06-09-2017, 01:16 PM
Wireless Sensor Networks (WSNs) are becoming more popular in recent times, and are very useful in military applications and environmental monitoring. However, security is a major challenge for WSNs because they are typically installed in unprotected environments. Therefore, our goal in this study is to simulate an intrusion detection system (IDS) that monitors the WSN and report intrusions accurately and effectively. This approach starts from the assumption that, since sensor networks use wireless communications, radio links are unsafe and highly prone to attacks by which an attacker can avoid the intrusion prevention mechanisms that must have been adapted to network. The IDS implemented for fixed wired networks are not applicable in WSNs and a number of those implemented for WSNs suffer from a high false positive rate (FPR). Therefore, adequately securing a WSN raises a very challenging research problem. Therefore, we have simulated an IDS that uses an anomaly-based technique to monitor the traffic pattern in the network following a fixed bandwidth clustering algorithm. Our simulation is based on the Naval Research (NRL) laboratory network simulation package. To evaluate the IDS, we first installed a network simulation of sensors using the network simulator (ns-2), investigated with the presence of a phenomenon, and expanded to generate denial of service attacks. We have used the contribution of the phenomenon to generate a realistic traffic pattern for the accurate evaluation of the protocols, and we have compared it with the traditional method of using only cbr traffic, which is usually used by most researchers. In addition, we have adapted the IDS in this simulated network, and our results show that the selected IDS has high detection rate with a very FPR. We have achieved this by configuring each node as a monitoring node to monitor locally and independently detect and report intrusions.