Design, Implementation and Evaluation

brainybootsMobile - Wireless

Nov 21, 2013 (3 years and 6 months ago)

77 views

Intrusion Detection System for

Wireless Sensor Networks:

Design, Implementation and Evaluation

Dr. Huirong Fu

Outline


Overview of Wireless Sensor Network
(WSN)


Project Objective:


how to detect attacks on WSN?


Project Tasks:


Intrusion detection system


More Information

UnCoRe 2007

3

WSN Overview


Applications of WSNs


Components of a Sensor


WSN Communication Models


Attacks on WSN

UnCoRe 2007

4

Overview: Applications of WSNs


Military


Disaster Detection and Relief


Industry


Agriculture


Environmental Monitoring


Intelligent Buildings


Health/Medical


Law Enforcement


Transportation


Space Exploration

UnCoRe 2007

5

Overview: Components of a Sensor


Sensing Unit


Processing Unit


Storage Unit


Power Unit


Wireless
Transmitter/Receiver

UnCoRe 2007

6

Overview: Communication Models


Hierarchical WSN


Sensor Nodes


Cluster Nodes


Base Stations




Distributed WSN

UnCoRe 2007

Overview: Attacks on WSN (1/3)



DoS, DDoS attacks which affect network
availability



Eavesdropping, sniffing which can threaten
confidential

data



Man
-
in
-
the
-
middle attacks which can affect
packet
integrity



Signal jamming which affects
communication


UnCoRe 2007

Overview: Attacks on WSN (2/3)

UnCoRe 2007

Overview: Attacks on WSN (3/3)

UnCoRe 2007

Project Objective


How to detect attacks on WSN?


Intrusion Detection System (IDS): Design,
implementation and evaluation


UnCoRe 2007

Project Tasks


Literature survey on IDS for WSN


What have been proposed?


Have they been implemented and evaluated?


What are the Pros and Cons of each?


UnCoRe 2007

Project Tasks


Make decision


Shall we extend some of the works, or


Design a novel IDS?



Design, implementation and evaluation


What are the requirements for an ideal IDS?


What are the challenges?


What are the hardware and software
available?



UnCoRe 2007

Existing security measures


2
Intrusion detection based on AODV (Ad
hoc On
-
Demand Distance Vector Routing
Protocol)


Pros


Sophisticated algorithm for detecting and reacting to
a great variety of potential wireless network attacks
using an anomaly detection pattern


Works well for ad
-
hoc wireless networks


Cons


Computationally expensive


Currently not deployed on wireless sensor networks


UnCoRe 2007

Existing security measures


4
Effective Intrusion Detection using Multiple Sensors
in Wireless Ad Hoc Networks


Pros


Mobile agent based intrusion detection


Intelligent routing of intrusion data throughout the
network


Lightweight implementation


Cons


Agent only deployed on a fraction of the network nodes


Not deployed on completely wireless sensor networks



UnCoRe 2007

Existing security measures


3
INSENS (Intrusion Tolerant Routing
Protocol for Wireless Sensor Networks)


Pros


Allows an alternative network route to be
established between non
-
malicious nodes


Cons


Does not provide intrusion detection, but rather
intrusion tolerance


Still requires the sacrifice of a small number of
wireless sensor nodes

UnCoRe 2007

Our IDS System


Uses Motelv’s TMote wireless sensors.


Developed using MoteIv’s proprietary
software
--
TMote Tools


Cygwin


Java


TinyOS programming language


Enhanced with a plug
-
in for the Eclipse IDE
for programming and compiling the TinyOS
modules



UnCoRe 2007

IDS Wireless Sensor Setup

UnCoRe 2007

Our IDS System Design


Uses anomaly detection pattern


Establishes a baseline of “normal” traffic
between wireless sensor nodes over a
specified time interval


Compares current traffic against this
baseline traffic over the same specified
time interval


Makes a determination as to whether or
not a DoS attack is occurring


UnCoRe 2007

Our IDS System Design



Communication
between wireless
sensor nodes


Activity diagram for
Wireless Sensor Node
communication

UnCoRe 2007

Our IDS System Design cont’d



Emulation of a DoS
attack



Activity design for
Emulation of a DoS
attack

UnCoRe 2007

References


1
Denial of Service in Sensor Networks


2
Wireless Sensor Networks for Intrusion
Detection: Packet Traffic Modeling


3
INSENS: Intrusion
-
Tolerant Routing in
Wireless Sensor Networks


4
Effective Intrusion Detection Using
Multiple Sensors in Wireless Ad Hoc
Networks



UnCoRe 2007

References


MoteIv


http://www.moteiv.com/community/Moteiv_Co
mmunity


TMote Tutorial


http://cents.cs.berkeley.edu/tinywiki/index.php
/Tmote_Windows_install


TinyOS


http://www.tinyos.net/tinyos
-
1.x/doc/tutorial/index.html



UnCoRe 2007