CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Integrated Approach of Intrusion Detection System (IAIDS) for Wireless Sensor Networks

Published on December 2013 by Ranjit Panigrahi, Kalpana Sharma, M.k. Ghose
2nd International conference on Computing Communication and Sensor Network 2013
Foundation of Computer Science USA
CCSN2013 - Number 2
December 2013
Authors: Ranjit Panigrahi, Kalpana Sharma, M.k. Ghose
3d5f22fd-ac77-4414-a42f-04154d0accdd

Ranjit Panigrahi, Kalpana Sharma, M.k. Ghose . An Integrated Approach of Intrusion Detection System (IAIDS) for Wireless Sensor Networks. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 2 (December 2013), 5-8.

@article{
author = { Ranjit Panigrahi, Kalpana Sharma, M.k. Ghose },
title = { An Integrated Approach of Intrusion Detection System (IAIDS) for Wireless Sensor Networks },
journal = { 2nd International conference on Computing Communication and Sensor Network 2013 },
issue_date = { December 2013 },
volume = { CCSN2013 },
number = { 2 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/ccsn2013/number2/14760-1318/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd International conference on Computing Communication and Sensor Network 2013
%A Ranjit Panigrahi
%A Kalpana Sharma
%A M.k. Ghose
%T An Integrated Approach of Intrusion Detection System (IAIDS) for Wireless Sensor Networks
%J 2nd International conference on Computing Communication and Sensor Network 2013
%@ 0975-8887
%V CCSN2013
%N 2
%P 5-8
%D 2013
%I International Journal of Computer Applications
Abstract

Intrusion Detection system is one of the major and efficient defensive mechanisms against attacks on Wireless Sensor Networks (WSN). An Integrated Approach of Intrusion Detection System (IAIDS) has been proposed as a defensive mechanism against possible intruders in WSN. In order to get integrated approach, the combined versions of an Packet Verification Module (PVM) and a Packet Analysis Module (PAM) is considered and eventually the performance of the scheme is evaluated by simulating the network. The simulated outcomes are used to show the capability of intrusion detection of the proposed method. In addition, the performance of the proposed system is analyzed in terms of false alarm rate and detection rate.

References
  1. Ranjit Panigrahi, Kalpana Sharma, M. K. Ghose, "Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures", CS & IT-CSCP, AIRCC Publishing Corporation, September 2013
  2. M. Saxena, "Security in Wireless Sensor Networks: A Layer based Classification," Department of Computer Science, Purdue University, https://www. cerias. purdue. edu/apps/ reports_and_papers/view /3106, 2012.
  3. H. H. Soliman, Noha A. Hikal, Nehal A. Sakr,"A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks", Production and hosting by Elsevier, October 2012
  4. S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, "A Comparison of Routing Attacks on Wireless Sensor Networks", International Journal of Information Assurance and Security, Vol. 6, No. 3, pp. 195-215, 2012.
  5. K. Q. Yan, S. C. Wang, S. S. Wang and C. W. Liu, "Hybrid Intrusion Detection System for Enhancing the Security of a Clusterbased Wireless Sensor Network", Chayang University of Technology, Taiwan, IEEE 2011, pp. 114-118
  6. Tzeyoung M. W. , IATAC, "Intrusion Detection Systems," 6th Edition, Information Assurance Tools Report; Aug, 2010
  7. V. Chandala, A. Banerjee and V. Kumar, "Anomaly Detection: A Survey, ACM Computing Surveys," University of Minnesota, September 2010.
  8. K. Q. Yan, S. C. Wang, S. S. Wang and C. W. Liu, "Hybrid Intrusion Detection of Cluster based Wireless Sensor Network", Proceedings of International Multi Conference of Engineers and Computer Scientists , Hong Kong, Vol. 1, 2009.
  9. J. Yick, B. Mukherjee and D. Ghosal, "Wireless Sensor Network Survey," Elsevier's Computer Networks, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10. 1016/j. comnet. 2008. 04. 002
  10. Gowrishankar, S. , Basavaraju, T. G. , Manjaiah, D. H. and Sarkar, S. K. , "Issues in wireless sensor networks", July 2008.
  11. Chong E. , Loo M. , Christopher L. , Marimuthu P. , "Intrusion Detection for Routing Attacks In Sensor Networks," The University of Melbourne, 2008.
  12. W. T. Su, K. M. Chang and Y. H. Kuo, "eHIP: An energy efficient hybrid intrusion prohibition system for cluster based wireless sensor networks," Computer Networks, 51(4), 2007, pp. 1151-1168.
  13. Mary Mathews, Min Song, Sachin Shetty, Rick McKenzie, "Detecting Compromised Nodes in Wireless Sensor Networks", Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007
  14. K. Scarfone and P. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)," NIST 800-94, Feb 2007.
  15. A. Becher, Z. Benenson, and M. Dornseif, "Tampering with motes: Realworld physical attacks on wireless sensor networks," Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC), pp. 104–118, April 2006.
  16. K. Akkaya and M. Younis, "A survey of Routing Protocols in Wireless, Sensor Networks", Elsevier Ad Hoc Network Journal, 2005, pp 325-349.
  17. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey", Computer Networks, 38:393-422, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Wsn Intrusion Detection Intrusion Detection System Ids Iaids Integrated Approach Of Intrusion Detection System.