a new hod based intrusion detection system for wireless
play

A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR - PowerPoint PPT Presentation

A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK IK2206: Internet Security and Privacy Sumanta Saha Md. Safiqul Islam Md. Sakhawat Hossen W IRELESS A D H OC N ETWORK Wireless ad hoc networks are autonomous nodes that


  1. A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK IK2206: Internet Security and Privacy Sumanta Saha Md. Safiqul Islam Md. Sakhawat Hossen

  2. W IRELESS A D H OC N ETWORK � Wireless ad hoc networks are autonomous nodes that communicate with each other in a IDS in WSN-Sumanta,Safiqul,Sakhawat decentralized manner through multi-hop radio network - Mobile ad hoc networks (MANET) - Wireless sensor networks (WSN). 2

  3. IDS in WSN-Sumanta,Safiqul,Sakhawat 3 W IRELESS S ENSOR N ETWORK

  4. C OMMON S ECURITY V ULNERABILITIES � Lack of infrastructure IDS in WSN-Sumanta,Safiqul,Sakhawat � Shared wireless medium � Cooperative nature between the nodes � Easy physical accessibility � Dynamic network topology � Operational constraints � Low Battery Life � Small Memory � Limited Processing Capability 4

  5. T YPES O F A TTACKS � Sleep Deprivation Torture IDS in WSN-Sumanta,Safiqul,Sakhawat � Network Partition Attack � Wormhole Attack � Sybil Attack � Sinkhole Attack � Selective Forwarding 5

  6. I NTRUSION D ETECTION S YSTEM � “Intrusion detection and response is the task of monitoring systems for evidence of intrusions or IDS in WSN-Sumanta,Safiqul,Sakhawat inappropriate usage and responding to this evidence.” - Network Security Bible � Wireless IDS needs to face more threats than wired IDS � Broadcast media � Even more special IDS required for WSN � Low processing power � Limited battery backup 6

  7. IDS in WSN-Sumanta,Safiqul,Sakhawat 7 O UR P ROPOSED M ODEL

  8. O UR P ROPOSED M ODEL (C ONTD ..) � GSM cell based. � Four Layer architecture IDS in WSN-Sumanta,Safiqul,Sakhawat � Sensor Node - Sensing the environment � Cluster Node - Monitoring Sensor nodes, Data collection � Regional Node - Monitoring three neighbor cluster nodes � Base station - Monitors Regional nodes and distributes collected data 8

  9. IDS in WSN-Sumanta,Safiqul,Sakhawat 9 O UR H OD A RCHITECTURE

  10. IDS in WSN-Sumanta,Safiqul,Sakhawat 10 M ONITOR N ODE

  11. ID M ECHANISM � Multi Layer IDS. � Robustness IDS in WSN-Sumanta,Safiqul,Sakhawat � Physical Layer – RSSI (Received Signal Strength Indicator. � MAC Layer- SMAC and TDMA � Network Layer – Route tracing � Application Layer – Three Layer Watchdog 11

  12. A PPLICATION L AYER � Three level watchdog - Base Station IDS in WSN-Sumanta,Safiqul,Sakhawat - Regional Node - Cluster Node 12

  13. IDS in WSN-Sumanta,Safiqul,Sakhawat 13 I DS

  14. F UTURE W ORK � Election procedure to select cluster and regional node IDS in WSN-Sumanta,Safiqul,Sakhawat � Building our own Simulator 14

  15. IDS in WSN-Sumanta,Safiqul,Sakhawat 15 Questions and Discussion

Recommend


More recommend