Universiti Teknologi Malaysia Institutional Repository

A survey of intrusion detection schemes in wireless sensor networks

Rassam, Murad A. and Maarof, Mohd. Aizaini and Zainal, Anazida (2012) A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9 (10). pp. 1636-1652. ISSN 1546-9239(Print); 1554-3641(Electronic)

Full text not available from this repository.

Official URL: http://thescipub.com/abstract/10.3844/ajassp.2012....

Abstract

Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important. Prevention-based security approaches like cryptography, authentication and key management have been used to protect WSNs from different kinds of attacks but these approaches are not enough to protect the network from insider attacks that may extract sensitive information even in the presence of the prevention-based solution. Detection-based approaches are then proposed to protect WSNs from insider attacks and act as a second line defense after the failure of the prevention-based approaches. Many intrusion detection schemes have been introduced for WSN in the literature. In this article, we present a survey of intrusion detection schemes in WSNs. First, we present the similar works and show their differences from this work. After that, we outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection in WSNs. Then, we demonstrate the challenges of developing an ideal intrusion detection scheme for WSNs followed by the main requirements of a good candidate intrusion detection scheme. The state-of-the-art intrusion detection schemes are then presented based on the techniques used in each scheme and categorizing them into four main categories: rule-based, data mining and computational intelligence based, game theoretical based and statistical based. The analysis of each scheme in these categories is presented showing their advantages and drawbacks. By the end of each category, we state the general advantages and shortcomings of each category. The survey ends by recommending some important research opportunities in this field for future research.

Item Type:Article
Uncontrolled Keywords:Intrusion Detection Systems (IDS), Mobile Ad-hoc Networks (MANET), Wireless Sensor Networks (WSNs)
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computer Science and Information System
ID Code:32849
Deposited By: Fazli Masari
Deposited On:16 Jul 2013 00:32
Last Modified:14 Oct 2018 07:23

Repository Staff Only: item control page