Académique Documents
Professionnel Documents
Culture Documents
Dr. Huirong Fu
Outline
Overview of Wireless Sensor Network
(WSN)
Project Objective:
how to detect attacks on WSN?
Project Tasks:
Intrusion detection system
More Information
UnCoRe 2007
WSN Overview
Applications of WSNs
Components of a Sensor
WSN Communication Models
Attacks on WSN
UnCoRe 2007 3
Overview: Applications of WSNs
Military
Disaster Detection and Relief
Industry
Agriculture
Environmental Monitoring
Intelligent Buildings
Health/Medical
Law Enforcement
Transportation
Space Exploration
UnCoRe 2007 4
Overview: Components of a Sensor
Sensing Unit
Processing Unit
Storage Unit
Power Unit
Wireless
Transmitter/Receiver
UnCoRe 2007 5
Overview: Communication Models
Hierarchical WSN
Sensor Nodes
Cluster Nodes
Base Stations
Distributed WSN
UnCoRe 2007 6
Overview: Attacks on WSN (1/3)
UnCoRe 2007
Overview: Attacks on WSN (2/3)
UnCoRe 2007
Overview: Attacks on WSN (3/3)
UnCoRe 2007
Project Objective
How to detect attacks on WSN?
Intrusion Detection System (IDS): Design,
implementation and evaluation
UnCoRe 2007
Project Tasks
Literature survey on IDS for WSN
What have been proposed?
Have they been implemented and evaluated?
What are the Pros and Cons of each?
UnCoRe 2007
Project Tasks
Make decision
Shall we extend some of the works, or
Design a novel IDS?
UnCoRe 2007
Our IDS System Design
Uses anomaly detection pattern
Establishes a baseline of normal traffic
between wireless sensor nodes over a
specified time interval
Compares current traffic against this
baseline traffic over the same specified
time interval
Makes a determination as to whether or
not a DoS attack is occurring
UnCoRe 2007
Our IDS System Design
Communication Activity diagram for
between wireless Wireless Sensor Node
sensor nodes communication
UnCoRe 2007
Our IDS System Design contd
Emulation of a DoS Activity design for
attack Emulation of a DoS
attack
UnCoRe 2007
References
1Denial of Service in Sensor Networks
2Wireless Sensor Networks for Intrusion
Detection: Packet Traffic Modeling
3INSENS: Intrusion-Tolerant Routing in
Wireless Sensor Networks
4Effective Intrusion Detection Using
Multiple Sensors in Wireless Ad Hoc
Networks
UnCoRe 2007
References
MoteIv
http://www.moteiv.com/community/Moteiv_Co
mmunity
TMote Tutorial
http://cents.cs.berkeley.edu/tinywiki/index.php/
Tmote_Windows_install
TinyOS
http://www.tinyos.net/tinyos-
1.x/doc/tutorial/index.html
UnCoRe 2007