- freely available
Sensors 2009, 9(8), 5989-6007; doi:10.3390/s90805989
Published: 28 July 2009
Abstract: Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Many anomaly and intrusion detection schemes (IDS) have been proposed for wireless sensor networks (WSNs) [1–6], but those schemes mainly focus on the detection of malicious or faulty nodes. All those anomaly and intrusion detection schemes (IDS) that are cooperative in nature [1, 2, 4] need to share anomalies or intrusion claims with the other node(s). However, those schemes are unable to ascertain that the alert or claim received by the other node(s) is in fact sent by the trusted node(s). As a result, any unidentified malicious node(s) in the network could send faulty anomaly and intrusion claims about the legitimate node(s) to the other node(s). Verifying the validity of such claims is a critical issue that is not considered in existing cooperative-based distributed anomaly and IDS schemes of WSNs . Recently, some intrusion prevention schemes that are based on alerts have been proposed in the literature [8, 9]. However, these schemes are based on the assumption that the monitoring nodes are trusted or the claim will be trusted if the monitoring node passed simple authentication and integrity test based on shared pair-wise key.
In this paper, we propose a new intrusion-aware alert validation algorithm that provides a mechanism for verifying anomaly and intrusion claims sent by any unidentified malicious node(s). This algorithm is simple and easy to implement. Our proposed algorithm execute on alert sender monitoring nodes and alert receiver monitoring nodes. Sender monitoring nodes are mainly responsible for the detection of malicious nodes, assignment of threat level, and generation of alert messages, whereas receiver monitoring nodes are mainly responsible for the validation of alert messages. Validation mechanism consists of two phases: consensus phase and decision phase. Although the consensus approach is widely used in distributed computing domain to solve many problems like fault-tolerance , here we used this approach with variation to solve problem of trusting anomaly and intrusion claims. In consensus phase, we uniquely introduce an intrusion-aware reliability concept that helps to provide an adequate reliability at a modest communication cost. In the decision phase, a node will make the decision regarding validation and invalidation of a claim based on the result of consensus phase.
The rest of the paper is organized as follows: Section 2 contains description on taxonomy of IDS. Section 3 describes related work. Section 4 discusses the network model, assumptions and definitions. Section 5 describes the proposed validation algorithm. Section 6 provides the analysis and evaluation of proposed algorithm in terms of communication overhead, reliability and security. Finally, Section 7 concludes the paper and highlights some future work.
2. Taxonomy of IDS
From the classification point of view, IDS have often been categorized into two types: signature-based IDS and anomaly-based IDS as shown in Figure 1. The signature-based IDS schemes (mostly implemented via pattern matching approach) detect intrusions based on the attack’s signature, such as, specific byte sequence in the payload or specific information in the header fields like sender address, last hop address, etc. On the other hand, the anomaly-based IDS (mostly implemented via statistical approach), first determines the normal network activity and then checks all traffic that deviates from the normal and marks it as anomalous.
In order to strengthen the signature-based and anomaly-based IDS schemes, some researchers applied heuristic algorithms. Heuristic approaches are generally used in AI. Instead of looking for exact pattern matches or simple thresholds, heuristic-based IDS “looks for behavior that is out of ordinary”  during specific time interval. In simple words, it “uses an algorithm to determine whether an alarm should be fired” . For example, if a threshold number of unique ports are scanned on a particular host or a specific attack pattern signature is detected, then alarm will be fired .
From an architectural point of view, IDS schemes are further categorized into three categories: centralized, distributed and hybrid. In the centralized approach, a single designated node monitors the whole network. In the distributed approach, every node or a group of nodes monitor the network. In the hybrid approach, every group has one selected primary node responsible for monitoring and detecting anomalies and intrusions. Once the information is gathered, it is forwarded to the central base station which calculates the impact of those anomalies and intrusions on the whole network.
From the potency point of view, distributed approach is further classified into cooperative and unco-operative distributed approaches. In the cooperative distributed approach, every node or a group of nodes exchanges information about the anomalies and intrusions in order to detect collaborative intrusion attacks. On the contrary, in the uncooperative distributed approach, nodes do not share information about anomalies and intrusion with each others.
