Abstract

The intrusion prediction for wireless sensor networks (WSNs) is an unresolved problem. Hence, the current intrusion detection schemes cannot provide enough security for WSNs, which poses a number of security challenges in WSNs. In many mission-critical applications, such as battle field, even though the intrusion detection systems (IDSs) without prediction capability could detect the malicious activities afterwards, the damages to the WSNs have been generated and could hardly be restored. In addition, sensor nodes usually are resource constrained, which limits the direct adoption of expensive intrusion prediction algorithm. To address the above challenges, we propose an intelligent intrusion prediction scheme that is able to enforce accurate intrusion prediction. The proposed scheme exploits a novel three-layer brain-like hierarchical learning framework, tailors, and adapts it for WSNs with both performance and security requirements. The implementation system of the proposed scheme is designed based on agent technology. Moreover, an attack experiment is done for getting training and test data set. Experiment results show that the proposed scheme has several advantages in terms of efficiency of implementation and high prediction rate. To our best knowledge, this paper is the first to realize intrusion prediction for WSNs.

Highlights

  • Wireless sensor networks (WSNs) have become a technology for the new millennium with endless applications ranging from civilian to military [1,2,3]

  • By exploring a threelayer brain-like hierarchical learning model, we proposed a novel intelligent intrusion prediction scheme, namely, BLID, which is specially tailored for WSNs

  • We proposed a brain-like hierarchical learning based intelligent intrusion prediction scheme, called BLID, in which the sensor, sink, and base station perform different kinds of learning algorithms and interoperate optimally with each other

Read more

Summary

Introduction

Wireless sensor networks (WSNs) have become a technology for the new millennium with endless applications ranging from civilian to military [1,2,3]. As a matter of fact, WSNs are often deployed in potentially adverse or even hostile environments where adversaries can launch various kinds of attacks [3,4,5]. The nodes of WSNs are vulnerable to these attackers, because unmanned sensors are often deployed through open medium and dynamic network topology. The problem of intrusion detection in WSNs has received considerable attention [4,5,6,7,8,9,10,11,12,13,14,15]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.