SlideShare a Scribd company logo
1 of 22
Intrusion Detection System for
Wireless Sensor Networks:
Design, Implementation and Evaluation
Dr. Huirong Fu
Outline
• Overview of Wireless Sensor Network
(WSN)
• Project Objective:
– how to detect attacks on WSN?
• Project Tasks:
– Intrusion detection system
• More Information
UnCoRe 2007
3
WSN Overview
• Applications of WSNs
• Components of a Sensor
• WSN Communication Models
• Attacks on WSN
UnCoRe 2007
4
Overview: Applications of WSNs
• Military
• Disaster Detection and Relief
• Industry
• Agriculture
• Environmental Monitoring
• Intelligent Buildings
• Health/Medical
• Law Enforcement
• Transportation
• Space Exploration
UnCoRe 2007
5
Overview: Components of a Sensor
• Sensing Unit
• Processing Unit
• Storage Unit
• Power Unit
• Wireless
Transmitter/Receiver
UnCoRe 2007
6
Overview: Communication Models
• Hierarchical WSN
– Sensor Nodes
– Cluster Nodes
– Base Stations
• Distributed WSN
UnCoRe 2007
Overview: Attacks on WSN (1/3)
• DoS, DDoS attacks which affect network
availability
• Eavesdropping, sniffing which can threaten
confidential data
• Man-in-the-middle attacks which can affect
packet integrity
• Signal jamming which affects communication
UnCoRe 2007
Overview: Attacks on WSN (2/3)
UnCoRe 2007
Overview: Attacks on WSN (3/3)
UnCoRe 2007
Project Objective
• How to detect attacks on WSN?
– Intrusion Detection System (IDS): Design,
implementation and evaluation
UnCoRe 2007
Project Tasks
• Literature survey on IDS for WSN
– What have been proposed?
– Have they been implemented and evaluated?
– What are the Pros and Cons of each?
UnCoRe 2007
Project Tasks
• Make decision
– Shall we extend some of the works, or
– Design a novel IDS?
• Design, implementation and evaluation
– What are the requirements for an ideal IDS?
– What are the challenges?
– What are the hardware and software
available?
UnCoRe 2007
Existing security measures
• 2Intrusion detection based on AODV (Ad hoc
On-Demand Distance Vector Routing
Protocol)
– Pros
• Sophisticated algorithm for detecting and reacting to
a great variety of potential wireless network attacks
using an anomaly detection pattern
• Works well for ad-hoc wireless networks
– Cons
• Computationally expensive
• Currently not deployed on wireless sensor networks
UnCoRe 2007
Existing security measures
• 4Effective Intrusion Detection using Multiple Sensors
in Wireless Ad Hoc Networks
– Pros
• Mobile agent based intrusion detection
• Intelligent routing of intrusion data throughout the
network
• Lightweight implementation
– Cons
• Agent only deployed on a fraction of the network nodes
• Not deployed on completely wireless sensor networks
UnCoRe 2007
Existing security measures
• 3INSENS (Intrusion Tolerant Routing
Protocol for Wireless Sensor Networks)
– Pros
• Allows an alternative network route to be
established between non-malicious nodes
– Cons
• Does not provide intrusion detection, but rather
intrusion tolerance
• Still requires the sacrifice of a small number of
wireless sensor nodes
UnCoRe 2007
Our IDS System
• Uses Motelv’s TMote wireless sensors.
• Developed using MoteIv’s proprietary
software--TMote Tools
– Cygwin
– Java
– TinyOS programming language
– Enhanced with a plug-in for the Eclipse IDE
for programming and compiling the TinyOS
modules
UnCoRe 2007
IDS Wireless Sensor Setup
UnCoRe 2007
Our IDS System Design
• Uses anomaly detection pattern
• Establishes a baseline of “normal” traffic
between wireless sensor nodes over a
specified time interval
• Compares current traffic against this
baseline traffic over the same specified
time interval
• Makes a determination as to whether or
not a DoS attack is occurring
UnCoRe 2007
Our IDS System Design
• Communication
between wireless
sensor nodes
•Activity diagram for
Wireless Sensor Node
communication
UnCoRe 2007
Our IDS System Design cont’d
• Emulation of a DoS
attack
• Activity design for
Emulation of a DoS
attack
UnCoRe 2007
References
• 1Denial of Service in Sensor Networks
• 2Wireless Sensor Networks for Intrusion
Detection: Packet Traffic Modeling
• 3INSENS: Intrusion-Tolerant Routing in
Wireless Sensor Networks
• 4Effective Intrusion Detection Using
Multiple Sensors in Wireless Ad Hoc
Networks
UnCoRe 2007
References
• MoteIv
– http://www.moteiv.com/community/Moteiv_Co
mmunity
• TMote Tutorial
– http://cents.cs.berkeley.edu/tinywiki/index.php/
Tmote_Windows_install
• TinyOS
– http://www.tinyos.net/tinyos-
1.x/doc/tutorial/index.html
UnCoRe 2007

