Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 3548607, 14 pages
https://doi.org/10.1155/2017/3548607
Research Article

Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

I. K. Gujral Punjab Technical University, Kapurthala, Punjab, India

Correspondence should be addressed to Rupinder Singh; moc.oohay@67hgnis_ipur

Received 4 October 2016; Revised 2 February 2017; Accepted 7 February 2017; Published 3 April 2017

Academic Editor: Paolo Barsocchi

Copyright © 2017 Rupinder Singh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Maleh, A. Ezzatib, Y. Qasmaouic, and M. Mbidac, “A global hybrid intrusion detection system for wireless sensor networks,” Procedia Computer Science, vol. 52, pp. 1047–1052, 2015. View at Google Scholar
  2. S. Shamshirband, N. B. Anuar, M. L. M. Kiah et al., “Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks,” Journal of Network and Computer Applications, vol. 42, pp. 102–117, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Sarigiannidis, E. Karapistoli, and A. A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information,” Expert Systems with Applications, vol. 42, no. 21, pp. 7560–7572, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, “An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks,” Expert Systems with Applications, vol. 29, no. 4, pp. 713–722, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Shen, S. Liu, and Z. Zhang, “Detection of hello flood attack caused by malicious cluster heads on LEACH protocol,” International Journal of Advancements in Computing Technology, vol. 7, no. 2, pp. 40–47, 2015. View at Google Scholar
  6. S. K. Saini and M. Gupta, “Detection of malicious cluster head causing hello flood attack in LEACH protocol in wireless sensor networks,” International Journal of Application or Innovation in Engineering & Management, vol. 3, no. 5, pp. 384–391, 2014. View at Google Scholar
  7. S. Magotra and K. Kumar, “Detection of HELLO flood attack on LEACH protocol,” in Proceedings of the IEEE International Advance Computing Conference (IACC '14), pp. 193–198, Gurgaon, India, February 2014. View at Publisher · View at Google Scholar
  8. V. K. Arora, “A survey on LEACH and other's routing protocols in wireless sensor network,” International Journal for Light and Electron Optics, vol. 127, no. 16, 2016. View at Google Scholar
  9. T. M. Rahayu, S.-G. Lee, and H.-J. Lee, “Security analysis of secure data aggregation protocols in wireless sensor networks,” in Proceedings of the 16th International Conference on Advanced Communication Technology, pp. 471–474, February 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Zhu, S. Setia, and S. Jajodia, “LEAP+: efficient security mechanisms for large-scale distributed sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Lee and S. Lee, “A new efficient key management protocol for wireless sensor and actor networks,” International Journal of Computer Science and Information Security, vol. 6, no. 2, 2009. View at Google Scholar
  12. M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Hongbin, W. Yingli, Y. Shuang, Y. Hai, and L. Zhenhai, “Hybrid key management mechanism based on double cluster head structure,” in Proceedings of the IEEE 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 164–167, Harbin City, China, December 2012. View at Publisher · View at Google Scholar
  14. W. R. Pires, J. T. H. de Paula Figueiredo, H. C. Wong, and A. A. F. Loureiro, “Malicious node detection in wireless sensor networks,” in Proceedings of the IEEE 18th International Parallel Distributed Processing Symposium, vol. 1, p. 24, Santa Fe, NM, USA, April 2004.
  15. V. P. Singh, A. S. A. Ukey, and S. Jain, “Signal strength based hello flood attack detection and prevention in wireless sensor networks,” International Journal of Computer Applications, vol. 62, no. 15, pp. 1–6, 2013. View at Publisher · View at Google Scholar
  16. L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro, “SecLeach—a random key distribution solution for securing clustered sensor networks,” in Proceedings of the 5th IEEE International Symposium on Network Computing and Applications, pp. 145–154, Washington, DC, USA, 2006.
  17. A. C. Ferreira, M. A. Vilaça, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro, “On the security of cluster-based communication protocols for wireless sensor networks,” in Proceedings of the 4th IEEE International Conference on Networking, vol. 3420 of Lecture Notes in Computer Science, pp. 449–458, 2005.
  18. J. Ibriq and I. Mahgoub, “A Secure Hierarchical Routing protocol for wireless sensor networks,” in Proceedings of the 10th IEEE Singapore International Conference on Communications Systems (ICCS '06), pp. 1–6, IEEE, Singapore, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. L. B. Oliveira, A. Ferreira, M. A. Vilaça et al., “SecLEACH—on the security of clustered sensor networks,” Signal Processing, vol. 87, no. 12, pp. 2882–2895, 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. K. Zhang, C. Wang, and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” in Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–5, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. R. Alcalá, Y. Nojima, H. Ishibuchi, and F. Herrera, “Special issue on evolutionary fuzzy systems,” International Journal of Computational Intelligence Systems, vol. 5, no. 2, pp. 209–211, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Y. Chung and N. Wahid, “A hybrid network intrusion detection system using simplified swarm optimization (SSO),” Applied Soft Computing, vol. 12, no. 9, pp. 3014–3022, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Rathee and S. Malhotra, “Preventing sybil attack in wireless sensor networks,” International Journal for Innovative Research in Science & Technology, vol. 1, no. 12, 2015. View at Google Scholar
  24. F. Cao, H. Ye, and D. Wang, “A probabilistic learning algorithm for robust modeling using neural networks with random weights,” Information Sciences, vol. 313, pp. 62–78, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. V. Obada, K. Djouani, and Y. Hamam, “Hidden Markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network,” Procedia Computer Science, vol. 10, pp. 1010–1017, 2012. View at Google Scholar
  26. J. Rupareliya, S. Vithlani, and C. Gohel, “Securing VANET by preventing attacker node using watchdog and Bayesian network theory,” in Proceedings of the International Conference on Communication, Computing and Virtualization, vol. 79, pp. 649–656, Mumbai, India, February 2016.
  27. P. Amish and V. B. Vaghela, “Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol,” in Proceedings of the 7th International Conference on Communication, Computing and Virtualization (ICCCV '16), vol. 79, pp. 700–707, February 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Zadeh, “Fuzzy rule sets,” in Information and Control, Department of Electrical Engineering and Electronics Research Laboratory, University of California, Berkeley, Calif, USA, 1965. View at Google Scholar
  29. A. Zadeh, “Fuzzy sets and information granularity,” in Fuzzy Sets, Fuzzy Logic and Fuzzy Systems, pp. 433–448, World Scientific, 1996. View at Google Scholar
  30. K. Q. Yan, S. C. Wang, S. S. Wang, and C. W. Liu, “Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network,” in Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT '10), pp. 114–118, Chengdu, China, July 2010. View at Publisher · View at Google Scholar · View at Scopus