Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Detection of Malicious Node in Wireless Sensor Networks - A Survey

Author : Asha R N 1 Jyothi R 2 Kiran Kumar K 3

Date of Publication :7th June 2016

Abstract: Wireless sensor network becomes popular both in civil and jobs in military. WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected and low computation resources so each node is weak entity, that software inside the network As security mechanism is not enough to sensor network from external attacks, introduction of intrusion detection system is needed. Many mission critical wireless sensor networks require an lightweight, efficient and flexible intrusion detection algorithm to identify malicious attackers. Intrusion detection in a wireless sensor network is of significant importance in many applications to detect malicious or unexpected intruder(s). The intruder can be an enemy in a war field or an unusual environmental change in a chemical or any industry etc. Our intrusion detection system is based on specific detection rules.

Reference :

    1. Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation, Idris M Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su The Symposium on Simulation of Systems Security (SSSS’08), Ottawa, Canada, April 14 –17, 2008, pp. 836-843.
    2. Ant Colony based Approach for Intrusion Detection on Cluster Heads in WSN Harshal A Arolkar, Shraddha P Sheth, Vaidehi P Tamhane, International Conference on Communication, Computing & Security ICCCS’11, February 12–14, 2011, Rourkela, Odisha, India, ACM ISBN: 978-1-4503-0464-1, pp. 523-526
    3. WIDS: A Sensor-Based Online Mining Wireless Intrusion DetectionSystem, C.I. Ezeife, Maxwell Ejelike, A.K. Aggarwal, Proceedings of the 2008 international symposium on Database engineering & applications IDEAS '08, September 10-12, ACM ISBN: 978-1-60558- 188-0, pp. 255-161.
    4. A Simple Agent Based Model for Detecting Abnormal Event Patterns in Distributed Wireless Sensor Networks, Muktikanta Sa, Amiya Kumar Rath, Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM ISBN: 978-1-4503-0464-1, pp. 67-70 .
    5. Trust-Based Intrusion Detection in Wireless Sensor Networks Fenye Bao, Ing-Ray Chen, MoonJeong Chang, Jin-Hee Ch, IEEE International Conference on Communications(ICC), 2011, pp. 1-6
    6. A Weak Hidden Markov Model Based Intrusion Detection Method For Wireless Sensor Networks, Xianfeng Song, Guangxi Chen, Xiaolong Li, International Conference on Intelligent Computing and Integrated Systems(ICISS) 2010, pp. 887-889.
    7. Neighbor-based Intrusion Detection for Wireless Sensor Networks, Andriy Stetsko, Lukas Folkman, Vashek atyas, 6th International Conference on Wireless and Mobile Communications (ICWMC), 2010, pp. 420-425.
    8. A Theoretical Signaling Game Model for Intrusion Detection in Wireless Sensor Networks, Mohsen stiri, Ahmad Khademzadeh, 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2010, pp. 1-6
    9. Hybrid Intrusion Detection System for Enhancing the Security of a Cluster-based Wireless Sensor Network, K Q Yan, S C Wang, S S Wang, C W Liu, 3rd IEEE International Conference on Computer Science and Informational Technology (ICCSIT), 2010, pp.114-118.

Recent Article