A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK IK2206: Internet Security and Privacy Sumanta Saha Md. Safiqul Islam Md. Sakhawat Hossen
W IRELESS A D H OC N ETWORK � Wireless ad hoc networks are autonomous nodes that communicate with each other in a IDS in WSN-Sumanta,Safiqul,Sakhawat decentralized manner through multi-hop radio network - Mobile ad hoc networks (MANET) - Wireless sensor networks (WSN). 2
IDS in WSN-Sumanta,Safiqul,Sakhawat 3 W IRELESS S ENSOR N ETWORK
C OMMON S ECURITY V ULNERABILITIES � Lack of infrastructure IDS in WSN-Sumanta,Safiqul,Sakhawat � Shared wireless medium � Cooperative nature between the nodes � Easy physical accessibility � Dynamic network topology � Operational constraints � Low Battery Life � Small Memory � Limited Processing Capability 4
T YPES O F A TTACKS � Sleep Deprivation Torture IDS in WSN-Sumanta,Safiqul,Sakhawat � Network Partition Attack � Wormhole Attack � Sybil Attack � Sinkhole Attack � Selective Forwarding 5
I NTRUSION D ETECTION S YSTEM � “Intrusion detection and response is the task of monitoring systems for evidence of intrusions or IDS in WSN-Sumanta,Safiqul,Sakhawat inappropriate usage and responding to this evidence.” - Network Security Bible � Wireless IDS needs to face more threats than wired IDS � Broadcast media � Even more special IDS required for WSN � Low processing power � Limited battery backup 6
IDS in WSN-Sumanta,Safiqul,Sakhawat 7 O UR P ROPOSED M ODEL
O UR P ROPOSED M ODEL (C ONTD ..) � GSM cell based. � Four Layer architecture IDS in WSN-Sumanta,Safiqul,Sakhawat � Sensor Node - Sensing the environment � Cluster Node - Monitoring Sensor nodes, Data collection � Regional Node - Monitoring three neighbor cluster nodes � Base station - Monitors Regional nodes and distributes collected data 8
IDS in WSN-Sumanta,Safiqul,Sakhawat 9 O UR H OD A RCHITECTURE
IDS in WSN-Sumanta,Safiqul,Sakhawat 10 M ONITOR N ODE
ID M ECHANISM � Multi Layer IDS. � Robustness IDS in WSN-Sumanta,Safiqul,Sakhawat � Physical Layer – RSSI (Received Signal Strength Indicator. � MAC Layer- SMAC and TDMA � Network Layer – Route tracing � Application Layer – Three Layer Watchdog 11
A PPLICATION L AYER � Three level watchdog - Base Station IDS in WSN-Sumanta,Safiqul,Sakhawat - Regional Node - Cluster Node 12
IDS in WSN-Sumanta,Safiqul,Sakhawat 13 I DS
F UTURE W ORK � Election procedure to select cluster and regional node IDS in WSN-Sumanta,Safiqul,Sakhawat � Building our own Simulator 14
IDS in WSN-Sumanta,Safiqul,Sakhawat 15 Questions and Discussion
Recommend
More recommend