Abstract
Wireless sensor network is of prime importance because of its applicability in various domains ranging from healthcare applications to military applications. Security of such networks is important as these carry confidential information. Security of Wireless Sensor Network is divided in three phases, prevention, detection and mitigation. In Prevention phase, care is taken so that attack should not occur. But most of the times it is not possible to prevent attacks, so it is very important to detect them as early as possible so that these will not harm a lot to wireless sensor network and that phase is called as intrusion detection. Once Intrusion has been detected we have to take actions to cure from it and it is called as mitigation. So, Intrusion detection is most important phase as far as security of wireless sensor network is concerned. This paper discusses about various detection methodologies such as Anomaly based, Misuse based and Specification based IDS, various decision making schemes for intrusion. Major focus of this paper is to understand various Intrusion Detection Systems that are proposed for wireless sensor network. These are discussed with different issues with advantages and disadvantages. Finally paper gives future directions for selection of Intrusion Detection System.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 10(3), 6–28 (2008)
Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, New York (2009)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. (IJCS) 4(1), 1–9 (2009)
Butun, I., Sankar, R.: A brief survey of access control in wireless sensor networks. In: Proceedings of IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada (2011)
Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. J. Comput. Secur. 28(1–2), 18–28 (2009). Elsevier
Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. J. Comput. Netw. 51(12), 3448–3470 (2007). Elsevier
Sobh, T.S.: Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art. J. Comput. Stand. Interfaces 6, 670–694 (2006). Elsevier
da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet 2005), pp. 16–23. ACM Press (2005)
Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 159–180. Springer, New York (2007)
Sun, B., Osborne, L., Xiao, Y., Guizani, S.: Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Trans. Wirel. Commun. 14(5), 63 (2007)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). doi:10.1007/978-0-387-35612-9_9
Crossbow MICAz mote data sheet. http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf
Chen, R.C., Hsieh, C.F., Huang, Y.F.: A new method for intrusion detection on hierarchical wireless sensor networks. In: Proceedings of ACM ICUIMC-09 (2009)
Su, C.C., Chang, K.M., Kuo, Y.H., Horng, M.F.: The new intrusion prevention and detection approaches for clustering-based sensor networks. In: Proceedings of IEEE Wireless communications and Networking Conference (2005)
Strikos, A.A.: A full approach for intrusion detection in wireless sensor networks. School of Information and Communication Technology (2007)
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F.C., Dimitriou, T.: Cooperative intrusion detection in wireless sensor networks. In: Roedig, U., Sreenan, Cormac, J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00224-3_17
Ngai, E., Liu, J., Lyu, M.: On the intruder detection for sinkhole attack in wireless sensor networks. In: ICC 2006, Istanbul, Turkey (2006)
Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: 3rd IEEE International Symposium on Network Computing and Applications, pp. 343–346 (2004)
Agah, A., Das, S.K., Basu, K. Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: Proceedings of 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 343–346 (2004)
Agah, A., Das, S.K.: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. Int. J. Netw. Secur. 5(2), 145–153 (2007)
Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Trans. Wirel. Commun. 15(4), 34–40 (2008)
Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. J. High Speed Netw. 15(1), 33–51 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhakne, A.R., Chatur, P.N. (2016). A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_65
Download citation
DOI: https://doi.org/10.1007/978-981-10-3433-6_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3432-9
Online ISBN: 978-981-10-3433-6
eBook Packages: Computer ScienceComputer Science (R0)