evaluation of an intrusion detection system for routing attacks in wireless self-organised networks
نویسندگان
چکیده
wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus simulated an ids that usesanomaly-based technique to monitor traffic pattern on thenetwork following a fixed-width clustering algorithm. oursimulation is based on the sensor network simulationpackage by the naval research laboratory (nrl). toevaluate the ids, we simulated a sensor network,investigated it with the presence of phenomenon, andextended it to generate denial of service attacks. we haveused the phenomenon contribution to generate a realistictraffic pattern for accurate evaluation of protocols, andcompared it to the traditional method of using only cbrtraffic, which is usually been employed by mostresearchers. we further adapted the ids into this simulatednetwork, and our results show that the selected ids hasdetection rate of over 90% with a very low false positiverate of less than 1%. we obtained this by configuring everynode to independently monitor detect and report intrusions.
منابع مشابه
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملIntrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behaviour, and then uses...
متن کاملAn Efficient Intrusion Detection System for Networks with Centralized Routing
As Internet becomes more and more ubiquitous, security is an increasingly important topic. Furthermore, private networks are expanding and security threats from within the network have to be cautioned. For these large networks, which are generally high-speed and with several segments, Intrusion Detection System (IDS) placement usually comes down to a compromise between investment and monitoring...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
international journal of communications and information technologyناشر: university of sistan and baluchestan
ISSN 2322-4606
دوره 1
شماره 1 2011
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023