MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK

Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim

2009

Abstract

Since wireless resources are limited, an efficient way of utilizing wireless resources is needed in selecting IDSs. We propose a monitoring node selection scheme for intrusion detection in congested wireless sensor network. Network congestion is an important issue in mobile network. The network congestion does not guarantee a proper detection rate and congested networks should cause an unreliable network. We consider congested intrusion detection tasks by queuing theory. We confirm that proposed algorithm guarantee QoS of monitoring tasks and reliable sensor networks.

References

  1. Kachirski O. and Guha R., 1999. Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceeding of the international conference on system sciences, Hawaii, 2003. p.57-64
  2. Kim H., Kim D. and Kim S., Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks, International Journal of Electronics and Communications, (AEU) 60, 2006, p.248-250.
  3. Römer, Kay; Friedemann Mattern, The Design Space of Wireless Sensor Networks, IEEE Wireless Communications 11 (6), December 2004, p. 54-61
  4. Thomas Haenselmann, Sensornetworks, GFDL Wireless Sensor Network textbook, 2006
  5. Hadim, Salem; Nader Mohamed, Middleware Challenges and Approaches for Wireless Sensor Networks, IEEE Distributed Systems Online 7 (3), 2006
  6. Marianov, V. and Serra, D., Probabilistic Maximal Covering Location-Allocation Models for Congested Systems, Journal of Regional Science 38, 1998, p.401- 424
  7. INFOCOM, Anchorage, 2001, p.1549-1557
Download


Paper Citation


in Harvard Style

Choi J., Lee M., Kim G. and Kim S. (2009). MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 117-120. DOI: 10.5220/0002225001170120


in Bibtex Style

@conference{secrypt09,
author={Jaeun Choi and Myungjong Lee and Gisung Kim and Sehun Kim},
title={MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={117-120},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002225001170120},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK
SN - 978-989-674-005-4
AU - Choi J.
AU - Lee M.
AU - Kim G.
AU - Kim S.
PY - 2009
SP - 117
EP - 120
DO - 10.5220/0002225001170120