Visible to the public A Survey of Intrusion Detection Systems in Wireless Sensor Networks

TitleA Survey of Intrusion Detection Systems in Wireless Sensor Networks
Publication TypeJournal Article
Year of Publication2014
AuthorsButun, I., Morgera, S.D., Sankar, R.
JournalCommunications Surveys Tutorials, IEEE
Volume16
Pagination266-282
Date PublishedFirst
ISSN1553-877X
KeywordsAd hoc networks, IDS, IDS guidelines, Intrusion detection, Intrusion Detection Systems, MANET, mobile ad hoc network, mobile ad hoc networks, mobile agents, Monitoring, research issues, security, telecommunication security, Unified modeling language, Wireless Sensor Network, Wireless sensor networks, WSN
Abstract

Wireless Sensor Networking is one of the most promising technologies that have applications ranging from health care to tactical military. Although Wireless Sensor Networks (WSNs) have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), the security of such networks is a big concern, especially for the applications where confidentiality has prime importance. Therefore, in order to operate WSNs in a secure way, any kind of intrusions should be detected before attackers can harm the network (i.e., sensor nodes) and/or information destination (i.e., data sink or base station). In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided. Secondly, a brief survey of IDSs proposed for Mobile Ad-Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented. This is followed by the analysis and comparison of each scheme along with their advantages and disadvantages. Finally, guidelines on IDSs that are potentially applicable to WSNs are provided. Our survey is concluded by highlighting open research issues in the field.

URLhttps://ieeexplore.ieee.org/document/6517052/
DOI10.1109/SURV.2013.050113.00191
Citation Key6517052