4.7 Article

An Efficient Hybrid IDS Deployment Architecture for Multi-Hop Clustered Wireless Sensor Networks

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2022.3191491

关键词

Wireless sensor networks; Monitoring; Computer architecture; Resource management; Intrusion detection; Task analysis; Numerical models; Wireless sensor network; intrusion detection system; IDS deployment architecture; resource allocation

资金

  1. National Key Research and Development Program of China [2020YFB1708700]
  2. Australian Research Council [DP220103881]

向作者/读者索取更多资源

This paper proposes a new IDS deployment architecture for enhancing the security of MCWSNs. The cluster heads and the sink act as IDS agents to monitor and detect intrusions in the entire network. A resource allocation model is introduced to optimize the allocation of resources among the IDS agents to maximize the network's security metric. Extensive simulation and comparison studies are conducted to validate the effectiveness of the proposed method.
Deploying Intrusion Detection Systems (IDSs) is an essential way to enhance the security of Multi-hop Clustered Wireless Sensor Networks (MCWSNs). The conventional IDS deployment architectural designs show limitations in ensuring the security of MCWSNs due to the limited monitoring range of the nodes. This paper proposes an efficient IDS deployment architecture for MCWSNs. The architecture is a hybrid design, in which the cluster heads and the sink collaboratively act as IDS agents to monitor the entire network and perform intrusion detection. Based on the new architecture, this paper proposes a resource allocation model to optimally allocate resources among the IDS agents so that the network's security metric can be maximized. A comprehensive analytical framework is proposed to analyze the optimality of the model's solution, and an efficient computational approach is developed to obtain the optimal resource allocation strategy. Extensive numerical simulation and comparison studies are conducted to validate the proposed method.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据