Security mechanism is a fundamental requirement of
wireless networks in general and Wireless Sensor Networks (WSN) in particular. The
Intrusion Detection System (IDS) has become a critical component of wireless
sensor networks security strategy. There are several architectures for embedding
IDS in WSN. Due to Energy Limitation, in this paper we use a distributed
architecture which activates intrusion detection system for limited number of
nodes. For this purpose we select a secure set of nodes called secure Connected
Dominating Set (CDS). In this paper first, we propose a heuristic for selecting
CDS based on weighing factor which uses the trust value. Trust is based on reputation
and reputation refers to the opinion of one node about another node. Hence only
well behaving and good quality nodes are selected as a dominant node for CDS
construction. Then we activate IDS on these selected node set. In our proposed
work the task of all dominating nodes is to discover any attack and threat that
can affect the normal behavior of sensor nodes by analyzing actual status of a
node, packet sent and received by node and measurement made to the environment.
The simulation results show that our TC-IDS model have high packet delivery
ratio, high throughput and low delay than existing IDS Schemes such as Lightweight
IDS.
Cite this paper
Mohajer, A. , Hajimobini, M. H. , Mirzaei, A. and Noori, E. (2014). Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS). Open Access Library Journal, 1, e848. doi: http://dx.doi.org/10.4236/oalib.1100848.
Pathan, A.-S.K., Lee, H.-W. and Hong, C.S. (2006) Security in Wireless Sensor Networks: Issues and
Challenges. Proceedings of 8th IEEE ICACT 2006, Volume II, Seon Hong, 20-22 February 2006, 1043-1048.
Bhatnagar, R.
and Shankar, U. (2012) The Proposal of Hybrid Intrusion Detection for Defence
of Sync Flood Attack in Wireless Sensor Network. International Journal of Computer Science & Engineering Survey, 3, 31-38. http://dx.doi.org/10.5121/ijcses.2012.3204
Wu, J.
and Li, H. (1999) On Calculating Connected Dominating Set for Efficient Routing in Ad-hoc Wireless Networks. Proceedings
of the 3rdInternationalWorkshop on Discrete Algorithms
and Methods for Mobile Computing and Communication (DIAL’M), Seattle, August 1999, 7-14.
Haggar, B. (2009) Self-Stabilizing Clustering Algorithm for Ad-hoc Networks. Proceedings of the 5th InternationalConference on Wireless and Mobile
Communications, ICWMC 2009,
French Riviera, August 2009, 24-29.
Ali, K., Sara, M., Belbachir, R., Maaza, Z.M.
and Senouci, S.M.
(2012) Self-Organization Framework for Mobile Ad-hoc Networks. Proceedings of 8th International conference on Wireless Communications and
Mobile Computing, August 2012, 14-22.
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. and Dimitriou, T. (2009) Cooperative
Intrusion Detection in Wireless Sensor Networks. Wireless Sensor Networks, 5, 263-278. http://dx.doi.org/10.1007/978-3-642-00224-3_17
Stetsko, A.,
Folkman, L. and Matyas, V.
(2010) Neighbor-Based Intrusion Detection
for Wireless Sensor Networks. Proceedings of International Conference on Wireless and Mobile Communications, Los
Alamitos, 420-425.
Krontiris, I., Dimitriou, T. and Freiling, F.C.
(2007) Towards Intrusion Detection in Wireless Sensor Networks. Proceedings of the 13th European Wireless Conference, Paris, April 2007, 166-173.
Krontiris, I.,
Dimitriou, T.,
Giannetsos, T. and Mpasoukos, M. (2008) Intrusion Detection of Sinkhole Attacks
in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks, Springer,
Sophia Antipolis, 150-161.
Gerrigagoitia, K.,
Uribeetxeberria, R., Zurutuza, U. and Arenaza, I. (2012) Reputation-Based Intrusion Detection System
for Wireless Sensor Networks. Complexity
in Engineering (COMPENG), Aachen, 11-13 June 2012, 1-5.
Krontiris, I., Giantsos, T. and Dimitriou, T. (2008) LIDeA: A
Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks,
ACM, Istanbul,
22-25
September 2008, 1-10.
Buchegger, S. and Boudec, J.Y.L. (2003) A Robust Reputation System for Mobile Ad-hoc Networks. Proceedings of P2PEcon, EPFL IC Technical Report IC/2003/50.
Bidgoly, A.J. and Ladani, B.T. (2013) Quantitative
Verification of Beta Reputation System Using PRISM Probabilistic Model Checker. Proceedings
of 10th International
ISC Conference on Information Security and Cryptology (ISCISC), Yazd, 29-30 August 2013, 1-6.
Roman, R., Zhou, J.Y. and Lopez, J.
(2006) Applying Intrusion Detection Systems to Wireless Sensor Networks. 3rd IEEE Consumer Communications and Networking
Conference, CCNC 2006, 1, 640-644.
Patwardhan, A.,
Parker, J., Joshi, A., Iorga, M. and Karygiannis, T. (2005) Secure Routing and Intrusion Detection
in Ad Hoc Networks. 3rd
IEEE International Conference on Pervasive Computing and Communications, PerCom 2005,
Kauai Island, 8-12
March 2005, 191-199.
Hai, T.H., Huh, E.N. and Jo, M. (2009) A Lightweight Intrusion Detection Framework
for Wireless Sensor Networks. Wireless
Communications and Mobile Computing, 10, 559-572.