Wireless Sensors Network (WSN) is a type of ad hoc networks in which resources like energy and bandwidth are limited. WSNs are used in many applications such as environmental monitoring, traffic control, healthcare, and military applications. Properties of WSNs such as limited resources make them vulnerable to different kinds of attackers which caused Intrusion Detection Systems (IDS) to be proposed to protect them from intruders. IDS systems when used with cluster-based communications protocols have two different behaviors regarding the action to be taken when a node is detected to be compromised. Some systems exclude the compromised node from the whole cluster rounds while other systems exclude it only from the current round and then deal with it as normal node back in next rounds. In this paper an algorithm that combines the two behaviors together is proposed. In the proposed algorithm, the compromised node is not excluded from the first cluster round; neither it is considered normal in next rounds. Our approach involves building a reputation for the node in the Base Station and excludes the node only when it has a history bad enough to be excluded.
3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009)
Congress
2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009), 21-23 December 2009, Amman, Jordan
Pages
1-5
Topics
Wireless Ad hoc Networks Network Security and Privacy Wireless Sensor Networks Wireless Communication Networks
ISSN
2227-331X
DOI
BibTeX
@inproceedings{50CNIT2009,
title={Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks},
author={Iman Almomani, and Maryam Al-Sharief, and Rawa'a Aljabaly},
booktitle={2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009)},
year={2009},
pages={1-5},
doi={}},
organization={Mosharaka for Research and Studies}
}