TY - GEN
T1 - Integrated UCON-based access control and adaptive intrusion detection for wireless sensor networks
AU - Wu, Jun
AU - Shimamoto, Shigeru
PY - 2010/12/1
Y1 - 2010/12/1
N2 - In Wireless Sensor Networks (WSNs), current intrusion detection systems (IDSs) work in isolation from access control. The lack of interoperation between these components can not provide enough security for WSNs. To address this, we propose a new framework to integrate access control and intrusion detection (ID) to improve the security of WSNs. Moreover, we perform access control based on usage control (UCON), so that our scheme can provide mutable attributes and continuous access decision. We also develop an adaptive decision tree construction mechanism for intrusion detection. Besides normal attacks, our scheme can defense against sophisticated ongoing attacks and unknown attacks in WSNs. An instance of policy is simulated to evaluate the overhead coursed by our scheme. The implementation results support the feasibility of using our scheme in WSNs. Also, the security evaluation is done. The results show that the proposed scheme can provide higher security than traditional security schemes.
AB - In Wireless Sensor Networks (WSNs), current intrusion detection systems (IDSs) work in isolation from access control. The lack of interoperation between these components can not provide enough security for WSNs. To address this, we propose a new framework to integrate access control and intrusion detection (ID) to improve the security of WSNs. Moreover, we perform access control based on usage control (UCON), so that our scheme can provide mutable attributes and continuous access decision. We also develop an adaptive decision tree construction mechanism for intrusion detection. Besides normal attacks, our scheme can defense against sophisticated ongoing attacks and unknown attacks in WSNs. An instance of policy is simulated to evaluate the overhead coursed by our scheme. The implementation results support the feasibility of using our scheme in WSNs. Also, the security evaluation is done. The results show that the proposed scheme can provide higher security than traditional security schemes.
UR - http://www.scopus.com/inward/record.url?scp=79551615616&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79551615616&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2010.5683984
DO - 10.1109/GLOCOM.2010.5683984
M3 - Conference contribution
AN - SCOPUS:79551615616
SN - 9781424456383
T3 - GLOBECOM - IEEE Global Telecommunications Conference
BT - 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
T2 - 53rd IEEE Global Communications Conference, GLOBECOM 2010
Y2 - 6 December 2010 through 10 December 2010
ER -