A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks

Mounib Khanafer, Youssef Gahi, Mouhcine Guennoun, Hussein T. Mouftah

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.

Original languageEnglish
Title of host publicationProceedings - 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016 and 2nd IEEE International Conference of Scalable and Smart Cloud, SSC 2016
EditorsLixin Tao, Meikang Qiu, Jianwei Niu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages95-101
Number of pages7
ISBN (Electronic)9781509009459
DOIs
StatePublished - 16 Aug 2016
Event3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016 and 2nd IEEE International Conference of Scalable and Smart Cloud, SSC 2016 - Beijing, China
Duration: 25 Jun 201627 Jun 2016

Publication series

NameProceedings - 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016 and 2nd IEEE International Conference of Scalable and Smart Cloud, SSC 2016

Conference

Conference3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016 and 2nd IEEE International Conference of Scalable and Smart Cloud, SSC 2016
Country/TerritoryChina
CityBeijing
Period25/06/1627/06/16

Keywords

  • Beacon-Enabled 802.15.4
  • Binary Exponent Backoff
  • Fairness
  • Intrusion Detection System
  • Medium Access Control
  • Node misbehavior
  • Power Consumption
  • Reliability
  • Security
  • Selfish Node
  • Throughput
  • Wireless Sensor Networks

Fingerprint

Dive into the research topics of 'A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this