Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 4731953, 16 pages
http://dx.doi.org/10.1155/2016/4731953
Research Article

WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

1Computer Science Department, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia
2Computer Science Department/Computer Information Systems Department, King Abdullah II School for Information Technology (KASIT), The University of Jordan, Amman, Jordan
3Computer Science Department, College of Computation and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia

Received 25 March 2016; Accepted 28 August 2016

Academic Editor: Hana Vaisocherova

Copyright © 2016 Iman Almomani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Marriwala and P. Rathee, “An approach to increase the wireless sensor network lifetime,” in Proceedings of the World Congress on Information and Communication Technologies (WICT '12), pp. 495–499, IEEE, Trivandrum, India, October-November 2012.
  2. V. C. Gungor, B. Lu, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid,” IEEE Transactions on Industrial Electronics, vol. 57, no. 10, pp. 3557–3564, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. M. A. Rassam, M. A. Maarof, and A. Zainal, “A survey of intrusion detection schemes in wireless sensor networks,” American Journal of Applied Sciences, vol. 9, no. 10, pp. 1636–1652, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. H. Modares, R. Salleh, and A. Moravejosharieh, “Overview of security issues in wireless sensor networks,” in Proceedings of the 2nd International Conference on Computational Intelligence, Modelling and Simulation (CIMSim '11), pp. 308–311, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Sen, “Security in wireless sensor networks,” in Wireless Sensor Networks: Current Status and Future Trends, S. Khan, A.-S. K. Pathan, and N. A. Alrajeh, Eds., CRC Press, New York, NY, USA, 2012. View at Google Scholar
  7. N. Farooq, I. Zahoor, S. Mandal, and T. Gulzar, “Systematic analysis of DoS attacks in wireless sensor networks with wormhole injection,” International Journal of Information and Computation Technology, vol. 4, no. 2, pp. 173–182, 2014. View at Google Scholar
  8. A. Mitrokotsa and T. Karygiannis, “Intrusion detection techniques in sensor networks,” in Wireless Sensor Network Security, Cryptology and Information Security Series, pp. 251–272, IOS Press, 2008. View at Google Scholar
  9. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd IEEE Annual Hawaii International Conference on System Sciences, pp. 1–10, Maui, Hawaii, USA, January 2000. View at Publisher · View at Google Scholar
  10. H. Liu, L. Li, and S. Jin, “Cluster number variability problem in LEACH,” in Ubiquitous Intelligence and Computing, pp. 429–437, Springer, Berlin, Germany, 2006. View at Google Scholar
  11. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. S. B. Alla, A. Ezzati, and A. Mohsen, “Hierarchical adaptive balanced routing protocol for energy efficiency in heterogeneous wireless sensor networks,” in Energy Efficiency—The Innovative Ways for Smart Energy, the Future Towards Modern Utilities, InTech, 2012. View at Google Scholar
  13. S. Tyagi and N. Kumar, “A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 623–645, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Braman and G. R. Umapathi, “A comparative study on advances in LEACH Routing protocol for wireless sensor networks: a survey,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 2, pp. 5883–5890, 2014. View at Google Scholar
  15. H. Dhawan and S. Waraich, “A comparative study on LEACH routing protocol and its variants in wireless sensor networks: a survey,” International Journal of Computer Applications, vol. 95, no. 8, pp. 21–27, 2014. View at Publisher · View at Google Scholar
  16. D. Kumar, “Performance analysis of energy efficient clustering protocols for maximizing lifetime of wireless sensor networks,” IET Wireless Sensor Systems, vol. 4, no. 1, pp. 9–16, 2014. View at Publisher · View at Google Scholar
  17. Y. M. Miao, “Cluster-head election algorithm for wireless sensor networks based on LEACH protocol,” Applied Mechanics and Materials, vol. 738-739, pp. 19–22, 2015. View at Publisher · View at Google Scholar
  18. S. Taneja, “An energy efficient approach using load distribution through LEACH-TLCH protocol,” Journal of Network Communications and Emerging Technologies (JNCET), vol. 5, no. 3, pp. 20–23, 2015. View at Google Scholar
  19. S. Peng, T. Wang, and C. P. Low, “Energy neutral clustering for energy harvesting wireless sensors networks,” Ad Hoc Networks, vol. 28, pp. 1–16, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. G. Padmavathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” International Journal of Computer Science and Information Security, vol. 4, no. 1-2, 2009. View at Google Scholar
  21. D. Mansouri, L. Mokdad, J. Ben-Othman, and M. Ioualalen, “Detecting DoS attacks in WSN based on clustering technique,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '13), pp. 2214–2219, IEEE, Shanghai, China, April 2013.
