Intrusion detection of sinkhole attacks in large-scale wireless sensor networks

Changlong Chen, Min Song, George Hsieh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

45 Scopus citations

Abstract

In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.

Original languageEnglish
Title of host publicationProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Pages711-716
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 - Beijing, China
Duration: 25 Jun 201027 Jun 2010

Publication series

NameProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Conference

Conference2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Country/TerritoryChina
CityBeijing
Period25/06/1027/06/10

Keywords

  • Algorithm
  • Intrusion detection
  • Sensor network
  • Sinkhole attack
  • Wireless network

Fingerprint

Dive into the research topics of 'Intrusion detection of sinkhole attacks in large-scale wireless sensor networks'. Together they form a unique fingerprint.

Cite this