Skip to main content

A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network

  • Conference paper
  • First Online:
Smart Trends in Information Technology and Computer Communications (SmartCom 2016)

Abstract

Wireless sensor network is of prime importance because of its applicability in various domains ranging from healthcare applications to military applications. Security of such networks is important as these carry confidential information. Security of Wireless Sensor Network is divided in three phases, prevention, detection and mitigation. In Prevention phase, care is taken so that attack should not occur. But most of the times it is not possible to prevent attacks, so it is very important to detect them as early as possible so that these will not harm a lot to wireless sensor network and that phase is called as intrusion detection. Once Intrusion has been detected we have to take actions to cure from it and it is called as mitigation. So, Intrusion detection is most important phase as far as security of wireless sensor network is concerned. This paper discusses about various detection methodologies such as Anomaly based, Misuse based and Specification based IDS, various decision making schemes for intrusion. Major focus of this paper is to understand various Intrusion Detection Systems that are proposed for wireless sensor network. These are discussed with different issues with advantages and disadvantages. Finally paper gives future directions for selection of Intrusion Detection System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 10(3), 6–28 (2008)

    Article  Google Scholar 

  3. Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, New York (2009)

    Book  Google Scholar 

  4. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)

    Article  Google Scholar 

  5. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. (IJCS) 4(1), 1–9 (2009)

    Google Scholar 

  6. Butun, I., Sankar, R.: A brief survey of access control in wireless sensor networks. In: Proceedings of IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada (2011)

    Google Scholar 

  7. Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. J. Comput. Secur. 28(1–2), 18–28 (2009). Elsevier

    Article  Google Scholar 

  8. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. J. Comput. Netw. 51(12), 3448–3470 (2007). Elsevier

    Article  Google Scholar 

  9. Sobh, T.S.: Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art. J. Comput. Stand. Interfaces 6, 670–694 (2006). Elsevier

    Article  Google Scholar 

  10. da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet 2005), pp. 16–23. ACM Press (2005)

    Google Scholar 

  11. Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 159–180. Springer, New York (2007)

    Chapter  Google Scholar 

  12. Sun, B., Osborne, L., Xiao, Y., Guizani, S.: Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Trans. Wirel. Commun. 14(5), 63 (2007)

    Google Scholar 

  13. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). doi:10.1007/978-0-387-35612-9_9

    Chapter  Google Scholar 

  14. Crossbow MICAz mote data sheet. http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf

  15. Chen, R.C., Hsieh, C.F., Huang, Y.F.: A new method for intrusion detection on hierarchical wireless sensor networks. In: Proceedings of ACM ICUIMC-09 (2009)

    Google Scholar 

  16. Su, C.C., Chang, K.M., Kuo, Y.H., Horng, M.F.: The new intrusion prevention and detection approaches for clustering-based sensor networks. In: Proceedings of IEEE Wireless communications and Networking Conference (2005)

    Google Scholar 

  17. Strikos, A.A.: A full approach for intrusion detection in wireless sensor networks. School of Information and Communication Technology (2007)

    Google Scholar 

  18. Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F.C., Dimitriou, T.: Cooperative intrusion detection in wireless sensor networks. In: Roedig, U., Sreenan, Cormac, J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00224-3_17

    Chapter  Google Scholar 

  19. Ngai, E., Liu, J., Lyu, M.: On the intruder detection for sinkhole attack in wireless sensor networks. In: ICC 2006, Istanbul, Turkey (2006)

    Google Scholar 

  20. Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: 3rd IEEE International Symposium on Network Computing and Applications, pp. 343–346 (2004)

    Google Scholar 

  21. Agah, A., Das, S.K., Basu, K. Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: Proceedings of 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 343–346 (2004)

    Google Scholar 

  22. Agah, A., Das, S.K.: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. Int. J. Netw. Secur. 5(2), 145–153 (2007)

    Google Scholar 

  23. Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Trans. Wirel. Commun. 15(4), 34–40 (2008)

    Article  Google Scholar 

  24. Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. J. High Speed Netw. 15(1), 33–51 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amol R. Dhakne .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Dhakne, A.R., Chatur, P.N. (2016). A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_65

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3433-6_65

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3432-9

  • Online ISBN: 978-981-10-3433-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics