Limits...
A distributed signature detection method for detecting intrusions in sensor systems.

Kim I, Oh D, Yoon MK, Yi K, Ro WW - Sensors (Basel) (2013)

Bottom Line: In addition, the first step is modified to achieve efficient performance under limited computation resources.The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method.The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

View Article: PubMed Central - PubMed

Affiliation: School of Electrical and Electronic Engineering, Yonsei University, Seoul 120-749, Korea. ilkyu.kim19@gmail.com

ABSTRACT
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

No MeSH data available.


Related in: MedlinePlus

The packet format for the wireless sensor network.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC3673066&req=5

f4-sensors-13-03998: The packet format for the wireless sensor network.

Mentions: Figure 4 shows the message format of MinWM. This is the format of a TinyOS 2.x message and ZigBee protocol [19]. The format mainly consists of five categories: AM packet, header, packet payload, footer, and metadata. The AM packet represents the category of the packet and its destination nodes. The header field contains the overall information about a packet, such as the source address, length, and packet groups. The footer field has cyclic-redundancy-checking (CRC) parity data to verify the contents of the packet. The metadata field contains additional information for the networks. The “dest addr” in the AM packet contains the address of the node that should receive the packet. For example, the address “FF FF” indicates a broadcasting mode, which means that the packet is transmitted to all nearby nodes.


A distributed signature detection method for detecting intrusions in sensor systems.

Kim I, Oh D, Yoon MK, Yi K, Ro WW - Sensors (Basel) (2013)

The packet format for the wireless sensor network.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC3673066&req=5

f4-sensors-13-03998: The packet format for the wireless sensor network.
Mentions: Figure 4 shows the message format of MinWM. This is the format of a TinyOS 2.x message and ZigBee protocol [19]. The format mainly consists of five categories: AM packet, header, packet payload, footer, and metadata. The AM packet represents the category of the packet and its destination nodes. The header field contains the overall information about a packet, such as the source address, length, and packet groups. The footer field has cyclic-redundancy-checking (CRC) parity data to verify the contents of the packet. The metadata field contains additional information for the networks. The “dest addr” in the AM packet contains the address of the node that should receive the packet. For example, the address “FF FF” indicates a broadcasting mode, which means that the packet is transmitted to all nearby nodes.

Bottom Line: In addition, the first step is modified to achieve efficient performance under limited computation resources.The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method.The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

View Article: PubMed Central - PubMed

Affiliation: School of Electrical and Electronic Engineering, Yonsei University, Seoul 120-749, Korea. ilkyu.kim19@gmail.com

ABSTRACT
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

No MeSH data available.


Related in: MedlinePlus