CFP last date
20 May 2024
Reseach Article

An Effective Hierarchical IDS for Wireless Sensor Networks

by Amar Saraswat, Vishal Bharti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 1
Year of Publication: 2013
Authors: Amar Saraswat, Vishal Bharti
10.5120/13453-1080

Amar Saraswat, Vishal Bharti . An Effective Hierarchical IDS for Wireless Sensor Networks. International Journal of Computer Applications. 78, 1 ( September 2013), 21-24. DOI=10.5120/13453-1080

@article{ 10.5120/13453-1080,
author = { Amar Saraswat, Vishal Bharti },
title = { An Effective Hierarchical IDS for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 1 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number1/13453-1080/ },
doi = { 10.5120/13453-1080 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:30.831860+05:30
%A Amar Saraswat
%A Vishal Bharti
%T An Effective Hierarchical IDS for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 1
%P 21-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper emphasizes on safeguarding the hierarchical structure in wireless sensor network by presenting an Intrusion Detection Technique, which is very useful, simple and works effectively in improving and enhancing the security in wireless sensor Network. This IDS works on the combination of anomaly detection algorithm and intrusion detection nodes. Here all the features and numerous architectures of popular IDS(s) along with their confines and benefits are also being described.

References
  1. X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," IEEE Communication Surveys & Tutorials, vol. 11, no. 2, June 2009, pp. 52-73.
  2. Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon, "AC-PKI: anonymous and certificateless public-key infrastructure for mobile adhoc networks," 40th IEEE International Conference on Communications, May 2005, pp. 3515-3519.
  3. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Communications, vol. 11, no. 1, 2004, pp. 48-60.
  4. Jing Deng, Richard Han, Shivakant Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, July 2005,pp. 216-217
  5. ZENG Xia-ling,LIANG Yan-zhao,PENG Ya-li,YU Min,Cluster-Based Intrusion Detection System for Wireless Sensor Network,Microelectronics and Computer,June 2008,156-163.
  6. Bo Sun And Lawrence Osborne, Lamar University Yang Xiao, The University Of Alabama Sghaier Guizani, University Of Quebec At Trois-Rivieres "Intrusion Detection Techniques In Mobile Ad Hoc And Wireless Sensor Networks"
  7. Li Gang, Study on intrusion detection for wireless sensor network,China computer&Network,2009,pp. 535.
  8. Liu ning,FAN Xin-li,ZHAO Jian-hua, An Intrusion Detection System Model for Wireless Sensor, Journal of SouthwestUniversity of Science
  9. Zhou Xian-wei, Wireless sensor network and security,Bei jing, National Defense Industry Press,2007,pp. 178-188
  10. WANG Ying, LI Guorui, A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks, CHINESE JOURNAL OF SENSORS AND ACTUATORS, Jun. 2009,pp. 879-881
  11. YANG L i-bin, MU De-jun, CAI Xiao-yan, Study on intrusion detection for wireless sensor network, Nov. 2008,pp. 3204-3207.
  12. Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami. Intrusion Detection for Routing Attacks in Sensor Networks, International Journal of Distributed Sensor Networks, Volume 2, Issue 4 December 2006 , pages 313 - 332 DOI: 10. 1080/15501320600692044
  13. S. Doumit and D. P. Agrawal,"Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network", MILCOM 2003 - IEEE Military Communications Conference, vol. 22, no. 1, pp. 609-614, 2003
  14. A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks: A noncooperative game approach", in 3rd IEEE International Symposium on Network Computing and Applications, (NCA 2004), Boston, MA, August 2004, pp. 343346.
  15. Lei Li, Yan-hui Li, Dong-yang Fu, Ming Wan,"Intrusion detection model based on hierarchical structure in Wireless sensor networks" 2010 International Conference on Electrical and Control Engineering.
  16. V. Bhuse, A. Gupta, "Anomaly intrusion detection in wireless sensor network" Journal of High Speed Networks, Volume 15, Issue 1, pp 33-51, Jan 2006
  17. FZhang, Y. and Lee W "Intrusion detection in Wireless Ad hoc Networks", The 6th annual international conference on Mobile computing and networking, Boston MA, Aug 2000. PP:275-283
  18. Rodrigo Roman, Jianying Zhou , Javier Lopez, "Applying Intrusion Detection Systems to wireless sensor networks ",Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE, 8-10 Jan. 2006 Volume: 1, On page(s): 640- 644 ISBN: 1-4244-0085-6
  19. OTran Hoang Hai, Faraz Khan, and Eui-Nam Huh, "Hybrid Intrusion Detection System for Wireless Sensor Network", ICCSA 2007, LNCS 4706, Part II, pp. 383–396, 2007. Springer-Verlag Berlin Heidelberg 2007
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Detection Intrusion Detection Wireless Sensor Network