Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.
Published in | American Journal of Electrical and Computer Engineering (Volume 6, Issue 1) |
DOI | 10.11648/j.ajece.20220601.13 |
Page(s) | 24-29 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Intrusion Detection System (IDS), Wireless Sensor Networks (WSN), Cluster Head (CH), Base Station (BS)
[1] | Akyildiz, W., Sankarasubramaniam, Y., & Cayirci., E. (2002) A survey on sensor networks. In IEEE Communication Magazine, vol. 40 (8). doi: 10.1109/MCOM.2002.1024422. |
[2] | Khudadad, M., & Huang, Z. (2018). Novel intrusion detection methods for security of wireless sensor network. Journal of Fundamental and Applied Sciences, 10 (2S), 173-189. ISSN: 1112-9867. |
[3] | Mishra, A., & Srivastava, A. K. (2013). A Survey on Intrusion Detection System for Wireless Network. International Journal of Computer Applications, 73 (21), 37-40. doi: 10.5120/13021-0221. |
[4] | Maleh, Y., Ezzati, A., Qasmaoui, Y., & Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052. https://doi.org/10.1016/j.procs.2015.05.108. |
[5] | Yan, K. Q., Wang, S. C., Wang, S. S., & Liu, C. W. (2010, July). Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network. In 2010 3rd international conference on computer science and Information Technology, China, pp. 114-118. doi: 10.1109/ICCSIT.2010.5563886. |
[6] | MALEH, Y., & Ezzati, A. (2015). Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG International Journal of Computer Science, 42 (4). |
[7] | Sutaria, T., Mahgoub, I., Humos, A., & Badi, A. (2007, April). Implementation of an energy model for JiST/SWANS wireless network simulator. In Sixth International Conference on Networking (ICN'07) (pp. 24-24). IEEE. https://doi.org/10.1109/ICN.2007.47 |
[8] | Farooqi, A., & Khan, F., (2009). Intrusion Detection Systems for Wireless Sensor Networks: A Survey. Conference Paper in International Journal of Ad Hoc and Ubiquitous Computing. DOI: 10.1504/IJAHUC.2012.045549. |
[9] | Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16 (1), 266-282. doi: 10.1109/SURV.2013.050113.00191. |
[10] | Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9 (2), 69-83. |
[11] | Abduvaliyev, A., Lee, S., & Lee, Y. K. (2010, August). Energy efficient hybrid intrusion detection system for wireless sensor networks. In 2010 International Conference on Electronics and Information Engineering (Vol. 2, pp. V2-25). IEEE. doi: 10.1109/ICEIE.2010.5559708. |
[12] | Sedjelmaci, H., & Senouci, S. M. (2014, June). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636-3641). IEEE. doi: 10.1109/ICC.2014.6883886. |
[13] | Barr, R., Haas, Z., & Renesse, R. (2004, March). Scalable Wireless Ad Hoc Network Simulation. |
[14] | Barr, R. (2004, March). JiST–Java in Simulation Time “http://JiST.ece.cornell.edu/”. |
[15] | Singh, G., & Khare, N. (2021). A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. International Journal of Computers and Applications, 1-11. doi: 10.1080/1206212X.2021.1885150. |
[16] | Ozcelik, M. M., Irmak, E., & Ozdemir, S. (2017, May). A hybrid trust based intrusion detection system for wireless sensor networks. In 2017 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE. doi: 10.1109/ISNCC.2017.8071998. |
[17] | Abbood, Z. A., Atilla, D. Ç., Aydin, Ç., & Mahmoud, M. S. (2021, December). A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI), 2021, pp. 1-8, doi: 10.1109/MTICTI53925.2021.9664776. |
[18] | Elbahadır, H., & Erdem, E., (2021). Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks. In 2021 6th International Conference on Computer Science and Engineering (UBMK), 2021, pp. 401-406, doi: 10.1109/UBMK52708.2021.9558928. |
[19] | Amaran, S., & Mohan, R., (2021). Intrusion Detection System using Optimal Support Vector Machine for Wireless Sensor Networks. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1100-1104, doi: 10.1109/ICAIS50930.2021.9395919. |
APA Style
Fuad Abu Owaimer, Ayman Tanira, Mohammed Abu Hatab, Mohammad Mikki. (2022). An Efficient Intrusion Detection Approach for Wireless Sensor Networks. American Journal of Electrical and Computer Engineering, 6(1), 24-29. https://doi.org/10.11648/j.ajece.20220601.13
ACS Style
Fuad Abu Owaimer; Ayman Tanira; Mohammed Abu Hatab; Mohammad Mikki. An Efficient Intrusion Detection Approach for Wireless Sensor Networks. Am. J. Electr. Comput. Eng. 2022, 6(1), 24-29. doi: 10.11648/j.ajece.20220601.13
AMA Style
Fuad Abu Owaimer, Ayman Tanira, Mohammed Abu Hatab, Mohammad Mikki. An Efficient Intrusion Detection Approach for Wireless Sensor Networks. Am J Electr Comput Eng. 2022;6(1):24-29. doi: 10.11648/j.ajece.20220601.13
@article{10.11648/j.ajece.20220601.13, author = {Fuad Abu Owaimer and Ayman Tanira and Mohammed Abu Hatab and Mohammad Mikki}, title = {An Efficient Intrusion Detection Approach for Wireless Sensor Networks}, journal = {American Journal of Electrical and Computer Engineering}, volume = {6}, number = {1}, pages = {24-29}, doi = {10.11648/j.ajece.20220601.13}, url = {https://doi.org/10.11648/j.ajece.20220601.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20220601.13}, abstract = {Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.}, year = {2022} }
TY - JOUR T1 - An Efficient Intrusion Detection Approach for Wireless Sensor Networks AU - Fuad Abu Owaimer AU - Ayman Tanira AU - Mohammed Abu Hatab AU - Mohammad Mikki Y1 - 2022/05/10 PY - 2022 N1 - https://doi.org/10.11648/j.ajece.20220601.13 DO - 10.11648/j.ajece.20220601.13 T2 - American Journal of Electrical and Computer Engineering JF - American Journal of Electrical and Computer Engineering JO - American Journal of Electrical and Computer Engineering SP - 24 EP - 29 PB - Science Publishing Group SN - 2640-0502 UR - https://doi.org/10.11648/j.ajece.20220601.13 AB - Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN. VL - 6 IS - 1 ER -