Open Access   Article Go Back

Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network

S. Jawahar1 , J. Adamkani2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 428-435, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.428435

Online published on Oct 31, 2018

Copyright © S. Jawahar, J. Adamkani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Jawahar, J. Adamkani, “Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.428-435, 2018.

MLA Style Citation: S. Jawahar, J. Adamkani "Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 6.10 (2018): 428-435.

APA Style Citation: S. Jawahar, J. Adamkani, (2018). Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 6(10), 428-435.

BibTex Style Citation:
@article{Jawahar_2018,
author = {S. Jawahar, J. Adamkani},
title = {Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {428-435},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3042},
doi = {https://doi.org/10.26438/ijcse/v6i10.428435}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.428435}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3042
TI - Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - S. Jawahar, J. Adamkani
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 428-435
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
309 372 downloads 108 downloads
  
  
           

Abstract

Wireless Sensor Network (WSN) are the emerging and challenging technology with low processing and battery power. Security becomes a major issue in WSN; because of its wireless nature it is prone to various types of attacks and losing of data packet. Secure routing is important to avoid this type of issues. They are many techniques are available to provide secure routing to WSN. In the proposed work, our main aim is to find the trusted node and routing is done through the node to provide secure routing. The trusted node is identified by using Hidden Markov model (HMM) and it is rated. And also giving the un trusted node a chance to relay prove its identity. It provides the security features with minimum overhead and energy efficiency. The performance of proposed approach is illustrated that proposed model performs effectively compared with other existing approaches. Results demonstrated that developed HMM with trusted node provides significant performance in terms of memory overhead, delay, and Packet delivery ratio and energy consumption.

Key-Words / Index Term

WSN, HMM, Trusted Node, Attacks, Routing, Intrusion Detection System

References

[1]. Chong, C. Y., & Kumar, S. P. (2003). Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8), 1247-1256.
[2]. Perrig, A., Stankovic, J., & Wagner, D. (2004). security in wireless sensor networks” communications of the ACM, vol. 47, no. 6.
[3]. Mourabit, Y. E., Toumanari, A., Bouirden, A., Zougagh, H., & Latif, R. (2014, November). Intrusion detection system in Wireless Sensor Network based on mobile agent. In Complex Systems (WCCS), 2014 Second World Conference on (pp. 248-251). IEEE.
[4]. Ning, P., Cui, Y., & Reeves, D. S. (2002, November). Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 245-254). ACM.
[5]. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks.
[6]. Shanthi, S., & Rajan, E. G. (2016, October). Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks. In Next Generation Computing Technologies (NGCT), 2016 2nd International Conference on (pp. 426-431). IEEE.
[7]. 7. Panigrahi, R., Sharma, K., & Ghose, M. K. (2013). Wireless Sensor Networks–Architecture, Security Requirements, Security Threats and its Countermeasures. CS & IT-CSCP, AIRCC Publishing Corporation.
[8]. 8. Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[9]. 9. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks.
[10]. 10 . Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks. John Wiley & Sons.
[11]. 11. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. computer, 35(10), 54-62.
[12]. 12. Zhang, Y., Liu, W., & Lou, W. (2005, March). Anonymous communications in mobile ad hoc networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 3, pp. 1940-1951). IEEE.
[13]. 13. Boukerche, A., El-Khatib, K., Xu, L., & Korba, L. (2004, October). A novel solution for achieving anonymity in wireless ad hoc networks. In Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp. 30-38). ACM.
[14]. 14. Jiang, J. R., Sheu, J. P., Tu, C., & Wu, J. W. (2011). An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. J. Inf. Sci. Eng., 27(2), 657-680.
[15]. 15. Chen, C. W., & Tsai, Y. R. (2011). Location privacy in unattended wireless sensor networks upon the requirement of data survivability. IEEE Journal on Selected Areas in Communications, 29(7), 1480-1490.
[16]. 16. Acharya, U., & Younis, M. (2010). Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks, 8(8), 791-809.
[17]. 17. Huang, D. (2006, November). On measuring anonymity for wireless mobile ad-hoc networks. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on (pp. 779-786). IEEE.
[18]. 18. Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing, 11(2), 320-336.
[19]. 19. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer communications, 30(14), 2826-2841.
[20]. 20. Afsar, M. M., & Tayarani-N, M. H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198-226.
[21]. 21. Alsemairi, S., & Younis, M. (2015, December). Clustering-Based Mitigation of Anonymity Attacks in Wireless Sensor Networks. In Global Communications Conference (GLOBECOM), 2015 IEEE (pp. 1-7). IEEE.
[22]. 22. Panigrahi, R., Sharma, K., & Ghose, M. K. (2013). Wireless Sensor Networks–Architecture, Security Requirements, Security Threats and its Countermeasures. CS & IT-CSCP, AIRCC Publishing Corporation.
[23]. 23. Duhan, S., & Khandnor, P. (2016, March). Intrusion detection system in wireless sensor networks: A comprehensive review. In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on (pp. 2707-2713). IEEE.
[24]. 24. Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2007, July). Intrusion detection of sinkhole attacks in wireless sensor networks. In International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (pp. 150-161). Springer Berlin Heidelberg.
[25]. 25. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review. International Journal of Distributed Sensor Networks.
[26]. 26. Anagha S. Anand, V. S. Anitha Implementation and Analysis of k-Barrier Coverage in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering Vol-6, Special Issue-6, July 2018.
[27]. 27. H. Kaur , K. Kaur Review Paper on Cryptography Algorithms Used in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering Vol-6, Issue-8, Aug 2018.