A survey of intrusion detection schemes in wireless sensor networks

Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their res...

Full description

Saved in:
Bibliographic Details
Main Authors: Rassam, Murad A., Maarof, Mohd. Aizaini, Zainal, Anazida
Format: Article
Published: Science Publication 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/32849/
http://thescipub.com/abstract/10.3844/ajassp.2012.1636.1652
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.32849
record_format eprints
spelling my.utm.328492018-10-14T07:23:57Z http://eprints.utm.my/id/eprint/32849/ A survey of intrusion detection schemes in wireless sensor networks Rassam, Murad A. Maarof, Mohd. Aizaini Zainal, Anazida QA75 Electronic computers. Computer science Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important. Prevention-based security approaches like cryptography, authentication and key management have been used to protect WSNs from different kinds of attacks but these approaches are not enough to protect the network from insider attacks that may extract sensitive information even in the presence of the prevention-based solution. Detection-based approaches are then proposed to protect WSNs from insider attacks and act as a second line defense after the failure of the prevention-based approaches. Many intrusion detection schemes have been introduced for WSN in the literature. In this article, we present a survey of intrusion detection schemes in WSNs. First, we present the similar works and show their differences from this work. After that, we outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection in WSNs. Then, we demonstrate the challenges of developing an ideal intrusion detection scheme for WSNs followed by the main requirements of a good candidate intrusion detection scheme. The state-of-the-art intrusion detection schemes are then presented based on the techniques used in each scheme and categorizing them into four main categories: rule-based, data mining and computational intelligence based, game theoretical based and statistical based. The analysis of each scheme in these categories is presented showing their advantages and drawbacks. By the end of each category, we state the general advantages and shortcomings of each category. The survey ends by recommending some important research opportunities in this field for future research. Science Publication 2012 Article PeerReviewed Rassam, Murad A. and Maarof, Mohd. Aizaini and Zainal, Anazida (2012) A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9 (10). pp. 1636-1652. ISSN 1546-9239(Print); 1554-3641(Electronic) http://thescipub.com/abstract/10.3844/ajassp.2012.1636.1652 DOI:10.3844/ajassp.2012.1636.1652
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Rassam, Murad A.
Maarof, Mohd. Aizaini
Zainal, Anazida
A survey of intrusion detection schemes in wireless sensor networks
description Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important. Prevention-based security approaches like cryptography, authentication and key management have been used to protect WSNs from different kinds of attacks but these approaches are not enough to protect the network from insider attacks that may extract sensitive information even in the presence of the prevention-based solution. Detection-based approaches are then proposed to protect WSNs from insider attacks and act as a second line defense after the failure of the prevention-based approaches. Many intrusion detection schemes have been introduced for WSN in the literature. In this article, we present a survey of intrusion detection schemes in WSNs. First, we present the similar works and show their differences from this work. After that, we outline the fundamentals of intrusion detection in WSNs, describing the types of attacks and state the motivation for intrusion detection in WSNs. Then, we demonstrate the challenges of developing an ideal intrusion detection scheme for WSNs followed by the main requirements of a good candidate intrusion detection scheme. The state-of-the-art intrusion detection schemes are then presented based on the techniques used in each scheme and categorizing them into four main categories: rule-based, data mining and computational intelligence based, game theoretical based and statistical based. The analysis of each scheme in these categories is presented showing their advantages and drawbacks. By the end of each category, we state the general advantages and shortcomings of each category. The survey ends by recommending some important research opportunities in this field for future research.
format Article
author Rassam, Murad A.
Maarof, Mohd. Aizaini
Zainal, Anazida
author_facet Rassam, Murad A.
Maarof, Mohd. Aizaini
Zainal, Anazida
author_sort Rassam, Murad A.
title A survey of intrusion detection schemes in wireless sensor networks
title_short A survey of intrusion detection schemes in wireless sensor networks
title_full A survey of intrusion detection schemes in wireless sensor networks
title_fullStr A survey of intrusion detection schemes in wireless sensor networks
title_full_unstemmed A survey of intrusion detection schemes in wireless sensor networks
title_sort survey of intrusion detection schemes in wireless sensor networks
publisher Science Publication
publishDate 2012
url http://eprints.utm.my/id/eprint/32849/
http://thescipub.com/abstract/10.3844/ajassp.2012.1636.1652
_version_ 1643649158744113152