|Table of Contents|

Wavelet Analysis-Based Real-Time Anomaly Detection Algorithm for Wireless Sensor Network(PDF)

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

Issue:
2014年01期
Page:
87-
Research Field:
计算机科学
Publishing date:

Info

Title:
Wavelet Analysis-Based Real-Time Anomaly Detection Algorithm for Wireless Sensor Network
Author(s):
Li ZhiyuanZhu QiuzhiWu YongkunTang ZhenyuHu Huaming
School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang 212013,China
Keywords:
wireless sensor networkssecurityanomaly detectionwavelet analysisHurst parameter
PACS:
TP393
DOI:
-
Abstract:
Anomaly detection can detect new and unknown attacks,which has great significance on the wireless sensor networks security.Nowadays,the proposed anomaly detection schemes has poor real-time,high false positive rate and the large amount of computational overhead,and hence the schemes are not suitable for wireless sensor networks.In this paper,a wavelet analysis-based real-time anomaly detection(Wavelet Analysis-based Real-time Anomaly Detection,WARAD)algorithm for wireless sensor network is proposed.Throughout the detecting process,the WARAD algorithm reversely collects the real-time network traffic,and then uses the variance of the wavelet coefficients in the small-scale interval to compute the Hurst values,which can improve the real-time and the accuracy of anomaly detection,and reduce the computational complexity of solving the Hurst values.Finally,the WARAD algorithm-based intrusion detection system is implemented on the platform of MeshIDE.The experimental results showed that the proposed algorithm greatly improved the real-time of anomaly detection for wireless sensor networks,and reduced the false positive rate and the false negative rate of anomaly detection.

References:

[1] Du Y,Yang S,Zhang R H.Design of an intrusion detection system for wireless sensor networks[J].Sensor Letters,2011,9(5):2 082-2 086.
[2]Huang J Y,Liao I E,Chung Y F,et al.Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining[J].Information Sciences,2013,231:32-44.
[3]傅蓉蓉,郑康锋,芦天亮,等.基于危险理论的无线传感器网络入侵检测模型[J].通信学报,2012,33(9):31-37.
[4]Yan K Q,Wang S C,Wang S S,et al.Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network[C]//Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology(ICCSIT’10).Chengdu:IEEE,2010:114-118.
[5]Sedjelmaci H,Feham M.Novel hybrid intrusion detection system for clustered wireless sensor network[J].International Journal of Network Security and Its Applications,2011,3(4):1-14.
[6]Bao F,Chen I R,Chang M J.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183.
[7]Srikanth H,Shroff N B,Saurabh B.Secure neighbor discovery through overhearing in static multihop wireless networks[J].Computer Networks,2011,55(6):1 229-1 241.
[8]Liu B,Olivier D,Philippe N.Dynamic coverage of mobile sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(2):301-311.
[9]Gao J,Hu G,Yao X.Anomaly detection of network traffic based on wavelet packet[C]//Proceedings of the Asia-Pacific Conference on Communications.Busan,Korea:APCC,2006:1-5.

Memo

Memo:
-
Last Update: 2014-03-30