DOI QR코드

DOI QR Code

A Study on the Intrusion Detection System's Nodes Scheduling Using Genetic Algorithm in Sensor Networks

센서네트워크에서 유전자 알고리즘을 이용한 침입탐지시스템 노드 스케줄링 연구

  • Received : 2011.08.17
  • Accepted : 2011.09.20
  • Published : 2011.10.31

Abstract

Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection techniques are not suitable for sensor networks with limited resources. In this paper, propose a new method for selecting and managing the detect nodes in IDS(intrusion detection system) for anomaly detection in sensor networks and the node scheduling technique for maximizing the IDS's lifetime. Using the genetic algorithm, developed the solutions for suggested optimization equation and verify the effectiveness of proposed methods by simulations.

센서네트워크의 다양한 응용분야에서 보안성은 대단히 중요하다. 침입탐지는 공격에 대한 방어기법 중의 하나 이지만 기존의 정형화된 침입탐지기술은 제한된 자원으로 운영되는 센서네트워크에는 적절하지 않다. 본 논문에서는 전송되는 패킷의 이상행위를 관찰하는 침입탐지시스템에서 탐지노드의 선정 및 운영에 관한 방법과 함께 침입탐지시스템의 수명을 최대화하는 노드 스케줄링 방안을 제안하였다. 제안된 최적화식에 대하여 유전자 알고리즘을 이용한 해를 개발하고 시뮬레이션을 수행하여 효율성을 확인하였다.

Keywords

References

  1. H. Chan and A. Perrig, ""Security and Privacy in Sensor Networks,"" IEEE Comp. Mag., pp. 103-105. Oct. 2003.
  2. E. Shi and A. Perrig, "Designing Secure Sensor Networks," Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43, Dec. 2004. https://doi.org/10.1109/MWC.2004.1368895
  3. I. F. Akyildiz et al., ""A Survey on Sensor Networks,"" IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114., Aug. 2002. https://doi.org/10.1109/MCOM.2002.1024422
  4. E. Shi; A. Peerig, "Designing Secure Sensor Networks", Wireless Communications Magazine., vol. 11, no. 6, 2004.
  5. Yang Xiao "Security in Distributed, GRID, and Pervasive Computing", Chapter 17(Wireless Sensor Network Security: A Survey), CRC Press, 2006.
  6. Y. Wang; G. Attebury; B. Ramamurthy, " A Survey of Security Issues in Wireless Sensor Networks, "IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, 2006.
  7. I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316-3326, 2002.
  8. Edith C.H. Ngai, "Intrusion Detection for wireless Sensor Networks", The Chinese University of Hong Kong Department of Computer Science and Engineering Ph.D. Term 2 paper, pp. 29-37, 2005.
  9. R. Roman; J. Zhou; J. Lopez, "Applying Intrusion Detection Systems to Wireless SensorNetworks," in Proc. CCNC'06, 2006.
  10. F. Anjum; D. Subhadrabandhu; S. Sarkar; R. Shetty, "On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks," BROADNETS'04, 2004.
  11. A. Agah; S. Das; K. Basu, "Intrusion Detection in Sensor Networks: A non-cooperative Game Approach," IEEE ISNCA, 2004.
  12. C. Loo; M. Ng; C. Leckie; M. Palaniswami, "Intrusion Detection for Routing Attacks in Sensor Networks," Int'l. Journal of Distr. Sensor Networks, vol. 2, 2006.
  13. C. Su; K. Chang; Y. Kuo; M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE WCNC, 2005.
  14. MICA2 Radio Stack for TinyOS. http://www.tinyos.net/tinyos-1.x/doc/mica2rad, 2007.
  15. Techateerawat, P. and Jennings, A. "Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks", IEEE/WIC/ACM International Conference on Web Intelligence and International Agent Technology Workshops, 2006.
  16. M. Cardei, D.-Z. Du, Improving Wireless Sensor Network Lifetime through Power Aware Organization, ACM Wireless Networks, Vol 11, No 3, May 2005.
  17. 문병로, 유전알고리즘, 두양사, 2003.