A Hybrid Detection Approach of Hello Flood Attack in Wireless Sensor Networks

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 888

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

COMCONF01_437

تاریخ نمایه سازی: 8 آذر 1394

چکیده مقاله:

Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and various attacks like black hole, sink hole, selective forwarding and Hello Flood etc. Hello Flood attack is a type of network layer attack in wireless sensor networks. In this attack, the malicious node is able to disturb the security of network by sending periodic hello packets with high signal strength. In this work, a hybrid intrusion detection system is proposed to detect Hello Flood attack. It has two phases. The first phase is neighbor-based anomaly detection and the second phase is based upon the discovery of missing and malfunction of nodes due to Hello Flood attack. For optimizing, the adaptive method based on Alpha-Beta filtering is used in phase 1. The algorithm is implemented in TOSSIM- the sensor network simulator in TinyOS systems. The simulating results show that the combination of two techniques can achieve high detection rate and low false positive. The proposed method also detects collusion attack of malicious nodes.

نویسندگان

Hasti Khosravi

Faculty of Engineering and Technology, Alzahra University, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Peng, Wei, and Xi-Cheng Lu. "On the reduction of broadcast ...
  • _ _ _ _ _ _ _ knowledge", in Network ...
  • J. N, Al-Karaki, and A. E. Kamal, "Routing techniques in ...
  • Huh, Eui-Nam, and Tran Hong Hai. Lightweight _ Detection for ...
  • A. Hamid, M. Mamun -Or-Rashid, and C. S. Hong, "Defense ...
  • _ _ _ and its countermeasure _ International ...
  • W. R. Pires, T. H. de Paula Figueiredo, H. C. ...
  • A. Stetsko, L. Folkman, and V. Matyas, "Neighbor -based intrusion ...
  • A. Durresi, V. K. Paruchuri, S. S. Iyengar, and R. ...
  • B. Williams, and T. Camp, "Comparison of broadcasting techniques for ...
  • R. Penoyer, "The alpha-beta filter", C User's Jourmal, vol. 11, ...
  • P. Levis, N. Lee, M. Welsh, and D. Culler. "TOSSIM: ...
  • C. G. Li, A Framework for Signal Strength Based Intrusion ...
  • Yin, Jie, Qiang Yang, and Jeffrey Junfeng Pan. "Sensor-based abnormal ...
  • نمایش کامل مراجع