3. Related Work
3.1. Intrusion Detection Schemes
Intrusion detection schemes are not in itself the main focus of this paper. However, in order to give a brief overview of those, we have summarized the existing proposed anomalies and IDS schemes of WSNs in Table 1, in which [1, 2, 4, 6] are distributed and cooperative in nature. Brief descriptions of some of the proposed schemes are given below.
Bhuse et al.  have proposed different lightweight techniques for detecting anomalies for various layers, such as application, network, MAC and physical. The main advantage of the proposed techniques is the low overhead that makes them energy efficient. This is due to the fact that they reuse the already available system information (e.g., RSSI values, round trip time, etc.) which are brought forth at various layers of network stack.
Chatzigiannakis et al.  have proposed an application level anomaly detection approach that fuses data (comprised of multiple metrics) gathered from different sensor nodes. In the proposed scheme, the authors have applied Principal Component Analysis (PCA) to reduce the dimensionality of a data set. So this approach will help to detect correlated anomalies/attacks that involve multiple groups of sensors.
Du et al.  have proposed a localization anomalies detection (LAD) scheme for the wireless sensor networks. This scheme takes the advantage of the deployment knowledge and the group membership of its neighbors, available in many sensor network applications. This information is then utilized to find out whether the estimated location is consistent with its observations. In case of an inconsistency LAD would report an anomaly.
Loo et al.  have proposed an anomaly based intrusion detection scheme that is used to detect network level intrusions, e.g., routing attacks. They use clustering algorithm to build the model of normal network behavior, and then use this model to detect anomalies in traffic patterns. IDS will be installed on each sensor and each IDS will function independently.
Da Silva et al.  have proposed high level methodology to construct the decentralized IDS for wireless sensor networks. They have adopted statistical approach based on the inference of the network behavior. The network behavior is obtained from the analysis of the events detected at the specific monitor node, which is responsible for monitoring its one-hop neighbors looking for intruder(s).
Liu et al.  have proposed insider attack detection scheme for wireless sensor networks. They have adopted localized distributed and cooperative approach. This scheme explores the spatial correlation in neighborhood activities and requires no prior knowledge about normal or malicious nodes. This scheme works in four phases: (1) collection of local information about neighborhood nodes (e.g., packet dropping rate, sending rate, etc.), (2) filtering the collected data, (3) identification of initial outlying (malicious) nodes, and (4) applying majority vote to obtain a final list of malicious nodes. Once the node detects some malicious node, it will forward the report to the base station. Afterwards the base station will isolate that node from the network.
3.2. Intrusion Prevention Schemes
Su et al.  have proposed an energy-efficient Hybrid Intrusion Prohibition (eHIP) system for cluster-based wireless sensor networks. The eHIP system consists of two subsystems: Authentication-based Intrusion Prevention (AIP) subsystem and Collaboration-based Intrusion Detection (CID) subsystem. In AIP, two distinguish authentication mechanisms are proposed to verify the control and sensed data messages with the help of HMAC and the modified form of one-key chain  mechanisms. CID is also consisted of two subsystems: cluster head monitoring (CHM) system and member node monitoring (MNM) system. In CHM, all member nodes are divided into multiple monitoring groups. With respect to security requirements, each monitoring group has various number of monitoring nodes. Every monitoring group monitors the cluster head. Whenever any monitoring group detects malicious activity of the cluster head, it generates an alarm that is forwarded to all member nodes of the cluster. Each member node maintains the alarm table. If the number of alarms exceeds then the alarm threshold, the cluster head will be declared as a malicious node. The member node monitoring mechanism is performed at the cluster head and limited to the detection of compromised nodes through the used pair-wise key only.
Zhang et al.  have proposed a nice application-independent framework for identifying compromised nodes. This framework is based on alerts generated by specific intrusion detection system. The authors have adopted a centralized approach and used a simple graph theory. However, this scheme has some limitations, e.g., it provides some late detection of compromised nodes, because the detection process will always start at the end of each time window. If the size of the time window is large (e.g., one hour, as mentioned in ), then it is very likely that an adversary can achieve its objective during that time window. If the time window is small, then the result may not be accurate. Also, the detection accuracy is mainly dependent on the size of the network density. If the network size decreases, then the detection accuracy will also decrease.
