Abstract

The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

Highlights

  • The term “Ubiquitous Sensor Networks” (USN) is used to describe networks of smart sensor nodes capable of communicating wirelessly, and possessing limited computing power and storage capacity.USN can be used in a wide range of civilian and military fields, including environment and habitat monitoring, real-time healthcare, landmine detection, intelligent transport systems and so on [1].many of the current USN implementations use a proprietary suite of protocols which are tailored for the environment under observation

  • In this paper we propose a design of an IDS for IP-based Ubiquitous Sensor Network (IP-USN) environment called RIDES

  • It is unwise to equip sensor nodes with the resource hungry detection schemes because signature-based intrusion detection system demands sufficient storage to store the signatures, and high processing power to match the incoming packets with stored signatures

Read more

Summary

Introduction

The term “Ubiquitous Sensor Networks” (USN) is used to describe networks of smart sensor nodes capable of communicating wirelessly, and possessing limited computing power and storage capacity. We preferred hybrid architecture due to the fact that there is a class of attacks which requires only a small number of packets to subvert the victim, such as Ping of Death [8], Land [8] and so on In such cases, anomaly-based IDS fails drastically with high false negatives or Type-II errors. It is unwise to equip sensor nodes with the resource hungry detection schemes because signature-based intrusion detection system demands sufficient storage to store the signatures, and high processing power to match the incoming packets with stored signatures To overcome this problem, we propose a novel coding scheme so that signature based IDS can be implemented on resource constrained sensor nodes.

IP-USN and Related Technologies
Signature Based Intrusion Detection
Bloom Filter
Anomaly Based Intrusion Detection
RIDES Architecture
Signature-code
Working of SCG
CUSUM Control Charts
Detection Thresholds
Intrusion Detection and Overall Framework
Location of Intrusion Detection Components
Performance Evaluation of SCG
Performance Evaluation of NAD
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.