| Peer-Reviewed

An Efficient Intrusion Detection Approach for Wireless Sensor Networks

Received: 26 March 2022    Accepted: 16 April 2022    Published: 10 May 2022
Views:       Downloads:
Abstract

Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.

Published in American Journal of Electrical and Computer Engineering (Volume 6, Issue 1)
DOI 10.11648/j.ajece.20220601.13
Page(s) 24-29
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Intrusion Detection System (IDS), Wireless Sensor Networks (WSN), Cluster Head (CH), Base Station (BS)

References
[1] Akyildiz, W., Sankarasubramaniam, Y., & Cayirci., E. (2002) A survey on sensor networks. In IEEE Communication Magazine, vol. 40 (8). doi: 10.1109/MCOM.2002.1024422.
[2] Khudadad, M., & Huang, Z. (2018). Novel intrusion detection methods for security of wireless sensor network. Journal of Fundamental and Applied Sciences, 10 (2S), 173-189.‏ ISSN: 1112-9867.
[3] Mishra, A., & Srivastava, A. K. (2013). A Survey on Intrusion Detection System for Wireless Network. International Journal of Computer Applications, 73 (21), 37-40. doi: 10.5120/13021-0221.‏
[4] Maleh, Y., Ezzati, A., Qasmaoui, Y., & Mbida, M. (2015). A global hybrid intrusion detection system for wireless sensor networks. Procedia Computer Science, 52, 1047-1052. https://doi.org/10.1016/j.procs.2015.05.108.
[5] Yan, K. Q., Wang, S. C., Wang, S. S., & Liu, C. W. (2010, July). Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network. In 2010 3rd international conference on computer science and Information Technology, China, pp. 114-118. doi: 10.1109/ICCSIT.2010.5563886.
[6] MALEH, Y., & Ezzati, A. (2015). Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG International Journal of Computer Science, 42 (4).
[7] Sutaria, T., Mahgoub, I., Humos, A., & Badi, A. (2007, April). Implementation of an energy model for JiST/SWANS wireless network simulator. In Sixth International Conference on Networking (ICN'07) (pp. 24-24). IEEE.‏ https://doi.org/10.1109/ICN.2007.47
[8] Farooqi, A., & Khan, F., (2009). Intrusion Detection Systems for Wireless Sensor Networks: A Survey. Conference Paper in International Journal of Ad Hoc and Ubiquitous Computing. DOI: 10.1504/IJAHUC.2012.045549.
[9] Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16 (1), 266-282.‏ doi: 10.1109/SURV.2013.050113.00191.
[10] Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9 (2), 69-83.‏
[11] Abduvaliyev, A., Lee, S., & Lee, Y. K. (2010, August). Energy efficient hybrid intrusion detection system for wireless sensor networks. In 2010 International Conference on Electronics and Information Engineering (Vol. 2, pp. V2-25). IEEE.‏ doi: 10.1109/ICEIE.2010.5559708.
[12] Sedjelmaci, H., & Senouci, S. M. (2014, June). A lightweight hybrid security framework for wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 3636-3641). IEEE. doi: 10.1109/ICC.2014.6883886.
[13] Barr, R., Haas, Z., & Renesse, R. (2004, March). Scalable Wireless Ad Hoc Network Simulation.
[14] Barr, R. (2004, March). JiST–Java in Simulation Time “http://JiST.ece.cornell.edu/”.
[15] Singh, G., & Khare, N. (2021). A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. International Journal of Computers and Applications, 1-11. doi: 10.1080/1206212X.2021.1885150.
[16] Ozcelik, M. M., Irmak, E., & Ozdemir, S. (2017, May). A hybrid trust based intrusion detection system for wireless sensor networks. In 2017 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE.‏ doi: 10.1109/ISNCC.2017.8071998.
[17] Abbood, Z. A., Atilla, D. Ç., Aydin, Ç., & Mahmoud, M. S. (2021, December). A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI), 2021, pp. 1-8, doi: 10.1109/MTICTI53925.2021.9664776.
[18] Elbahadır, H., & Erdem, E., (2021). Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks. In 2021 6th International Conference on Computer Science and Engineering (UBMK), 2021, pp. 401-406, doi: 10.1109/UBMK52708.2021.9558928.
[19] Amaran, S., & Mohan, R., (2021). Intrusion Detection System using Optimal Support Vector Machine for Wireless Sensor Networks. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1100-1104, doi: 10.1109/ICAIS50930.2021.9395919.
Cite This Article
  • APA Style

    Fuad Abu Owaimer, Ayman Tanira, Mohammed Abu Hatab, Mohammad Mikki. (2022). An Efficient Intrusion Detection Approach for Wireless Sensor Networks. American Journal of Electrical and Computer Engineering, 6(1), 24-29. https://doi.org/10.11648/j.ajece.20220601.13

    Copy | Download

    ACS Style

    Fuad Abu Owaimer; Ayman Tanira; Mohammed Abu Hatab; Mohammad Mikki. An Efficient Intrusion Detection Approach for Wireless Sensor Networks. Am. J. Electr. Comput. Eng. 2022, 6(1), 24-29. doi: 10.11648/j.ajece.20220601.13

    Copy | Download

    AMA Style

    Fuad Abu Owaimer, Ayman Tanira, Mohammed Abu Hatab, Mohammad Mikki. An Efficient Intrusion Detection Approach for Wireless Sensor Networks. Am J Electr Comput Eng. 2022;6(1):24-29. doi: 10.11648/j.ajece.20220601.13

    Copy | Download

  • @article{10.11648/j.ajece.20220601.13,
      author = {Fuad Abu Owaimer and Ayman Tanira and Mohammed Abu Hatab and Mohammad Mikki},
      title = {An Efficient Intrusion Detection Approach for Wireless Sensor Networks},
      journal = {American Journal of Electrical and Computer Engineering},
      volume = {6},
      number = {1},
      pages = {24-29},
      doi = {10.11648/j.ajece.20220601.13},
      url = {https://doi.org/10.11648/j.ajece.20220601.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20220601.13},
      abstract = {Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - An Efficient Intrusion Detection Approach for Wireless Sensor Networks
    AU  - Fuad Abu Owaimer
    AU  - Ayman Tanira
    AU  - Mohammed Abu Hatab
    AU  - Mohammad Mikki
    Y1  - 2022/05/10
    PY  - 2022
    N1  - https://doi.org/10.11648/j.ajece.20220601.13
    DO  - 10.11648/j.ajece.20220601.13
    T2  - American Journal of Electrical and Computer Engineering
    JF  - American Journal of Electrical and Computer Engineering
    JO  - American Journal of Electrical and Computer Engineering
    SP  - 24
    EP  - 29
    PB  - Science Publishing Group
    SN  - 2640-0502
    UR  - https://doi.org/10.11648/j.ajece.20220601.13
    AB  - Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn’t suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.
    VL  - 6
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Computer Department, Palestine Technical College, Deir ElBalah, Palestine

  • Computer Department, Palestine Technical College, Deir ElBalah, Palestine

  • Engineering Department, Palestine Technical College, Deir ElBalah, Palestine

  • Computer Engineering Department, Islamic University, Gaza, Palestine

  • Sections