4. Network Model, Assumptions and Definitions
4.1. Network Model and Assumptions
Sensor nodes are deployed in an environment either in a random fashion or in a grid fashion. After deployment nodes become static, nodes are organized into clusters. The reason behind taking cluster-based network model is that it is widely used in real world scenarios for efficient network organization . Within a cluster, communication mechanism could be single-hop  or multi-hop . In case of a multi-hop clustering environment, the cluster could be divided into two or three sensor sub-clusters for the purpose of distributed detection .
We assume that any cooperative-based distributed anomaly detection or IDS is already deployed in the WSNs and forwards claims to the other node(s) whenever it detects anomalies or intrusions. Based on the mechanism of the IDS, every node or subset of nodes (within a cluster) acts as a monitoring node. The malicious node must fall into the radio range of the monitoring node. And the node (who received the claim from the monitoring node) has the knowledge about the neighboring nodes of the monitoring and malicious nodes (the malicious and monitoring nodes belong to the same cluster). Within a cluster or sub-cluster, all monitoring nodes can communicate with each other directly. We also assume that the multiple sensor nodes in a neighborhood can sense the same anomaly/intrusion. We also assume that all information is exchanged in a secure encrypted manner. For this purpose, every monitoring node share a unique secret key  with other monitoring node(s) that are in the same cluster.
A legitimate node compromised by an adversary is called a malicious node. In order to hide the presence of the adversary, a malicious node could also perform all activities of the normal nodes, such as monitoring, ciphering of data, forwarding of packets, etc.
Reliability means the confidence level on a certain decision. It can simply be categorized into three levels: (1) low, (2) medium, and (3) high. At low reliability, validation is based on the confirmation from any single available trusted source. At medium reliability, validation is based on the confirmation from half of the available trusted sources. At high reliability, validation is based on the confirmation from all of the trusted sources. In general, the reliability level (RL) is define as:where n represents the total number of available trusted nodes, and q represents the number of nodes consulted. However, in order to achieve more flexibility and adaptability, we have adopted the intrusion-aware reliability mode concept, in which the validation is based on the level of a threat of an anomaly or intrusion. This approach will also reduce the communication cost as described in Section 6.1. Threats could also be categorized into low, medium, high or other. Depending on the level of the threat, intrusion-aware reliability mode is set to low, medium, high or other, as shown in Figure 2.
5. Intrusion-aware Alert Validation Algorithm
Our proposed intrusion-aware alert validation algorithm execute on sender as well as on receiver monitoring nodes. Sender monitoring nodes are mainly responsible for the detection of malicious nodes and generation of alert messages, whereas receiver monitoring nodes are mainly responsible for the validation of alert messages. Both sender and receiver nodes go through different phases as described below.
5.1. Sender Monitoring Node
In our proposed algorithm, sender monitoring node will perform mainly three steps (as shown in Figure 3): (1) detection of malicious node, (2) threat level assignment, and (3) generation of alert message.
Phase 1: Detection of Malicious Node
A node can be classified into one of the three categories : trustworthy, untrustworthy, and uncertain. A node is considered to be trustworthy if it interacts successfully most of the time with the other nodes. A node is considered untrustworthy if it tries to do as many unsuccessful interactions as possible with the other nodes. An untrustworthy node could be a faulty  or malicious node. A node is considered uncertain if it performs both successful and unsuccessful interactions. Detailed definition of the successful and unsuccessful interactions and trust calculation methodology is available in our paper  and provided here in a simplified form.
A sender will consider an interaction successful if the sender receives confirmation that the packet is successfully received by the neighbor node and forwarded towards the destination in an unaltered fashion. The first requirement of successful reception is achieved on the reception of the link layer acknowledgment (ACK). The second requirement of forwarding towards the destination is achieved with the help of enhanced passive acknowledgment (PACK) by overhearing the transmission of a next hop on the route, since they are within the radio range . If the sender node does not overhear the retransmission of the packet within a threshold time from its neighboring node or the overheard packet is found to be illegally fabricated (by comparing the payload that is attached to the packet), then the sender node will consider that interaction as unsuccessful.
With the help of this simple approach, several attacks can be prevented, i.e., the black hole attack is straightforwardly detected when malicious node drops the incoming packets and keeps sending self-generated packets . Similarly, sink hole attack , an advanced version of the black hole attack, is also easily detectable by looking at the passive acknowledgment. Likewise, the selective forwarding attack  and gray-hole attack  can also be eliminated with the aid of above mentioned approach.
