{"title":"一种新的WSN异常检测算法","authors":"A. Balakrishnan, P. Rino","doi":"10.1109/ICACC.2015.29","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics and have a lots of interesting applications. Besides energy consumption security of WSN is being a critical issue nowadays. This is because WSNs are easily effected by various types of attacks and node compromises so they require security mechanisms to defend against them. An intrusion detection system (IDS) is one such solution to the problem. There are many research works focused in the area of signature based anomaly based IDS. Based on these malicious activities there is a need of addressing a new or modified versions of IDS algorithm. The proposed algorithm, abbreviated as AD(anomaly detection) algorithm has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member monitoring and then the detection of different attacks. The performance of AD algorithm in identifying and detecting intrusions using a rule-based anomaly detection scheme is studied via simulations.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Novel Anomaly Detection Algorithm for WSN\",\"authors\":\"A. Balakrishnan, P. Rino\",\"doi\":\"10.1109/ICACC.2015.29\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics and have a lots of interesting applications. Besides energy consumption security of WSN is being a critical issue nowadays. This is because WSNs are easily effected by various types of attacks and node compromises so they require security mechanisms to defend against them. An intrusion detection system (IDS) is one such solution to the problem. There are many research works focused in the area of signature based anomaly based IDS. Based on these malicious activities there is a need of addressing a new or modified versions of IDS algorithm. The proposed algorithm, abbreviated as AD(anomaly detection) algorithm has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member monitoring and then the detection of different attacks. The performance of AD algorithm in identifying and detecting intrusions using a rule-based anomaly detection scheme is studied via simulations.\",\"PeriodicalId\":368544,\"journal\":{\"name\":\"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACC.2015.29\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC.2015.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics and have a lots of interesting applications. Besides energy consumption security of WSN is being a critical issue nowadays. This is because WSNs are easily effected by various types of attacks and node compromises so they require security mechanisms to defend against them. An intrusion detection system (IDS) is one such solution to the problem. There are many research works focused in the area of signature based anomaly based IDS. Based on these malicious activities there is a need of addressing a new or modified versions of IDS algorithm. The proposed algorithm, abbreviated as AD(anomaly detection) algorithm has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member monitoring and then the detection of different attacks. The performance of AD algorithm in identifying and detecting intrusions using a rule-based anomaly detection scheme is studied via simulations.