CFP last date
20 May 2024
Reseach Article

Autonomic System to protect Wireless Sensor Networksfrom External Attacks

by Hosam Soleman, Ali Payandeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 16
Year of Publication: 2013
Authors: Hosam Soleman, Ali Payandeh
10.5120/11011-6346

Hosam Soleman, Ali Payandeh . Autonomic System to protect Wireless Sensor Networksfrom External Attacks. International Journal of Computer Applications. 65, 16 ( March 2013), 39-45. DOI=10.5120/11011-6346

@article{ 10.5120/11011-6346,
author = { Hosam Soleman, Ali Payandeh },
title = { Autonomic System to protect Wireless Sensor Networksfrom External Attacks },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 16 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number16/11011-6346/ },
doi = { 10.5120/11011-6346 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:19:02.755218+05:30
%A Hosam Soleman
%A Ali Payandeh
%T Autonomic System to protect Wireless Sensor Networksfrom External Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 16
%P 39-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increased deployment of ubiquitous wireless sensor (WSN) networks has exponentially increased the complexity to detect wireless sensor network attacks and protect against them. In this paper, we investigated the vulnerabilities in wireless sensor networks, developed a comprehensive taxonomy of wireless sensor network attacks that has been used to guide our approach to develop, and successfully implement autonomic system capable of detecting and protecting wireless sensor networks from a wide range of attacks. Proposed system depends on analyzing packet flow information to detect the attacks. Where by analyzing information of packet flow, the autonomic system can be determines the behavior of the network if normal or abnormal.

References
  1. Zhenwei Yu, Jeffrey J. P. Tsai,A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing,2008.
  2. Dorothy E. Denning,An intrusion detection model. IEEEransactions on Software Engineering. 1987: 222-232.
  3. Youcai Zhou, Tinglei Huang, A Statistic Anomaly Intrusion Detection Method For WSN, Microcomputer information ,2009(in chinese).
  4. Libin Yang, Dejun Mu, XiaoyanCai, An Anomaly Detection Scheme for Wireless Sensor Networks Based on Kernel Clustering, Chinese Journal of Sensors and ActuatorsC2008. 8(in chinese) .
  5. Wang Huaibin,YuanZhang. Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering[C]. Communications and Mobile ComputingC2009:450-454
  6. Qi Zhu Rushun Song, YongxianYao,SVM-based cooperation intrusion detection system for WSN,Application Research of Computers,2010. 4(in chinese).
  7. Yang Liu,YuFengqi,Immunity-based intrusion detection for wireless sensor networks,IEEE World Congress on Computational IntelligenceC2008.
  8. SarjounS. Doumit, Dharma P. Agrawal, Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks, MILCoM :IEEE Military Communications Conference. 2003.
  9. Demirkol, I. , Alagoz, F. , Delic, H. , and Ersoy, C. (2006). Wireless sensor networks for intrusion detection: Packet traffic modeling. IEEE Communications Letters, 10(1):22--24. ],
  10. Cui, S. , Madan, R. , Goldsmith, A. J. , and Lall, S. (2005). Joint routing, mac, and link layer optimization in sensor networks with energy constraints. In Proc. of IEEE International Conference on Communications (ICC'05), pages 725--729.
  11. Ma, Y. and Aylor, J. H. (2004). System lifetime optimization for heterogeneous sensor networks with a hub-spoke topology. IEEE Transactions on Mobile Computing, 3(3):286--294.
  12. Tang, S. (2006). An analytical traffic flow model for cluster-based wireless sensor networks. In Proc. of 1st International Symposium on Wireless Pervasive Computing.
  13. Paxson, V. and Floyd, S. (1995). Wide-area traffic: The failure of poisson modeling. IEEE/ACM Transactions on Networking, 3:226--244.
  14. Wang, Q. and Zhang, T. (2008). Source traffic modeling in wireless sensor networks for target tracking. In Proc. of the 5th ACM International Symposium on Performance Evaluation of Wireless Ad-Hoc, Sensor, and Ubiquitous Networks (PE-WASUN'08), pages 96--100.
  15. Wang, P. and Akyildiz, I. F. (2009). Spatial correlation and mobility aware traffic modeling for wireless sensor networks. In Proc. of IEEE Global Communications Conference (Globecom'09).
  16. W. Lee, S. J. Stolfo K. Mok, "A data mining framework for building intrusion detection models", In Proc. IEEE Symposium on Security and Privacy, 1999.
  17. SJ Stolfo, W Lee, PK Chan, W Fan, E Eskin "Data mining-based intrusion detectors: an overview of the columbia IDS project" ACM SIGMOD Record, 2001 -portal. acm. org.
  18. Lippmann et al. "Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation", In Proceedings of the on DARPA Information Survivability Conference and Exposition (DISCEX'00).
  19. J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.
  20. K. Fall and K. Varadhan, "The ns manual", User's manual, UC Berkeley, LBL, USC/ISI, and Xerox PARC, January 2009.
Index Terms

Computer Science
Information Sciences

Keywords

wireless sensor network packet flow cluster topology autonomic