13,984 Hits in 7.4 sec

Cross Layer Design for Cooperative Transmission in Wireless Sensor Networks

Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari
2011 Wireless Sensor Network  
So the new proposed IDS will offer a wide range of flexibility for its application in any type of Wireless Sensor Networks.  ...  Wireless Sensor Network consists of large number of nodes which are deployed over a geographical area. Security is a very important consideration while designing a Wireless Sensor Network.  ...  The major function of wireless sensor networks (WSN) is to collect and monitor the related information which about the specific environment.  ... 
doi:10.4236/wsn.2011.36024 fatcat:gztxag34fbhlniu2j7ambfzdbi

Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey

Jeelani ., Manoj Rana, Aasim Zafar
2018 IJARCCE  
In this article, our focal point of consideration is on Intrusion Detection Architecture for Wireless Sensor Networks.  ...  The Intrusion Detection Architecture (IDA) in Wireless Sensor Network is used to detect various attacks occurring on sensor nodes of WSNs that are placed in various hostile environments.  ...  CONCLUSION In this paper, the survey of Intrusion Detection Architecture for Wireless Sensor Networks along with techniques used in various IDAs has been discussed.  ... 
doi:10.17148/ijarcce.2018.71024 fatcat:3qezkgmkyjbtjms6ecmnqeyp5q

Genetic Algorithm for Intrusion Detection in Wireless Sensor Networks

Shubhangi Singh, Rajendra Singh Kushwah
2013 International Journal of Communication Technology for Social Networking Services  
For coherent and secure operations of wireless sensor networks, intrusions must be detected and removed very efficiently before they cause harm.  ...  Also, some energy efficient techniques for routing in wireless sensor networks are compared with genetic algorithm approaches.  ...  An intrusion detection system is one of the efficient possible solutions for handling scoped range of security attacks in wireless sensor networks.  ... 
doi:10.21742/ijctsns.2013.1.1.01 fatcat:q3e3mrtpsvdgvlw3ykfr6hpzuq

Effective intrusion detection using multiple sensors in wireless ad hoc networks

O. Kachirski, R. Guha
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
A few reliable network-based intrusion network). Therefore, network monitoring in wireless ad detection systems are described in [1, 5, 7, 8].  ...  our discussion on ad wireless network for intrusions and try to inhibit intrusion hoc wireless networks.  ... 
doi:10.1109/hicss.2003.1173873 dblp:conf/hicss/KachirskiG03 fatcat:z5yu6rlimnf2tev7t63r7xpbtq

An Effective Hierarchical IDS for Wireless Sensor Networks

Amar Saraswat, Vishal Bharti
2013 International Journal of Computer Applications  
and enhancing the security in wireless sensor Network.  ...  This paper emphasizes on safeguarding the hierarchical structure in wireless sensor network by presenting an Intrusion Detection Technique, which is very useful, simple and works effectively in improving  ...  NUMEROUS IDS SCHEMES FOR WIRELESS SENSOR NETWORK 3.1 Energy Proficient Hybrid Intrusion Detection System Su et al. proposed eHIPenergy efficient hybrid intrusion prohibition system [9] to improve this  ... 
doi:10.5120/13453-1080 fatcat:gfa25wn32vb7nmymjyn6uvix7i

Intrusion Detection: A Probability Model for 3D Heterogeneous WSN

Mohamed.T Mubarak, Syed Abdul Sattar, Appa rao, M Sajitha
2010 International Journal of Computer Applications  
General Terms Wireless sensor networks, security, internal and external intrusion detection.  ...  Intrusion is a common type of attack in such types of networks. In this paper, we analyze the intrusion detection probability which helps in deploying the sensors in efficient manner.  ...  INSENS is an intrusion tolerant routing protocol for wireless sensor networks [4] . In general, security solutions in the network can be divided into two categories: prevention and detection.  ... 
doi:10.5120/1125-1475 fatcat:7odjjpulnrfn7b4e6mtbcembry

A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks

Kantharaju V., S. C. Lingareddy
2017 International Journal of Computer Applications  
The intrusion detection is defined as a mechanism for a wireless sensor network to detect the existence of incorrect and inappropriate moving attackers in the network.  ...  In this paper Watchdog monitoring technique is presented to detect misbehaving nodes.  ...  Intrusion detection in a sensor network can be considered as a monitoring the wireless sensor network for detecting the unauthorised attacker that is invading the network domain [6] .  ... 
doi:10.5120/ijca2017915856 fatcat:huk7ewvjcfa2plpnaltewbf2lm

Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

S. Khan, Jaime Lloret, Jonathan Loo
2014 International Journal of Distributed Sensor Networks  
One of the most efficient techniques to detect an intruder in the network is the use of traffic analysis for detecting anomalies and finding correlated events.  ...  In the paper "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, " a critical study on genetic algorithm, artificial immune, and artificial neural network  ...  The authors of the paper "Intrusion detection systems in wireless sensor networks: a review" present a review of IDSs in WSN such as the following.  ... 
doi:10.1155/2014/747483 fatcat:vjdr7bpajzbjbmrea2zkirgbty

Sleep Deprivation Attack Detection in Wireless Sensor Network

Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal
2012 International Journal of Computer Applications  
This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently.  ...  The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner.  ...  Intrusion detection for wireless sensor network is an emerging field of research. In one of our earlier works, we have presented a survey of recent IDS in sensor networks [1] .  ... 
doi:10.5120/5056-7374 fatcat:3hvn7zsj3zc4noxv7icu7m4kv4

Research on Wireless Sensor Network Intrusion Detection Technology

Qing Gang Fan, Li Wang, Yun Jie Zhu, Yan Ning Cai, Yong Qiang Li, W.-P. Sung, J.C.M. Kao
2016 MATEC Web of Conferences  
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.  ...  Intrusion detection technology has an important position in the network security.  ...  Mohsen Estiri and others in the literature [10] puts forward the theory of repeated game model for intrusion detection for wireless sensor network packet loss against intrusion detection scheme.  ... 
doi:10.1051/matecconf/20164401053 fatcat:ogonnknrlneffpldv47ifzcgqi

A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks

Jaeun Choi, Gisung Kim, Sehun Kim
2012 International Journal of Distributed Sensor Networks  
We propose an Intrusion Detection System (IDS) node selection method for Wireless Sensor Networks (WSNs).  ...  In this paper, we propose an Intrusion Detection Systems (IDSs) construction method that considers this network congestion.  ...  Therefore, an ad hoc intrusion detection architecture is needed for wireless networks.  ... 
doi:10.1155/2012/582139 fatcat:3oc5p2jdbnherhsjvdgy6yrmzy

Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou, Driss Aboutajdine
2015 Journal of Computer Networks and Communications  
The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest.  ...  We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance.  ...  Intrusion Detection Model in a Homogeneous Wireless Sensor Network Intrusion detection in wireless sensor networks is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers  ... 
doi:10.1155/2015/812613 fatcat:5s64ir5vzve5lgn3b6wb2exhme


Gulbir Singh, Om Prakash Dubey
2018 International Journal of Students Research in Technology & Management  
Selective Forwarding Attack is one of the many security threats in wireless sensor networks which can degrade network performance. An adversary on the transmission path selectively drops the packet.  ...  There is some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on selective forwarding attack.  ...  We present a method for intrusion detection in wireless sensor networks.  ... 
doi:10.18510/ijsrtm.2018.625 fatcat:s5lcf6jwtrgl5fngtxtevt2smm

Comparison and detail study of attacks and detection methods for wireless sensor network

T Karthik Krishnan, S Sridevi, G Bindu, R Anandan
2018 International Journal of Engineering & Technology  
In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes  ...  Wireless sensor network is emanating technology in the field of telecommunications.  ...  Intrusion detection monitors the entire network and generates alarm when there is an intrusion in the network. In this section we describe the architecture of IDS in WSNs.  ... 
doi:10.14419/ijet.v7i2.21.12453 fatcat:fkduevznbvfvval6qrjmqs3dd4

An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks [article]

A. Forootaninia, M. B. Ghaznavi-Ghoushchi
2012 arXiv   pre-print
Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network.  ...  Preserving security and confidentiality in wireless sensor networks (WSN) are crucial.  ...  Most of them have been conducted on intrusion detection techniques.  ... 
arXiv:1208.2079v1 fatcat:ttu4oulpnfg35ikzvzwfut5kfi
« Previous Showing results 1 — 15 out of 13,984 results