DOI QR코드

DOI QR Code

A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks

무선 센서네트워크에서 침입탐지를 위한 탐지노드 활성화기법 연구

  • Seong, Ki-Taek (Department of Information Security, TongMyong University)
  • 성기택 (동명대학교 정보보호학과)
  • Received : 2011.09.05
  • Accepted : 2011.11.10
  • Published : 2011.11.30

Abstract

Recently, wireless sensor networks have become increasingly interesting areas over extensive application fields such as military, ecological, and health-related areas. Almost sensor networks have mission-critical tasks that requires very high security. Therefore, extensive work has been done for securing sensor networks from outside attackers, efficient cryptographic systems, secure key management and authorization, but little work has yet been done to protect these networks from inside threats. This paper proposed an method to select which nodes should activate their idle nodes as detectors to be able to watch all packets in the sensor network. Suggested method is modeled as optimization equation, and heuristic Greedy algorithm based simulation results are presented to verify my approach.

최근 무선센서네트워크 분야는 군사, 생체, 건강관련 광범위한 응용분야에서 많은 주목을 받아 왔다. 대부분의 센서네트워크가 높은 보안성을 요구하는 임무의 기능을 수행한다. 외부로부터의 공격에 대한 네트워크 보안, 효율적인 암호화 시스템, 보안 키 관리 및 인증 부분에서 많은 연구가 이루어져 왔지만, 내부 위협으로부터 네트워크를 보호에 관한 연구는 미비하다. 본 논문에서는 센서네트워크에서의 모든 패킷을 관찰하는 탐지노드를 활성화하는 노드 선택방법을 제안하였다. 제안된 방법은 최적화식으로 모델링되었으며, 접근방법의 검정을 위하여 경험적 Greedy 알고리즘 기반의 시뮬레이션 결과를 나타내었다.

Keywords

References

  1. Yi Zou, "COVERAGE-DRIVEN SENSOR DEPLOYMENT AND ENERGY-EFFICIENT INFORMATION PROCESSING IN WIRELESS SENSOR NETWORKS", PhD Thesis, Duke University, 2004.
  2. Edith C.H. Ngai, "Intrusion Detection for wireless Sensor Networks", The Chinese University of Hong Kong Department of Computer Science and Engineering Ph.D. Term 2 paper, pp. 29-37, 2005.
  3. Yang Xiao, "Security in Distributed, GRID, and Pervasive Computing", Chapter 17(Wireless Sensor Network Security: A Servey), CRC Press, 2006.
  4. E. Shi, A. Peerig, "Designing Secure Sensor Networks, "Wireless Communications Magazine, vol. 11, no. 6, 2004.
  5. Y. Wang; G. Attebury; B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, 2006
  6. I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316-3326, 2002.
  7. R. Roman; J. Zhou; J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks," in Proc. CCNC'06, 2006.
  8. F. Anjum; D. Subhadrabandhu; S. Sarkar; R. Shetty, "On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks," BROADNETS'04, 2004.
  9. A. Agah; S. Das; K. Basu, "Intrusion Detection in Sensor Networks: A non-cooperative Game Approach," IEEE ISNCA, 2004.
  10. C. Loo; M. Ng; C. Leckie; M. Palaniswami, "Intrusion Detection for Routing Attacks in Sensor Networks," Int'l. Journal of Distr. Sensor Networks, vol. 2,, 2006.
  11. C. Su; K. Chang; Y. Kuo; M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE WCNC, 2005.
  12. R. Roman; J. Zhou; J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks," in Proc. CCNC'06, 2006.
  13. MICA2 Radio Stack for TinyOS. http://www.tinyos.net/tinyos-1.x/doc/mica2rad, 2007.
  14. A. Abduvaliyev, et al., " Energy Efficient Hybrid Intrusion Detection System for Wireless Sensor Networks", 2010 Intl. Conference on Electronics and Information Engineering, Vol. 2 25-29, 2010.