Based on these successful and unsuccessful interactions, node x can calculate the trust value of node y:where [.] is the nearest integer function, Sx,y is the total number of successful interactions of node x with y during time Δt, Ux,y is the total number of unsuccessful interactions of node x with y during time Δt. After calculating trust value, a node will quantize trust into three states as follows: where, f represents half of the average values of all trustworthy nodes and g represents one-third of the average values of all untrustworthy nodes. Both f and g are calculated as follows: where [.] is the nearest integer function, Rx represents the set of trustworthy nodes for node x, Mx the set of untrustworthy nodes for node x, and n is the total number of nodes that contains trustworthy, untrustworthy and uncertain nodes. The initial trust values of all nodes are 50, which represents the uncertain state. Initially f and g are equal to 25 and 17 respectively, although other values could also be used by keeping the following constraint intact: fi − gi ≥ 1, which is necessary for keeping the uncertain zone between a trusted and untrustworthy zone. The values of f and g are adaptive. During the steady-state operation, these values can change with every passing unit of time which creates dynamic trust boundaries. At any stage, when |Rx| or |Mx| becomes zero, the value of fj+1 or gj+1 remains the same as the previous values (fj and gj). The nodes whose values are above 100 − f will be declared as trustworthy nodes (Equation 3), and nodes whose values are lower than 50 − g will be consider as untrustworthy nodes (Equation 3). After each passage of time, Δt, nodes will recalculate the values of f and g. This trust calculation procedure will continue in this fashion.
The time window length (Δt) could be made shorter or longer based on the network analysis scenarios. If Δt is too short, then the calculated trust value may not reflect the reliable behavior. On the other hand, if it is too long, then it will consume too much memory to store the interaction record at the sensor node. Therefore, various paremters can be used to adjust the length of Δt. In simplicity, let us assume a cluster size, n, as the single paramters; then, Δt is equal to n − 1. This approach reduces the problems associated with too short or too long time window lengths. Moreover, the time window lengths are adaptive based on the cluster size. If the size of the cluster changes, then the time window length will also change.
Phase 2: Threat Level Assignment
Whenever a monitoring node detects malicious node, it generates an alert. This alert will be forwarded to the other neighbor monitoring nodes. In our proposed algorithm, an alert message also contains the information about intensity or level of threat. This level of threat is calculated based on the trust value of the malicious node. The lesser the trust value, the higher the threat level. For example, if a node is continuously dropping all incoming packets (black hole attack), then based on the trust management methodology defined above, the trust value of a malicious node becomes zero. So, the level of threat for this kind of attack is high. If a node is performing sink hole attack, then the trust value of a node become higher than the node performing the black hole attack. Therefore, the threat level is less as compared with the earlier one.
Based on the trust value of a malicious node, a node will quantize threat level (Hlevel) in following way:where k represents total number of threat levels, 50 − g represent the upper limit of the untrustworthy zone as defined in Equation 3. Tmal represent the trust value of a malicious node. Let us assume that there are three threat levels (k=3): low, medium and high. In that case, a node will quantize threat level (Hlevel) in following way: The concept of threat level is later used in our algorithm for a selection of an appropriate reliability level.
Phase 3: Generation of Alert Message
Once the threat level is assigned, a node will generate an alert/claim message. This message contains four types of information.
Identity of the sender node (IDsender).
Identity of the malicious node (IDmal).
Threat level (Hlevel).
Threat detail, like code etc.
5.2. Receiver Monitoring Node
Intrusion-aware alert validation algorithm at the receiver end is shown in Figure 4. It shows that, if the claim packet is received from trustworthy monitoring node, then claim will be validated straightforwardly. If the claim packet is received from the untrustworthy monitoring node, then no consideration will be given to that claim packet. If the claim packet is received from the uncertain monitoring node, then our proposed intrusion-aware validation algorithm goes through two phases: (1) consensus phase, and (2) decision phase. Details about these phases are given below.
