In general, most of the security protocols mentioned above can cope with weak, external attackers. However, strong, internal attackers, which managed to penetrate the first perimeter of defense (for instance through tampering sensor nodes [18]), can only be dealt with using intrusion detection systems (IDSs). Various signaturebased and anomaly-based IDS architectures have been proposed for flat and hierarchical WSNs [19]. However, the energy constraints and scalability issues in WSNs dictate
the use of an hierarchical anomaly-based detection
model for IDS [20]. In this grouping technique, the essential
operation is to select a set of cluster heads (CHs)
among the nodes in the network and to cluster the rest
of the nodes with them. Cluster heads are responsible for
coordination among the nodes inside their clusters (intracluster
data gathering) and for forwarding the collected
data to the sink node, usually after efficiently aggregating
them.With regard to anomaly detection, cluster heads
are also tasked with intrusion detection functions, such
as collecting intrusion alarms from their cluster members
(CMs). Additionally, the cluster head nodes may also
detect attacks against other cluster head nodes of the network,
since they constitute the backbone of the routing
infrastructure.
In general, most of the security protocols mentioned above can cope with weak, external attackers. However, strong, internal attackers, which managed to penetrate the first perimeter of defense (for instance through tampering sensor nodes [18]), can only be dealt with using intrusion detection systems (IDSs). Various signaturebased and anomaly-based IDS architectures have been proposed for flat and hierarchical WSNs [19]. However, the energy constraints and scalability issues in WSNs dictatethe use of an hierarchical anomaly-based detectionmodel for IDS [20]. In this grouping technique, the essentialoperation is to select a set of cluster heads (CHs)among the nodes in the network and to cluster the restof the nodes with them. Cluster heads are responsible forcoordination among the nodes inside their clusters (intraclusterdata gathering) and for forwarding the collecteddata to the sink node, usually after efficiently aggregatingthem.With regard to anomaly detection, cluster headsare also tasked with intrusion detection functions, suchas collecting intrusion alarms from their cluster members(CMs). Additionally, the cluster head nodes may alsodetect attacks against other cluster head nodes of the network,since they constitute the backbone of the routinginfrastructure.
การแปล กรุณารอสักครู่..