A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR - - PowerPoint PPT Presentation

a new hod based intrusion detection system for wireless
SMART_READER_LITE
LIVE PREVIEW

A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR - - PowerPoint PPT Presentation

A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK IK2206: Internet Security and Privacy Sumanta Saha Md. Safiqul Islam Md. Sakhawat Hossen W IRELESS A D H OC N ETWORK Wireless ad hoc networks are autonomous nodes that


slide-1
SLIDE 1

A NEW HOD BASED INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK

IK2206: Internet Security and Privacy Sumanta Saha

  • Md. Safiqul Islam
  • Md. Sakhawat Hossen
slide-2
SLIDE 2

WIRELESS AD HOC NETWORK

Wireless ad hoc networks are autonomous nodes

that communicate with each

  • ther

in a decentralized manner through multi-hop radio network

  • Mobile ad hoc networks (MANET)
  • Wireless sensor networks (WSN).

2

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-3
SLIDE 3

WIRELESS SENSOR NETWORK

3

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-4
SLIDE 4

COMMON SECURITY VULNERABILITIES

Lack of infrastructure Shared wireless medium Cooperative nature between the nodes Easy physical accessibility Dynamic network topology Operational constraints Low Battery Life Small Memory Limited Processing Capability

4

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-5
SLIDE 5

Sleep Deprivation Torture Network Partition Attack Wormhole Attack Sybil Attack Sinkhole Attack Selective Forwarding

TYPES OF ATTACKS

5

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-6
SLIDE 6

“Intrusion detection and response is the task of

monitoring systems for evidence of intrusions or inappropriate usage and responding to this evidence.” - Network Security Bible

Wireless IDS needs to face more threats than wired

IDS

Broadcast media Even more special IDS required for WSN Low processing power Limited battery backup

INTRUSION DETECTION SYSTEM

6

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-7
SLIDE 7

OUR PROPOSED MODEL

7

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-8
SLIDE 8

OUR PROPOSED MODEL (CONTD..)

GSM cell based. Four Layer architecture Sensor Node - Sensing the environment Cluster Node - Monitoring Sensor nodes,

Data collection

Regional Node - Monitoring three neighbor cluster

nodes

Base

station

  • Monitors

Regional nodes and distributes collected data

8

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-9
SLIDE 9

OUR HOD ARCHITECTURE

9

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-10
SLIDE 10

MONITOR NODE

10

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-11
SLIDE 11

ID MECHANISM

Multi Layer IDS. Robustness Physical Layer – RSSI (Received Signal Strength

Indicator.

MAC Layer- SMAC and TDMA Network Layer – Route tracing Application Layer – Three Layer Watchdog

11

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-12
SLIDE 12

APPLICATION LAYER

Three level watchdog

  • Base Station
  • Regional Node
  • Cluster Node

12

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-13
SLIDE 13

IDS

13

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-14
SLIDE 14

FUTURE WORK

Election procedure to select cluster and regional

node

Building our own Simulator

14

IDS in WSN-Sumanta,Safiqul,Sakhawat

slide-15
SLIDE 15

Discussion and Questions

15

IDS in WSN-Sumanta,Safiqul,Sakhawat