Phase 1 (Consensus Phase)
Whenever a designated node receives the claim/alert packet, it first checks (1) if the sender is uncertain, and (2) if the identity of a new malicious node is already declared as a malicious node (Algorithm 1, Line 1:2). If not, then the node will first get the common neighborhood list (Nsm) of the sender and malicious nodes respectively (Line 3:5). Afterwards, the node will perform filtering by eliminating any known malicious node(s) from that list (Line 6). Based on the threat level, confirmation request packet(s) is forwarded to randomly selected node(s) from the Nt list (Line 7:19). For example, if the threat level is low, then the confirmation request is forwarded to the one randomly selected trustworthy node from the list Nt (Line 8:9). If the threat level is medium, then the confirmation request packet is forwarded to half of the randomly selected trustworthy nodes from the list Nt (Line 10:13). If the threat level is high, then the confirmation request packet is forwarded to all trustworthy nodes in the list Nt (Line 14:17). If the information about the malicious node is already present (Line 20), then the node will just update its old record (Line 21).
|Algorithm 1. Phase 1: Consensus Phase|
|1: Received Claim Packet (IDsender, IDmal, Hlevel, detail);|
|2: ifIDsender is uncertain and IDmal is new then|
|3: Ns = GetNeighorList(IDsender);|
|4: Nm = GetNeighorList(IDmal);|
|5: Nsm = Ns ∩ Nm;|
|6: Nt = Eliminate_Known_Malicious_Nodes(Nsm);|
|7: ifNt ≠ = ϕ then|
|8: if ThreatLevel(T Hlevel) is Low then|
|9: Send conf_req_pkt(rand(Nt), IDmal, Hlevel,det);|
|10: else if ThreatLevel(T Hlevel) is Medium then|
|11: fori = 1 to len(Nt)/2 do|
|12: Send conf_req_pkt(rand(Nt), IDmal, Hlevel,det);|
|13: end for|
|15: fori = 1 to len(Nt) do|
|16: Send conf_req_pkt(IDi, IDmal,det);|
|17: end for|
|18: end if|
|19: end if|
|21: Update Record;|
|22: end if|
Phase 2 (Decision Phase)
Once the confirmation request packet(s) is forwarded to the particular node(s) then the phase 2 of the validation algorithm is triggered. In this phase algorithm will first wait for the confirmation response packets until δt time, where δt is calculated as:Here, tprop is the propagation time between the requester and farthest responder (in terms of hops or geographical location) among nodes where the request packets were forwarded. The tproc is the estimated processing time of the request at the responder end.
A node will expect three types of responses (r) from the nodes where confirmation request packets were forwarded:where ri,j represents that the node i received the response packet from the node j and j ∈ Nt. A node i will make the decision (D) about the validity and invalidity of the claim based on the following rule: where nres represents the total number of the response packets received by the node i in response to the number of the request packets (nreq). Here 0 ≥ nres ≤ nreq.
If the claim is invalidated, then the sender of the claim will declare it as a malicious node. That helps to provide protection against any possible security threats, such as flooding, denial of service attacks, etc.
If no consensus is available, then the algorithm will decide based on its mode that is set by the administrator. There are two types of modes: aggressive and defensive. If the algorithm is set in the aggressive mode, then the node will validate the claim; if it is set in the defensive mode, then the node will invalidate the claim.
Responder monitoring nodes: Whenever any monitoring node receives confirmation request packet for alert validation, it will first check the status of the sender. If the sender is trusted, it will generate confirmation response packet and will not generate the same alert if responder node agree with the claim. Also, the responder node will update its malicious node list. If the responder node receives the same alert message from another monitoring node, it will straightforwardly validate that claim. This approach helps to suppress any extra requests for the same alert.
Tolerance for false alarm: In our proposed algorithm, default tolerance level for false alarms generated by any node is zero. As mentioned earlier, if a claim is invalidated, the sender of the claim will be declared as a malicious node. If we do not declare the sender as a malicious node, then it may result in flooding or denial of service attacks. However, if we declare the sender as a malicious node, it may cause a node to be evicted from the network due to false alarm.
In order to solve the above problem, we can introduce a tolerance level metric in our algorithm. Tolerance level determines the amount of traffic each node can generate for the claims about which it is unsure. Tolerance level will depend on network capacity and node abundance. It may also depend on the energy level of the network. If the energy level is too low, the application can decide not to tolerate any such traffic.
6. Analyses and Evaluation
6.1. Communication Overhead Analysis
The communication overhead of the validation algorithm is dependent on three factors: (1) total number of intrusion claims (Ic), (2) number of commonly trusted neighboring nodes, and (3) threat level of intrusion or anomaly. Table 2 shows the communication overhead, in which mt represents the average number of trusted common neighboring nodes between the monitoring and malicious nodes and Il, Im, and Ih represents the total number of low, medium and high intrusion level threats respectively. Here Ic = Il + Im + Ih.
