Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2014, Article ID 240217, 8 pages
http://dx.doi.org/10.1155/2014/240217
Research Article

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

Received 18 March 2014; Accepted 17 June 2014; Published 30 June 2014

Academic Editor: Xia Zhang

Copyright © 2014 Wenchao Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Yi, Y. Wu, F. Zou, and N. Liu, “A survey on security in wireless mesh networks,” IETE Technical Review, vol. 27, no. 1, pp. 6–14, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. P. Yi, Y. Hou, Y. P. Zhong, and Z. L. Dai, “Flooding attack and defence in ad hoc networks,” Journal of Systems Engineering and Electronics, vol. 17, no. 2, pp. 410–416, 2006. View at Publisher · View at Google Scholar
  3. Y. Liao and V. R. Vemuri, “Use of k-nearest neighbor classifier for intrusion detection,” Computers & Security, vol. 21, no. 5, pp. 439–448, 2002. View at Publisher · View at Google Scholar · View at Scopus
  4. C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, La, USA, February 1999. View at Publisher · View at Google Scholar · View at Scopus
  5. D. B. Johnson, D. A. Maltz, and Y.-C. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), draft-ietf-manet-dsr-10.txt, 2004.
  6. S. Ahmad Salehi, M. A. Razzaque, P. Naraei, and A. Farrokhtala, “Security in wireless sensor networks: issues and challenges,” in Proceedings of the IEEE International Conference on Space Science and Communication (IconSpace '13), pp. 356–360, Melaka, Malaysia, 2013.
  7. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 41–47, Washington, DC, USA, November 2002. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Zhang and M. Tran, “A random perturbation-based scheme for pairwise key establishment in sensor networks,” in Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing, New York, NY, USA, 2007.
  9. N. Nasser and Y. Chen, “Secure multipath routing protocol for wireless sensor networks,” in Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW '07), Toronto, Canada, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Zhang and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” in Proceedings of the 4th Internationa1 Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), Dalian, China, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Sun, X. Jin, K. Wu, and Y. Xiao, “Integration of secure in-network aggregation and system monitoring for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 1466–1471, Politecnico di Milano, Glasgow, Scotland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. W. Zhang, Y. Liu, S. K. Das, and P. De, “Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach,” Pervasive and Mobile Computing, vol. 4, no. 5, pp. 658–680, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. D. J. Ferrer, “A provably secure additive and multiplicative privacy homomorphism,” in Proceedings of the 5th International Conference on Information Security, London, UK, 2002.
  14. C. G. Chang, W. E. Snyder, and C. Wang, “A new relaxation labeling architecture for secure localization in sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 3076–3081, Glasgow, Scotland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, “Towards a theory of robust localization against malicious beacon nodes,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), pp. 2065–2073, Phoenix, Ariz, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. H. E. Wenbo, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, “PDA: privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 2045–2053, Anchorage, Alaska, USA, May 2007. View at Publisher · View at Google Scholar
  17. W. Zhang, C. Wang, and T. Feng, “GP2S: generic privacy-preservation solutions for approximate aggregation of sensor data,” in Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '08), pp. 179–184, Hong Kong, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. W. Lee and S. J. Stolfo, “Data mining approaches for intrusion detection,” in Proceedings of the 7th USENIX Security Symposium, January 1998.
  19. M. Asaka, T. Onabuta, T. Inoue, S. Okazawa, and S. Goto, “A new intrusion detection method based on discriminant analysis,” IEICE Transactions on Information and Systems, no. 5, pp. 570–577, 2001. View at Google Scholar · View at Scopus
  20. N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data,” IEEE Transactions on Systems, Man and Cybernetics A: Systems and Humans, vol. 31, no. 4, pp. 266–274, 2001. View at Publisher · View at Google Scholar
  21. P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. H. Li, “A denial of service attack in advanced metering infrastructure network,” in Proceedings of the IEEE International Conference on Communications (ICC '14), Sydney , Australia, June 2014.
