrusion detection system which employs the neighbor-based detection technique. The system was designed for and works on the TinyOS operating system running the Collection Tree Protocol. We evaluated accuracy of the technique in the detection of selective forwarding, jamming and hello flood attacks. The results show that the neighbor-based detection technique is highly accurate, especially in the case when collaboration among neighboring nodes is used.

Journal Title
Conference Title

The Sixth International Conference on Wireless and Mobile Communications ICWMC 2010 Proceedings

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Item Access Status
Note
Access the data
Related item(s)
Subject

Other information and computing sciences not elsewhere classified

Persistent link to this record
Citation