Information Theory Based Intrusion Detection in Wireless Sensor Networks

Nancy Alrajei, Huirong Fu, Ye Zhu


Sensor networks are used for monitoring purposes in different environments. One of the biggest issues is to keep the network alive as long as possible. Another concern is to keep it safe from attacks. The limitations of sensor nodes make them particularly vulnerable to attacks from adversaries. The most damaging type of attack is Denial of Service (DoS) attack where parts of the network are overloaded with a flood of requests forcing them to deplete their power and die early. In this paper, we introduce a set of metrics by which intruders are identified among the other nodes. This approach is characterized by the fact that identification of intruders is based on the intrinsic behavior that is either harmful or not beneficial to the network. At the same time our approach saves the network power by taking advantage of network redundancy, and query minimum number of nodes without affecting the accuracy of the results. We tested different intruder detection metrics to see if we can accurately find intruders in the sensor network and how early to save the network from damage. Our results show the effectiveness of these metrics in detecting intruders with 100% accuracy and 0 error rate from some of them.


intrusion detection; wireless sensor network; metric; usefulness; usability; utility; power consumption convergence

Full Text:



A. Yousuf, N.Alrajei and F.Mili, “Information Theory Based Intruder Detection in Sensor Networks,” 3rd Indian International Conference on Artificial Intelligence, Dec 2007.

C. Edith, H. Ngai, “ Intrusion Detection for Wireless Sensor Networks,” Computer Networks, 55:3224-3245, 2011

M. Al- Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of medical systems 36.1 (2012): 93-101.

I. Akyildiz, and V. Mehmet, “Wireless sensor networks,” Vol. 4. John Wiley & Sons, 2010.

Estrin, W. Michener, G. Bonito, and T. W. Participants, “Areport from a national science foundation sponsored workshop: Environmental cyberinfrastructure needs for distributed networks,” Technical report, Scripps Institute of Oceanography, Aug 2003.

N. Trigone, Y. Yao, J. Gehrke, and R. Rajaraman, “Multiquery optimization for sensor networks,” In International Conference on Distributed Processing on Sensor Systems (DCOSS), 2005.

Y. Yao and J. Gehrke, “The cougar approach to in-network query processing in sensor networks,” ACM Sigmod record, 31(3), September 2002.

Y. Yao and J. Gehrke, “Query processing for sensor networks,” In First Biennial Conference on Innova tive Data Systems Research, January 2003

C. Intanagonwiwa, R. Govindan, and D. Estrin, “Directed diffusion: A scalable and robust communication paradigm for sensor networks,” In 6th annual international conference on Mobile Computing and Networking, 2000.

S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “Tinydb: an acquisitional queue processing system for sensor networks,” ACM Trans. Database Syst., 30(1):122–173, 2005.

D. Robert and B. Gastel, “ How to write and publish a scientific paper,” Cambridge University Press, 2012.

Y. Kotidis, “Snapshot queries: Towards data-centric sensor networks,” In 21st International Conference on Data Engineering, 2005.

I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, “Wireless sensor networks for intrusion detection: packet traffic modeling,” 10(1):22–24, January 2006.

J. Deng, R. Han, and S. Mishra, “ Defending against path-based dos attacks in wireless sensor networks,” In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 89–96, New York, NY, USA, 2005.ACM Press.

P. Dutta, M. Grimmer, A. Arora, S.Bibyk, and D. Culler, “ Design of a wireless sensor network platform for detecting rare, random, and ephemeral events,” In IPSN ’05: Proceedings of the 4th international symposium on Information processing in sensor networks, Piscataway, NJ, USA, 2005. IEEE Press.

O. Kachirski and R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks,” In HICSS ’03: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 2003. IEEE Computer Society.

A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad-hoc networks,” 2004

S. Patil, and G. de Veciana, “Managing resources and quality of service in heterogeneous wireless systems exploiting opportunism,” IEEE/ACM Transactions on Networking (TON) 15.5 (2007): 1046-1058.

V. Raghunathan, C. Schurgers, S. Park, and M. Srivastava, “Energy aware wireless microsensor networks,” IEEE Signal Processing Magazine, 19(2):40–50, March 2002.

V. Bhuse and A. Gupta, “Anomaly intrusion detection in wireless sensor networks,” J. High Speed Netw., 15(1):33–51, 2006.

J. Meyer, F. Mili, I. Elhajj, M. Rossman, and I. Bass, “Distributed query optimization in wireless sensor networks,” in Wireless and Optical Comm. Conf. (WOCC ’06), Hangzhou, China, Oct. 2006.

I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, “Wireless sensor networks for intrusion detection: packet traffic modeling,” vol. 10, no. 1,pp. 22–24, Jan. 2006.

G. Zhou, T. He, J. A. Stankovic, and T. Abdelzaher, “Rid: Radio interference detection in wireless sensor networks,” in INFOCOM ’05:24th Annual Joint Conference of IEEE Computer and Communications Societies, 2005.

J. Deng, H. Richard, and S. Mishra, “Insens:intrusion-tolerant routing in wireless sensor networks: Dependable wireless sensor networks,” in Proc. 23rd IEEE International Conference on Distributed Computing Systems, 2003.

C. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423,623–656, July, October 1948.