  22. P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “A new routing attack in mobile ad hoc,” International Journal of Information Technology, vol. 11, no. 2, pp. 83–94, 2005. View at Google Scholar
  23. P. Yi, F. Zou, Y. Zou, and Z. Wang, “Performance analysis of mobile ad hoc networks under flooding attacks,” Journal of Systems Engineering and Electronics, vol. 22, no. 2, pp. 334–339, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. P. Yi, Y. Zhou, Y. Wu, and N. Liu, “Effects of denial of service attack in mobile ad hoc networks,” Journal of Shanghai Jiaotong University (Science), vol. 14, no. 5, pp. 580–583, 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. P. Yi, J. Cai, Y. Wu, and Y. Li, “Impact of two kinds of DoS attacks on mobile ad hoc networks,” Journal of Computational Information Systems, vol. 5, no. 5, pp. 1433–1443, 2009. View at Google Scholar · View at Scopus
  26. P. Yi, T. Zhu, N. Liu, Y. Wu, and J. Li, “Cross-layer detection for black hole attack in wireless network,” Journal of Computational Information Systems, vol. 8, no. 10, pp. 4101–4109, 2012. View at Google Scholar · View at Scopus
  27. P. Yi, Y. Wu, N. Liu, and Z. Wang, “Intrusion detection for wireless mesh networks using finite state Machine,” China Communications, vol. 7, no. 5, pp. 40–48, 2010. View at Google Scholar · View at Scopus
  28. P. Yi, Y. Wu, and J. Chen, “Towards an artificial immune system for detecting anomalies in wireless mesh networks,” China Communications, vol. 8, no. 3, pp. 107–117, 2011. View at Google Scholar · View at Scopus
  29. P. Yi, X. Jiang, and Y. Wu, “Distributed intrusion detection for mobile ad hoc networks,” Journal of Systems Engineering and Electronics, vol. 19, no. 3, pp. 851–859, 2008. View at Publisher · View at Google Scholar
  30. P. Yi, T. Zhu, J. Ma, and Y. Wu, “An intrusion prevention mechanism in mobile ad hoc networks,” Ad-Hoc & Sensor Wireless Networks, vol. 17, no. 3-4, pp. 269–292, 2013. View at Google Scholar · View at Scopus
  31. P. Yi, X. Jiang, and J. Li, “Mobile firewall: a framework to isolate intruders in wireless mesh networks,” Journal of Computational Information Systems, vol. 3, no. 6, pp. 2207–2218, 2007. View at Google Scholar · View at Scopus
  32. P. Yi, F. Zou, X. Jiang, and J. Li, “Multi-agent cooperative intrusion response in mobile adhoc networks,” Journal of Systems Engineering and Electronics, vol. 18, no. 4, pp. 785–794, 2007. View at Publisher · View at Google Scholar · View at Scopus
  33. P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, “Green firewall: an energy-efficient intrusion prevention mechanism in wireless sensor network,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 3037–3042, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. S. Choi, K. Kwon, and S. Yoo, “An efficient cross-layer based flooding algorithm with retransmission node selection for wireless sensor networks,” in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia (AINA '08), pp. 941–948, Okinawa, Japan, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  35. V. Nigam, S. Jain, and K. Burse, “Profile based scheme against DDoS attack in WSN,” in Proceedings of the 4th International Conference on Communication Systems and Network Technologies (CSNT '14), pp. 112–116, Bhopal, India, 2014.
  36. R. Rughiniş and L. Gheorghe, “Storm control mechanism in wireless sensor networks,” in Proceedings of the 9th Roedunet International Conference (RoEduNet '10), pp. 430–435, Sibiu, Romania, June 2010. View at Scopus
  37. S. Magotra and K. Kumar, “Detection of HELLO flood attack on LEACH protocol,” in Proceedings of the IEEE International Advance Computing Conference (IACC '14), pp. 193–198, Gurgaon, India, 2014. View at Publisher · View at Google Scholar
  38. X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, “Defending DoS attacks on broadcast authentication in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 1653–1657, IEEE, Beijing, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  39. M. Wazid, A. Katal, and R. H. Goudar, “TBESP algorithm for wireless sensor network under blackhole attack,” in Procreedings of the 2nd International Conference on Communication and Signal Processing (ICCSP '13), pp. 1086–1091, Melmaruvathur, India, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  40. M. Wazid, A. Katal, R. Singh Sachan, R. H. Goudar, and D. P. Singh, “Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network,” in Proceedings of the 2nd International Conference on Communication and Signal Processing (ICCSP '13), pp. 576–581, Melmaruvathur, India, April 2013. View at Publisher · View at Google Scholar · View at Scopus