Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Riaz Ahmed Shaikh, Hassan Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Original languageEnglish
Pages (from-to)5989-6007
Number of pages19
JournalSensors
Volume9
Issue number8
DOIs
Publication statusPublished - 2009
Externally publishedYes

Bibliographical note

Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please check publisher website http://www.mdpi.com/home

Keywords

  • alerts
  • anomalies
  • intrusions
  • trust management
  • wireless sensor networks

Fingerprint Dive into the research topics of 'Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this