2013
DOI: 10.3390/s130403998
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

Abstract: Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 24 publications
(43 reference statements)
0
8
0
Order By: Relevance
“…In [19], Farooqi et al proposed a novel intrusion detection mechanism including online prevention and offline detection for securing WSNs from routing attacks. To obtain efficient performance under limited computation resources of sensor nodes, Kim et al [20] developed a Wu-Manber algorithmbased network intrusion detection system. By integrating system monitoring modules and intrusion detection modules in WSNs, Sun et al [21] proposed an extended Kalman filterbased mechanism to detect false injected data.…”
Section: Related Workmentioning
confidence: 99%
“…In [19], Farooqi et al proposed a novel intrusion detection mechanism including online prevention and offline detection for securing WSNs from routing attacks. To obtain efficient performance under limited computation resources of sensor nodes, Kim et al [20] developed a Wu-Manber algorithmbased network intrusion detection system. By integrating system monitoring modules and intrusion detection modules in WSNs, Sun et al [21] proposed an extended Kalman filterbased mechanism to detect false injected data.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the pattern-matching engine is one of the most important features in network security applications designed to search for malicious patterns. However, it is difficult to operate a conventional pattern-matching engine on smart objects, because most of them are resource constrained in terms of power, processing and memory space [ 10 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…The sensor node considered in this paper are capable to store and execute the program's instructions which were defined before their deployment in the sensing Figure 3: Detailed exchange between a pair of nodes. area and because in our scenario we do not consider the intruders that are discussed in [11], when two nodes are linked, they first have to find their shared secret key prior to exchange of their data based on the symmetric public key cryptography principle as in the fully homomorphic encryption approach proposed by Craig Gentry [15]; we say that when communicating, they are playing a game in which their cooperation is as a pure altruism [9]. The overall exchange is assimilated to a client/server relationship as shown in Figure 3, where to establish a secure direct link, two players exchange first their public key, which upon reception of the other part is used to operate an encryption function based on the encryption scheme on their data to obtain a ciphertex mutually (e.g., the pk received is used to encrypts its message ( ), thus generating a given ciphertext ( )), while the correctness is preserved.…”
Section: A Pairwise Key Security Gamementioning
confidence: 99%
“…However there are additional tasks due to security requirements [4] and the high demand on scarce energy resource. In a WSN, data needs a secured solution, preventing malicious attacks as they are transmitted in packet formats on a wireless medium which is subject to security breaches [11] (e.g., eavesdropping and jamming) and needs especially a less computational approach, aiming at saving the scarce energy resource efficiently for the overall system lifetime. When referring to sensors' resources constraints, energy and security are considered as the most crucial issues.…”
Section: The Problem Statementmentioning
confidence: 99%