Limits...
A distributed signature detection method for detecting intrusions in sensor systems.

Kim I, Oh D, Yoon MK, Yi K, Ro WW - Sensors (Basel) (2013)

Bottom Line: In addition, the first step is modified to achieve efficient performance under limited computation resources.The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method.The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

View Article: PubMed Central - PubMed

Affiliation: School of Electrical and Electronic Engineering, Yonsei University, Seoul 120-749, Korea. ilkyu.kim19@gmail.com

ABSTRACT
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

No MeSH data available.


Related in: MedlinePlus

The average throughput of the two pattern sets in the base station.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC3673066&req=5

f8-sensors-13-03998: The average throughput of the two pattern sets in the base station.

Mentions: Figure 8 shows the average throughput of the two pattern sets. In MinWM, the suffix and prefix matching steps are skipped by the bookmarks. MinWM only performs the entire pattern comparison using the pre-written bookmarks. By comparing the results, MinWM shows faster detection time of suspicious strings than the general WM algorithm. The figure indicates that MinWM is on average 4.76 times faster. The faster detection helps the base station to gather sensing information more efficiently. The improved detecting performance also helps to manage more sensor nodes. Considering that many sensor nodes are typically utilized for large-scale sensing activities, higher density sensing environments can possibly be provided by the increased capacity.


A distributed signature detection method for detecting intrusions in sensor systems.

Kim I, Oh D, Yoon MK, Yi K, Ro WW - Sensors (Basel) (2013)

The average throughput of the two pattern sets in the base station.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC3673066&req=5

f8-sensors-13-03998: The average throughput of the two pattern sets in the base station.
Mentions: Figure 8 shows the average throughput of the two pattern sets. In MinWM, the suffix and prefix matching steps are skipped by the bookmarks. MinWM only performs the entire pattern comparison using the pre-written bookmarks. By comparing the results, MinWM shows faster detection time of suspicious strings than the general WM algorithm. The figure indicates that MinWM is on average 4.76 times faster. The faster detection helps the base station to gather sensing information more efficiently. The improved detecting performance also helps to manage more sensor nodes. Considering that many sensor nodes are typically utilized for large-scale sensing activities, higher density sensing environments can possibly be provided by the increased capacity.

Bottom Line: In addition, the first step is modified to achieve efficient performance under limited computation resources.The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method.The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

View Article: PubMed Central - PubMed

Affiliation: School of Electrical and Electronic Engineering, Yonsei University, Seoul 120-749, Korea. ilkyu.kim19@gmail.com

ABSTRACT
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

No MeSH data available.


Related in: MedlinePlus