Figure 5 shows the average communication overhead (1,000 simulation runs) of the proposed validation algorithm. During the simulation, different levels (low, medium or high) of threats of anomalies and intrusions occur randomly. Figure 6(a) shows the effect of average number of commonly trusted neighboring nodes (between the monitoring and the malicious nodes) mt and the total number of intrusions Ic occurred in the network. It shows that as the number of mt or Ic increases, the communication overhead of the validation scheme also increases linearly. Figure 6(b) shows the comparison between the four different levels of the reliability modes. In the simulation, each monitoring node has a random number of commonly trusted neighboring nodes. This figure shows that the intrusion-aware reliability mode introduces less communication overhead then the medium and high level reliability modes. At a modest communication cost, it provides adequate reliability required by the nature of the intrusion claim.
Figure 6 shows the effect of tolerance level for false alarms on communication overhead. As we mentioned earlier, the default tolerance level in our proposed scheme is zero. During simulation, we introduce four tolerance levels (0–3) that occurred randomly. Figure 6 shows that as the number of mt or Ic increases, the communication overhead of the validation scheme (with random tolerance) increases more sharply as compared with the zero tolerance level.
6.2. Reliability Analysis
If we assume that the responding node have equal probability of sending any one of the three possible responses (agree, disagree and don’t know), then the total probability (Pc) of a algorithm to reach at the consensus state (validate or invalidate) is:where Nc represents the number of nodes reaching a consensus and K represents the number of possible outcomes (agree, disagree and don’t know) produces by the node. If the probability distribution is not uniform between possible outcomes, then the total probability (Pc) of an algorithm to reach the consensus state (validates or invalidate) is: where δ(m) is one if m node reaches the consensus, zero if otherwise. PMFi is the probability mass function that captures the probability distribution of the symbol produced by the node i. Sm(i) is the ith symbol in the mth node result. More details and derivation of these two probability equations are given in .
Figure 7 shows the simulation result for the probability of reaching consensus (validate or invalidate) of our validation algorithm. It shows that as the number of participating nodes increases in the consensus process, the probability of reaching some consensus also increases linearly.
6.3. Security Resiliency Analysis
Let’s denote the claimant node (the sender), let m denote the node accused of being malicious and let a denote the node that receives this claim from s about m. As before, let Nt denote the filtered list of nodes obtained after performing Line 6 of the algorithm for the consensus phase. From a security point of view, we consider 4 possible events:
Event S: s sends a true claim.
Event S̄: The complement of event S.
Event N: All nodes in Nt send correct responses.
Event N̄: A non-empty subset of nodes in Nt send incorrect responses.
Notice that there is no question of a behaving maliciously since the claim received by it is for its own benefit. Notice further that by incorrect response, we mean nodes responding with −1, where the right answer should be either 1 or 0. Denote by M the event that a decides that m is malicious. We are interested in the four resulting conditional probabilities. We calculate them sequentially in the following. For the ease of analysis, we assume that if a comes to no consensus, it will take the claim of s as true.
Claim 1: Let m be the number of nodes in Nt that agree with the claim of s. Then when m < Nt/2 and 1 otherwise.
Proof: First assume that m < Nt/2. The remaining nodes in Nt will either send −1 or 0 as the response. Event M will be true if the sum of the −1’s is less than or equal to m. Assuming m to be fixed, this probability is:Out of Nt nodes, is the total number of ways in which m nodes can agree with the claim. So the probability is then: The case when m ≥ Nt/2 is obvious.
Claim 2: Let m′ be the number of nodes in Nt that send false responses. Let m be the number of nodes in Nt that agree with the claim of s. Then when m ≥ m′ and 0 otherwise. In particular, Pr [ M| S, N̄] = 0 if m′ > Nt/2.
Proof: This is analogous to Claim 1, with the exception that now m has to be greater than at least m′, since otherwise the sum of responses will be less than 0. Hence we replace m by m − m′ in the probability obtained from Claim 1. The special case when m′ > Nt/2 is obvious since then the sum of the responses will always be less than 0.
Claim 3: Pr[ M| S̄, N] = 1 − Pr [ M| S, N].
Proof: Since now the number of nodes that agree with s will play an opposite role, the result follows.
