CFP last date
20 May 2024
Reseach Article

Wireless Sensor Network based: Design Principles & measuring performance of IDS

by Kamaljit Kaur, Bhupinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 28
Year of Publication: 2010
Authors: Kamaljit Kaur, Bhupinder Singh
10.5120/597-148

Kamaljit Kaur, Bhupinder Singh . Wireless Sensor Network based: Design Principles & measuring performance of IDS. International Journal of Computer Applications. 1, 28 ( February 2010), 81-85. DOI=10.5120/597-148

@article{ 10.5120/597-148,
author = { Kamaljit Kaur, Bhupinder Singh },
title = { Wireless Sensor Network based: Design Principles & measuring performance of IDS },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 28 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 81-85 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number28/597-148/ },
doi = { 10.5120/597-148 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:43:13.124437+05:30
%A Kamaljit Kaur
%A Bhupinder Singh
%T Wireless Sensor Network based: Design Principles & measuring performance of IDS
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 28
%P 81-85
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because, deployed in open and unprotected environment. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages to the network, the intrusion detection system (IDS) can acquire information related to the attack techniques, helping in the development of prevention systems. So it is necessary to use effective mechanisms to protect sensor networks against many types of attacks. Intrusion detection system is one of the major and efficient defensive method against attacks on wireless sensor network. Because of different characteristics of sensor networks, security solutions have to be designed with limited usage of computation and resources. In this paper different Intrusion detection systems are analyzed basis on design and performance in real time wireless sensor network environment.

References
  1. [1.]Sheng-Tzong Cheng; Szu-YunLi; Chia-Mei Chen, “Distributed Detection in Wireless Sensor Networks”, Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, pp.401 – 406, 2008.
  2. [2.]Martynov, D. Roman, J. Vaidya, S, “Design and implementation of an intrusion detection system for wireless sensor networks”, Electro/Information Technology, 2007 IEEE International Conference on , Chicago, pp507 – 512, 2007.
  3. [3.]V. Bhuse and A. Gupta, “Anomaly intrusion detection in wireless sensor networks,” Journal of High Speed Networks, vol. 15, no. 1, pp. 33–51, 2006.
  4. [4.]Shaikh, R.A.; Jameel, H.; d'Auriol, B.J.; Sungyoung Lee; Young-Jae Song; Heejo Lee,“Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks”, Young Computer Scientists, 2008. The 9th International Conference, pp2038-2043. 2008.
  5. [5.]W. Du, L. Fang, and N. Peng., “ LAD: Localization Anomaly Detection For Wireless Sensor Network.”, Journal of Parallel and Distributed Computing, 66:874–886, 2006.
  6. [6.]Chatzigiannakis, I.; Strikos, “A Decentralized Intrusion Detection System For Increasing Security Of Wireless Sensor Networks” A. Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference , pp1408 – 1411, 2007
  7. [7.]Langendorfer, P.; Grilo, A.; Piotrowski, K.; Casaca , “A Wireless Sensor Network Reliable Architecture for Intrusion Detection” A Next Generation Internet Networks, pp189 – 194, 2008
  8. [8.]Roman, R. Jianying Zhou Lopez, J., “Applying Intrusion Detection Systems To Wireless Sensor Networks” 3rd IEEE Consumer Communications and Networking Conference, Vol. 1, pp640- 644, 2006.
  9. [9.]Sutharshan Rajasegarar; Christopher Leckie; Marimuthu Palaniswami; James C. Bezdek, “ Distributed Anomaly Detection in Wireless Sensor Networks”, 10th IEEE Singapore International Conference on Communication systems, pp1 – 5, 2006.
  10. [10.]S Banerjee, C Grosan, A Abraham, “ IDEAS: Intrusion Detection Based On Emotional Ants For Sensors “, Proceedings. 5th International Conference on Intelligent Systems Design and Applications, pp. 344-349, 2005
  11. [11.]Qingchun Ren; Qilian Liang, “Secure Media Access Control (MAC) In Wireless Sensor Networks: Intrusion Detections And Countermeasures”,15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 4, pp 3025 – 3029, 2004.
  12. [12.]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou, “LIDeA: A Distributed Lightweight Intrusion Detection Architecture For Sensor Networks”, Proceedings of the 4th international conference on Security and privacy in communication networks, 2008.
  13. [13.] Q. Zhang, T. Yu, and P. Ning., “A Framework For Identifying Compromised Nodes In Wireless Sensor Networks.”, ACM Trans. Inf. Syst. Secur., pp1–37, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network (WSN) Performance of IDS Intrusion detection Defensive method