More Related Content

Similar to IDS WSN.ppt

SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updatedskumartarget
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxRishiDash2
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionDeepika Shivagnanam
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 

Similar to IDS WSN.ppt (20)

Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
TinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSNTinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSN
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptx
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key Distribution
 
EC8702 – Unit 1.pptx
EC8702 – Unit 1.pptxEC8702 – Unit 1.pptx
EC8702 – Unit 1.pptx
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

IDS WSN.ppt

  • 1. Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu
  • 2. Outline • Overview of Wireless Sensor Network (WSN) • Project Objective: – how to detect attacks on WSN? • Project Tasks: – Intrusion detection system • More Information UnCoRe 2007
  • 3. 3 WSN Overview • Applications of WSNs • Components of a Sensor • WSN Communication Models • Attacks on WSN UnCoRe 2007
  • 4. 4 Overview: Applications of WSNs • Military • Disaster Detection and Relief • Industry • Agriculture • Environmental Monitoring • Intelligent Buildings • Health/Medical • Law Enforcement • Transportation • Space Exploration UnCoRe 2007
  • 5. 5 Overview: Components of a Sensor • Sensing Unit • Processing Unit • Storage Unit • Power Unit • Wireless Transmitter/Receiver UnCoRe 2007
  • 6. 6 Overview: Communication Models • Hierarchical WSN – Sensor Nodes – Cluster Nodes – Base Stations • Distributed WSN UnCoRe 2007
  • 7. Overview: Attacks on WSN (1/3) • DoS, DDoS attacks which affect network availability • Eavesdropping, sniffing which can threaten confidential data • Man-in-the-middle attacks which can affect packet integrity • Signal jamming which affects communication UnCoRe 2007
  • 8. Overview: Attacks on WSN (2/3) UnCoRe 2007
  • 9. Overview: Attacks on WSN (3/3) UnCoRe 2007
  • 10. Project Objective • How to detect attacks on WSN? – Intrusion Detection System (IDS): Design, implementation and evaluation UnCoRe 2007
  • 11. Project Tasks • Literature survey on IDS for WSN – What have been proposed? – Have they been implemented and evaluated? – What are the Pros and Cons of each? UnCoRe 2007
  • 12. Project Tasks • Make decision – Shall we extend some of the works, or – Design a novel IDS? • Design, implementation and evaluation – What are the requirements for an ideal IDS? – What are the challenges? – What are the hardware and software available? UnCoRe 2007
  • 13. Existing security measures • 2Intrusion detection based on AODV (Ad hoc On-Demand Distance Vector Routing Protocol) – Pros • Sophisticated algorithm for detecting and reacting to a great variety of potential wireless network attacks using an anomaly detection pattern • Works well for ad-hoc wireless networks – Cons • Computationally expensive • Currently not deployed on wireless sensor networks UnCoRe 2007
  • 14. Existing security measures • 4Effective Intrusion Detection using Multiple Sensors in Wireless Ad Hoc Networks – Pros • Mobile agent based intrusion detection • Intelligent routing of intrusion data throughout the network • Lightweight implementation – Cons • Agent only deployed on a fraction of the network nodes • Not deployed on completely wireless sensor networks UnCoRe 2007
  • 15. Existing security measures • 3INSENS (Intrusion Tolerant Routing Protocol for Wireless Sensor Networks) – Pros • Allows an alternative network route to be established between non-malicious nodes – Cons • Does not provide intrusion detection, but rather intrusion tolerance • Still requires the sacrifice of a small number of wireless sensor nodes UnCoRe 2007
  • 16. Our IDS System • Uses Motelv’s TMote wireless sensors. • Developed using MoteIv’s proprietary software--TMote Tools – Cygwin – Java – TinyOS programming language – Enhanced with a plug-in for the Eclipse IDE for programming and compiling the TinyOS modules UnCoRe 2007
  • 17. IDS Wireless Sensor Setup UnCoRe 2007
  • 18. Our IDS System Design • Uses anomaly detection pattern • Establishes a baseline of “normal” traffic between wireless sensor nodes over a specified time interval • Compares current traffic against this baseline traffic over the same specified time interval • Makes a determination as to whether or not a DoS attack is occurring UnCoRe 2007
  • 19. Our IDS System Design • Communication between wireless sensor nodes •Activity diagram for Wireless Sensor Node communication UnCoRe 2007
  • 20. Our IDS System Design cont’d • Emulation of a DoS attack • Activity design for Emulation of a DoS attack UnCoRe 2007
  • 21. References • 1Denial of Service in Sensor Networks • 2Wireless Sensor Networks for Intrusion Detection: Packet Traffic Modeling • 3INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks • 4Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks UnCoRe 2007
  • 22. References • MoteIv – http://www.moteiv.com/community/Moteiv_Co mmunity • TMote Tutorial – http://cents.cs.berkeley.edu/tinywiki/index.php/ Tmote_Windows_install • TinyOS – http://www.tinyos.net/tinyos- 1.x/doc/tutorial/index.html UnCoRe 2007