Claim 4: Let m′ be the number of nodes in Nt that send false responses. Let m be the number of nodes in Nt that agree with the claim of s. Then when m + m′ < Nt/2 and 1 otherwise.
Proof: This is analogous to the proof of Claim 1. Notice that now there are a total number of m + m′ nodes that agree with s. Thus we simply replace m by m + m′ to complete the proof.
Finally we look at the event when a marks s as malicious. This will happen if a comes to a consensus opposite to the claim of s. Let this event be denoted as O. We are interested in Pr [ O| S] and Pr [ O| S̄]. Let p = Pr [ N]. We have the following straightforward result:
Claim 5: We have:
The results that we obtain above are an upper bound on the adversary’s limitations. This analysis provides a general probability method for the determination of certain security metric.
7. Conclusion and Future Work
Existing cooperative-based distributed anomaly and intrusion detection schemes of WSNs do not provide assurance that the reports/alerts/claims received by the other node(s) were really sent by the trusted legitimate node(s). Therefore, in this paper we have proposed the first validation algorithm for trusting anomalies and intrusion claims. This algorithm uses the concept of an intrusion-aware reliability parameter that helps to provide adequate reliability at a modest communication cost.
The proposed work is based on a few strict assumptions, i.e., multiple nodes can sense same anomaly or intrusion. In practice, it is quite possible that only one node can detect some specific anomaly or intrusion. Our proposed scheme does not adequetly deal with this case. Therefore, more work is needed to make the proposed scheme further flexible.
This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement) (IITA-2009-(C1090-0902-0002)) and was supported by the IT R&D program of MKE/KEIT, [10032105, Development of Realistic Multiverse Game Engine Technology]. This work also was supported by the Brain Korea 21 projects and Korea Science & Engineering Foundation (KOSEF) grant funded by the Korea government (MOST) (No. 2008-1342).
References and Notes
- Bhuse, V.; Gupta, A. Anomaly Intrusion Detection in Wireless Sensor Networks. J. High Speed Netw 2006, 15, 33–51. [Google Scholar]
- Du, W.; Fang, L.; Ning, P. LAD: Localization Anomaly Detection for Wireless Sensor Networks. J. Parallel Distrib. Comput 2006, 66, 874–886. [Google Scholar]
- Loo, C.E.; Ng, M.Y.; Leckie, C.; Palaniswami, M. Intrusion Detection for Routing Attacks in Sensor Networks. Inter. J. Distrib. Sensor Netw 2006, 2, 313–332. [Google Scholar]
- Chatzigiannakis, V.; Papavassiliou, S. Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks. IEEE Sens. J 2007, 7, 637–645. [Google Scholar]
- da Silva, A.P.R.; Martins, M.H.T.; Rocha, B.P.S.; Loureiro, A.A.F.; Ruiz, L.B.; Wong, H.C. Decentralized Intrusion Detection in Wireless Sensor Networks. Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’05), 2005; ACM: New York, NY, USA; pp. 16–23.
- Liu, F.; Cheng, X.; Chen, D. Insider Attacker Detection in Wireless Sensor Networks. Proceedings of 26th Annual IEEE Conference on Computer Communications (INFOCOM07), Anchorage, Alaska, USA, 2007; pp. 1937–1945.
- Bhuse, V.S. Lightweight Intrusion Detection: A Second Line of Defense for Unguarded Wireless Sensor Networks. PhD thesis,. Western Michigan University, Kalamazoo, MI, USA, 2007. [Google Scholar]
- Su, W.-T.; Chang, K.-M.; Kuo, Y.-H. eHIP: An Energy-Efficient Hybrid Intrusion Prohibition System for Cluster-Based Wireless Sensor Networks. Comput. Netw 2007, 51, 1151–1168. [Google Scholar]
- Zhang, Q.; Yu, T.; Ning, P. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Infor. Syst. Secur 2008, 11, 1–37. [Google Scholar]
- Barborak, M.; Dahbura, A.; Malek, M. The Consensus Problem in Fault-Tolerant Computing. ACM Comput. Surv 1993, 25, 171–220. [Google Scholar]
- Pfleeger, S.L. Security in Computing; Prentice Hall: Upper Saddle River, New Jersey, USA, 2003. [Google Scholar]
- Newman, D.P.; Manalo, K.M.; Tittel, E. CSIDS Exam Cram 2 (Exam Cram 623-531); Que Publishing: Upper Saddle River, NJ, USA, 2004. [Google Scholar]
- Perrig, A.; Canetti, R.; Tygar, J.D.; Song, D. Efficient Authentication and Signing of Multicast Streams Over Lossy Channels. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, Canada, 2000; pp. 56–73.
