Académique Documents
Professionnel Documents
Culture Documents
Sno
1.
Literature Survey
Year
of
Pub.
2005
Title of Paper
An
Intrusion
Detection
System
for
Wireless
Sensor
Networks
By Ilker Onat
Ali Miri
2.
2007
Main Features
1. Introduced a detection based
security scheme for wireless
sensor networks.
2. Although sensor nodes have low
computation and communication
capabilities, they have specific properties
such as their stable neighborhood information
that allows for detection of anomalies in
networking
and
transceiver
behaviors of the neighboring
nodes.
3. Introduced a anomaly
based
intrusion
detection
method
(based on parameters Average
Receive Power and Average
Packet Arrival Rate) for wireless
sensor networks suited to their
simple and resource-limited nature
4. To make a sensor node capable of detecting
an intruder a simple dynamic statistical
model of the neighboring nodes is built in
conjunction with a low-complexity detection
algorithm by monitoring received packet
power levels and arrival rates.
1. Presented key features and rules-based
17
Research Gaps
1. To
determine
better
node
features addressing specific
vulnerabilities and to develop
improved detection algorithms
with sensor node capabilities
in mind.
2. Assumes that neighborhood is
stationary
and
does
not
consider
dynamic
neighborhood.
3. Considers Node Impersonation
and Resource Depletion attacks
only. Does not consider other
attacks.
3.
2007
4.
2007
Rule-based
Intrusion
Detection
for
Wireless
Sensor
Networks By
Haiguang Chen,
Huafeng Wu , Xi
Zhou , Chuanshan
Gao
Intrusion
detection
techniques
in
mobile Ad hoc and
wireless
sensor
networks By
Bo
sun
and
lawrence osborne
Design and
Implementation of
an Intrusion
Detection System
18
for
Wireless
Sensor Networks
By
Dmitriy
1. Developed
distributed
algorithms
for
detecting anomalous activity in information
flow patterns in large-scale sensor networks.
2. Used algorithms as building blocks of an
integrated system for intrusion detection,
attack isolation and fully automated
response for assuring WSN survivability and
information flow continuity.
3. Introduced the general guidelines for applying
IDS architectures in static sensor networks
(with no mobile nodes).
4. A novel technique for optimally monitoring
neighbors, called spontaneous watchdogs, is
introduced
5. The data correlation problem and
anomalies of intrusion detection has been
resolved. Algorithm proposes the correlation
mechanism aims at acquiring detection alerts
and relating them together to expose a more
condensed view of security issues.
1. Sensor nodes must be able to configure
themselves in the presence of adverse
situations. Therefore, the nodes should make
use of situation awareness mechanisms to
determine the existence of abnormal events in
their surroundings.
2. Considers a static WSN as a living body; an
Martynov
2008
Data Integrity
And Intrusion
Detection In
Wireless
Sensor Networks
By
Rathanakar
Acharya, Asha. K
6.
2008
Situation
Awareness
Mechanisms for
Wireless Sensor
Networks
By
Rodrigo Roman
19
2009
2009
Intrusion
Detection for
Wireless Sensor
Networks Based
on Multi-Agent
and
Refined Clustering
By
WANG Huai-bin
YUAN Zheng
WANG Chundong
1.
Sensor Network
Security: A Survey
By
1.
Xiangqian
Chen, Kia
2.
3.
2.
20
1. Application
of
distributed
intrusion
detection
system
(DIDS)
and
multi-agent
technology will be a trend in the
future.
2. To improve the algorithm of
detection in order to make the
detection
agent
more
efficiency.
1. Private
key
operations
in
asymmetric
cryptography
schemes are still too expensive
in terms of computation and
energy cost for sensor nodes, and
Makki, Kang
Yen, and Niki
Pissinou
3.
4.
5.
6.
7.
21
2009
Designing
Intrusion
Detection to
Detect Black hole
and Selective
Forwarding
Attack
22
in WSN based on
local Information
by Mukesh Tiwari
& others
10.
2009
11.
2009
12.
2010
State of the
Art on
Defenses
against
Wormhole
Attacks in
Wireless Sensor
Networks By
Thanassis
Giannetsos, Tassos
Dimitriou, Neeli
R. Prasad
Intrusion
Detection in
Sensor Networks
Based on
Measurements
By Leon Reznik
Software
Development for
Malicious Nodes
Discovery in
Wireless Sensor
Network
Security
23
13.
2010
By
Daniel-Ioan
Curiac, Madalin
Plastoi,
An Intrusion
Detection System
for Critical
Information
Infrastructures
Using Wireless
Sensor Network
Technologies
By
Luigi Coppolino,
Salvatore DAntonio
24