  22. A. Garofalo, C. Di Sarno, and V. Formicola, “Enhancing intrusion detection in wireless sensor networks through decision trees,” in Dependable Computing, pp. 1–15, Springer, Berlin, Germany, 2013. View at Google Scholar
  23. S.-S. Wang, K.-Q. Yan, S.-C. Wang, and C.-W. Liu, “An integrated intrusion detection system for cluster-based wireless sensor networks,” Expert Systems with Applications, vol. 38, no. 12, pp. 15234–15243, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. D. Wu, G. Hu, and G. Ni, “Research and improve on secure routing protocols in wireless sensor networks,” in Proceedings of the 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC '08), pp. 853–856, IEEE, Shanghai, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. G. Wang, J. Hao, J. Mab, and L. Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering,” Expert Systems with Applications, vol. 37, no. 9, pp. 6225–6232, 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Xie, S. Han, B. Tian, and S. Parvin, “Anomaly detection in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302–1325, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. R. Bace and P. Mell, NIST Special Publication on Intrusion Detection Systems, Booz-Allen and Hamilton, McLean, Va, USA, 2001.
  28. J. Xu, J. Wang, S. Xie, W. Chen, and J.-U. Kim, “Study on intrusion detection policy for wireless sensor networks,” International Journal of Security and Its Applications, vol. 7, no. 1, pp. 1–6, 2013. View at Google Scholar · View at Scopus
  29. S. Khan and K.-K. Loo, “Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks,” Network Security, vol. 2009, no. 5, pp. 9–16, 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 9, no. 5, pp. 1–7, 2013. View at Google Scholar
  31. A. Abid, A. Kachouri, and A. Mahfoudhi, “Anomaly detection in WSN: critical study with new vision,” in Proceedings of the International Conference on Automation, Control, Engineering and Computer Science (ACECS '14), pp. 37–46, 2014.
  32. H. Jadidoleslamy, “A high-level architecture for intrusion detection on heterogeneous wireless sensor networks: hierarchical, scalable and dynamic reconfigurable,” Wireless Sensor Network, vol. 3, no. 7, pp. 241–261, 2011. View at Publisher · View at Google Scholar
  33. KDD, https://kdd.ics.uci.edu.
  34. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection,” Results from the JAM Project by Salvatore, 2000.
  35. A. Ananthakumar, T. Ganediwal, and A. Kunte, “Intrusion detection system in wireless sensor networks: a review,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 12, pp. 131–139, 2015. View at Google Scholar
  36. A. Alsadhan and N. Khan, “A proposed optimized and efficient intrusion detection system for wireless sensor network,” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 7, no. 12, pp. 1621–1624, 2013. View at Google Scholar
  37. Y. El Mourabit, A. Bouirden, A. Toumanari, and N. E. Moussaid, “Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 6, no. 9, pp. 164–172, 2015. View at Google Scholar
  38. S. Sumitha Pandit and B. Kalpana, “Hybrid technique for detection of denial of service (DOS) attack in wireless sensor network,” International Journal of Advanced Networking and Applications, vol. 7, no. 2, pp. 2674–2681, 2015. View at Google Scholar
  39. S. Athmani, D. E. Boubiche, and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in Proceedings of the World Congress on Computer and Information Technology (WCCIT '13), pp. 1–5, IEEE, Sousse, Tunisia, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  40. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  41. M. Tripathi, M. S. Gaur, and V. Laxmi, “Comparing the impact of black hole and gray hole attack on LEACH in WSN,” Procedia Computer Science, vol. 19, pp. 1101–1107, 2013. View at Publisher · View at Google Scholar
  42. A. P. Renold, R. Poongothai, and R. Parthasarathy, “Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks,” in Proceedings of the International Conference on Computer Communication and Informatics (ICCCI '12), pp. 1–4, January 2012. View at Publisher · View at Google Scholar · View at Scopus
  43. S. Magotra and K. Kumar, “Detection of HELLO flood attack on LEACH protocol,” in Proceedings of the 4th IEEE International Advance Computing Conference (IACC '14), pp. 193–198, IEEE, Gurgaon, India, February 2014. View at Publisher · View at Google Scholar · View at Scopus
  44. I. Almomani and B. Al-Kasasbeh, “Performance analysis of LEACH protocol under Denial of Service attacks,” in Proceedings of the 6th IEEE International Conference on Information and Communication Systems (ICICS '15), pp. 292–297, Amman, Jordan, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  45. The Network Simulator—ns-2, http://www.isi.edu/nsnam/ns/.
  46. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10–18, 2009. View at Publisher · View at Google Scholar
  47. R. R. Bouckaert, E. Frank, M. A. Hall et al., “WEKA—experiences with a Java open-source project,” The Journal of Machine Learning Research, vol. 11, pp. 2533–2541, 2010. View at Google Scholar