- Younis, O.; Krunz, M.; Ramasubramanian, S. Node Clustering in Wireless Sensor Networks: Recent Developments and Deployment Challenges. IEEE Netw 2006, 20, 20–25. [Google Scholar]
- Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wirel Comm 2002, 1, 660–670. [Google Scholar]
- Jin, Y.; Wang, L.; Kim, Y.; Yang, X.-Z. Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks. Wirel. Pers. Comm 2008, 45, 31–43. [Google Scholar]
- Hac, A. Wireless Sensor network Designs; John Wiley & Sons, Ltd: New Jersey, USA, 2003. [Google Scholar]
- Shaikh, R.A.; Lee, S.; Khan, M.A.U.; Song, Y.J. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. Lect. Not. Comput. Sci 2006, 4217, 367–377. [Google Scholar]
- Shaikh, R.A.; Jameel, H.; Lee, S.; Song, Y.J.; Rajput, S. Trust Management Problem in Distributed Wireless Sensor Networks. Proceedings of 12th IEEE International Conference on Embedded Real Time Computing Systems and its Applications (RTCSA 2006); IEEE Computer Society: Sydney, Australia, 2006; pp. 411–415. [Google Scholar]
- Jiang, P. A New Method for Node Fault Detection in Wireless Sensor Networks. Sensors 2009, 9, 1282–1294. [Google Scholar]
- Shaikh, R.A.; Jameel, H.; d’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.J. Group-based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Trans. Parall Distrib. Sys.. (in press)..
- Buchegger, S.; Le Boudec, J.-Y. A Robust Reputation System for Peer-To-Peer and Mobile Ad-Hoc Networks. Proceedings of P2PEcon, Harvard University, MA, USA; 2004. [Google Scholar]
- Gupta, S. Automatic Detection of DOS Routing Attacks in Wireless Sensor Networks, MS thesis,. University of Houston, Houston, USA, 2006.
- Du, X.; Guizani, M.; Xiao, Y.; Chen, H.H. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks. IEEE Trans. Wirel. Commun 2007, 6, 3395–3401. [Google Scholar]
- Karlof, C.; Wagner, D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications (WSNA’03); IEEE Computer Society: Anchorage, Alaska, USA, 2003; pp. 113–127. [Google Scholar]
- Srinivasan, A.; Teitelbaum, J.; Liang, H.; Wu, J.; Cardei, M. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks. In Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks; Boukerche, A., Ed.; Wiley & Sons: New Jersey, USA, 2006. [Google Scholar]
- Yacoub, S.; Lin, X.; Burns, J. Analysis of the Reliability and Behavior of Majority and Plurality Voting Systems. Hewlett-Packard Development Company, L.P.: Palo Alto, CA, USA, 2002. [Google Scholar]
|Table 1. Summarization of proposed Anomalies and IDS schemes of WSNs|
|Architecture||Distributed & cooperative||Distributed & cooperative||Distributed & uncooperative||Hybrid||Distributed & uncooperative||Distributed & cooperative|
|Specifications||Installation of IDS||Each sensor node||Each sensor node||Each sensor node||Each primary node of a group||Special monitor nodes in network||Each sensor node|
|IDS Scope||Multilayer (Appl., Net., MAC & Phy.)||Application layer||Network layer||Application layer||Multilayer (Appl., Net., MAC & Phy.)||Network layer|
|Attacks detects||Masquerade attack, and forged packets attacks||Localization anomalies||Routing attacks e.g., Periodic error route attack, active & passive sinkhole attack||Correlated anomalies / attacks (invalid data insertion)||Worm hole, data alteration, selective forwarding, black hole, & jamming||Routing attacks e.g., packet dropping etc.|
|Network||Sensor node||Static / Mobile||Static||Static / Mobile||Static / Mobile||Static||Static|
|Table 2. Communication overhead of reliability modes.|
|Intrusion-aware||2Il + (Im + 2Ih)mt|
© 2009 by the authors; licensee MDPI, Basel, Switzerland This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).