Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Document Type: Research Paper


School of Computing and Mathematical Sciences, University of Greenwich


Wireless Sensor Networks (WSNs) are
becoming increasingly popular, and very useful in military
applications and environmental monitoring. However,
security is a major challenge for WSNs because they are
usually setup in unprotected environments. Our goal in this
study is to simulate an Intrusion Detection System (IDS)
that monitors the WSN and report intrusions accurately and
effectively. We have thus simulated an IDS that uses
anomaly-based technique to monitor traffic pattern on the
network following a fixed-width clustering algorithm. Our
simulation is based on the sensor network simulation
package by the Naval Research laboratory (NRL). To
evaluate the IDS, we simulated a sensor network,
investigated it with the presence of phenomenon, and
extended it to generate denial of service attacks. We have
used the phenomenon contribution to generate a realistic
traffic pattern for accurate evaluation of protocols, and
compared it to the traditional method of using only cbr
traffic, which is usually been employed by most
researchers. We further adapted the IDS into this simulated
network, and our results show that the selected IDS has
detection rate of over 90% with a very low false positive
rate of less than 1%. We obtained this by configuring every
node to independently monitor detect and report intrusions.