Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

S. Khan, Jaime Lloret, Jonathan Loo
2014 International Journal of Distributed Sensor Networks  
Wireless sensor networks are multihop, self-organizing, selfhealing, and distributed in nature. One of their main features is their energy consumptions, so many efforts are focused on power saving techniques. Wireless sensor networks are gaining significant interest from academia and industry and the number of real deployments of wireless sensor networks (WSN) is increasing considerably in the last years. Their intrinsic characteristics make them very vulnerable to external intrusion. Thus, the
more » ... security has become one of the main issues to study in WSNs. Their ad hoc network nature also increases their vulnerability and exposes sensor nodes to various kinds of security attacks. There is a clear need for new security techniques to guarantee the information transmitted through the WSN. Last research tendencies are focused on including security in the routing protocol, providing security for communication inside groups of nodes and when exchanging data between groups. One of the most efficient techniques to detect an intruder in the network is the use of traffic analysis for detecting anomalies and finding correlated events. Advanced security mechanisms and intrusion detection systems (IDSs) can play an important role in detecting and preventing security attacks in WSNs. In this special issue, we have collected recent advances in intrusion detection and security mechanisms for WSNs. The papers have been peer reviewed and have been selected on the basis of their quality and relevance to the topic of this special issue. There are many WSN applications; however, such networks are highly vulnerable to different security attacks such as altering, misusing, or misdirecting the data in transit. Keep these issues in mind. M. Usama and F. T. B. Muhaya present the paper "Framework for secure wireless communication in wireless sensor networks. " The framework consists of few modules such as redundancy checker, message prioritization mechanism, malicious node verification, and malicious data verification. It is evaluated and validated using NS2 simulator. The experimental results show that the proposed secure framework can be used for malicious data or node detection. There are many techniques which are used to design IDSs for WSNs. Artificial intelligence techniques are widely used for this purpose. In the paper "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, " a critical study on genetic algorithm, artificial immune, and artificial neural network (ANN) based IDSs techniques used in wireless sensor network (WSN) is presented. ANN concepts are helpful in many areas such as pattern recognition and intrusion detection. ANN based intrusion detection can be helpful to eliminate the shortcomings of rule based IDSs. However, ANN based IDSs can be more effective if properly trained with both normal and abnormal data sets. In the paper titled "Lightweight and scalable intrusion trace classification using interelement dependency models suitable for wireless sensor network environment, " a lightweight and scalable method for classification of network and detection of system intrusion attempts is presented. The authors claim better intrusion detection accuracy of the proposed system. The mechanism involves many actions such as
doi:10.1155/2014/747483 fatcat:vjdr7bpajzbjbmrea2zkirgbty