Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Intrusion Detection System in Wireless Sensor Networks- A Survey

Author : Asha R N 1 Dr. Venkatesan S 2

Date of Publication :17th May 2017

Abstract: Wireless Sensor Networks (WSNs) are highly distributed networks of tiny, light-weight wireless nodes, placed in large numbers to monitor the environment or system. Monitoring the system involves the measurement of physical parameters such as temperature, pressure, relative humidity and co-operatively passing their data to the main node called sink. Intrusion Detection is one of the major and efficient method against attacks. Intrusion Detection Systems can act as a line of defence and it provides security primitives to prevent attacks. IDS uses misuse-based and anomaly-based detection techniques. This paper discuss different approaches of IDS

Reference :

    1. Ana Paula R. da Silva,Marcelo H.T. Martins,Bruno P.S. Rocha,Antonio A.F. Loureiro,Linnyer B. Ruiz,Hao Chi Wong,―DecentralizedIntrusion Detection in Wireless Sensor Networks’’, Q2SWinet’05 Montreal, Quebec, Canada, , October 13, 2005.
    2. Djallel Eddine Boubiche1 and Azeddine Bilami, ―Cross Layer Intrusion Detection System For Wireless Sensor Network‖, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012.
    3. Kaliyamurthie K. P. and Dr. R. M. Suresh, ―Artificial Intelligence Technique Applied to Intrusion Detection‖, International Journal of Computer Science and Telecommunications Volume 3, Issue 4, April 2012.
    4. Luigi Coppolino ,Salvatore D’Antonio, Alessia Garofalo, Luigi Romano―Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks’’ Eighth Inernational Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013.
    5. Manasi Gyanchandani, J.L.Rana, R.N.Yadav, ―Taxonomy of Anomaly Based Intrusion Detection System: A Review ―, International Journal of Scientific and Research Publications, Volume 2, Issue 12, 1 ISSN 2250-3153, December 2012.
    6. Prabhakaran Kasinathan, Claudio Pastrone, Maurizio A. Spirito, Mark Vinkovits, ―Denial-of-Service detection in 6LoWPAN based Internet of Things‖, IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013.
    7. Shun-Sheng Wang, Kuo-Qin Yan , Shu-Ching Wang , Chia-Wei Liu, ―An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks’’, Expert Systems with Applications 38 15234– 15243, 2011.
    8. Vokorokos L., A.Balaz and J.Trelova, ― Distributed Intrusion Detection System Self Organizing Map‖, INES 2012-IEEE 16th International Conference on Intelligent Engineering Systems, Lisbon, Portugal- June 13–15, 2012.
    9. Yan K.Q., S.C. Wang, C.W. Liu, ―A Hybrid Intrusion Detection System of Cluster based Wireless Sensor Networks‖, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, Hong Kong, March 18 20,2009.
    10. Anand,S.Ganapathy,P.Yogesh,A.Kannan,‖A Rule Based Approach for Attribute Selection and Intrusion Detection in Wireless Sensor Networks‖,Procedia Engineering 38 1658— 1664,20

Recent Article