Problems and Challenges in Wireless Network Intrusion Detection
Subscribe/Renew Journal
Wireless ad hoc sensor network becomes popular in civil and military jobs. But security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system.
In addition to reviewing the present attacks available in wireless sensor network this paper examine the hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this paper, intrusion detection system architecture clustering mechanism is to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. In this proposed Intrusion Detection System architecture, we propose a new approach of an Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks.
Keywords
- R. Bace. Intrusion Detection. MacMillan Technical Publishing, 2000.
- Zhou, L. and Haas, Z. J., “Securing ad hoc networks”, IEEE Network, Volume 13, Issue 6, Nov.-Dec. 1999, pp. 24 – 30. January, 2008.
- C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures”, In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (Anchorage, AK, May 11, 2003).
- National Institute of Standards and Technology, “Wireless ad hoc sensor networks”, web: http://w3.antd.nist.gov/wahn_ssn.shtml, retrieved 12th January, 2008.
- Rodrigo Roman, Jianying Zhou, Javier Lopez, “Applying Intrusion Detection Systems to wireless sensor networks “, Consumer Communications and Networking Conference, 2006. CCNC2006. 3rd IEEE, 8-10 Jan. 2006 Volume: 1, On page(s): 640- 644 ISBN: 1-4244-0085-6
- FZhang, Y. and Lee W “Intrusion detection in Wireless Ad hoc Networks”, The 6th annual international conference on Mobile computing and networking, Boston MA, Aug 2000. PP:275-283
- . P.Bruth and C. Ko, “Challenges in Intrusion detection for wireless ad hoc networks” in Application and the Internet Workshop =s, 2003 proceedings,2003 Symposium on, PP.368-373,2003.
- Article on “An Introduction to Intrusion Detection Systems” by Paul Innella and Oba McMillan, Tetrad Digital Integrity, LLC
- Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. pp. 387– 388. ISBN 9780471389224.
- R. Chadha, G. Lapiotis, S. Wright, “Policy-Based Networking”, IEEE Network special issue, March/April 2002, Vol. 16 No. 2, guest editors.
- LinnyerBeatrysRuiziJose Marcos Nogueira and Antonio A. F. Loureiro. MANNA: A Management Architecture for Wireless Sensor Networks IEEE Communications Magazine, 2003.2b:
- http://w3.antd.nist.gov/wahn_ssn.shtml, retrieved 1[68]. Zhou Ying, Xiao Debao, “Mobile agent based Policy management for wireless sensor network”, ISBN: 0-7803-9335-X/05, 2005 IEEE.
- W. Chen, N. Jain and S. Singh, “ANMP: Ad hoc Network Management protocol”, IEEE Journal on Selected Areas in Communications17 (8) (August 1999) 1506-1531.
- Piya Techateerawat, Andrew Jennings, “Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks”, Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2006 Workshops)(WI-IATW'06) 0- 7695-2749-3/06
- Bharat Bhargava, Weichao Wang. Visualization of Wormholes in Sensor Networks. New York, NY, USA: ACM Press, 2004.
Abstract Views: 376
PDF Views: 2