Abstract

Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

Highlights

  • Many anomaly and intrusion detection schemes (IDS) have been proposed for wireless sensor networks (WSNs) [1,2,3,4,5,6], but those schemes mainly focus on the detection of malicious or faulty nodes.All those anomaly and intrusion detection schemes (IDS) that are cooperative in nature [1, 2, 4] need to share anomalies or intrusion claims with the other node(s)

  • We propose a new intrusion-aware alert validation algorithm that provides a mechanism for verifying anomaly and intrusion claims sent by any unidentified malicious node(s)

  • We uniquely introduce an intrusion-aware reliability concept that helps to provide an adequate reliability at a modest communication cost

Read more

Summary

Introduction

Many anomaly and intrusion detection schemes (IDS) have been proposed for wireless sensor networks (WSNs) [1,2,3,4,5,6], but those schemes mainly focus on the detection of malicious or faulty nodes. We propose a new intrusion-aware alert validation algorithm that provides a mechanism for verifying anomaly and intrusion claims sent by any unidentified malicious node(s). This algorithm is simple and easy to implement. In the uncooperative distributed approach, nodes do not share information about anomalies and intrusion with each others

Related Work
Event N
Conclusion and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call