CFP last date
20 May 2024
Reseach Article

A Survey on Intrusion Detection Techniques in Wireless Sensor Networks

Published on June 2015 by Swati Kasar, Trupti Wagh
National Conference on Emerging Trends in Advanced Communication Technologies
Foundation of Computer Science USA
NCETACT2015 - Number 1
June 2015
Authors: Swati Kasar, Trupti Wagh
d6650921-dc7a-478c-bf02-7182da7a24a5

Swati Kasar, Trupti Wagh . A Survey on Intrusion Detection Techniques in Wireless Sensor Networks. National Conference on Emerging Trends in Advanced Communication Technologies. NCETACT2015, 1 (June 2015), 1-3.

@article{
author = { Swati Kasar, Trupti Wagh },
title = { A Survey on Intrusion Detection Techniques in Wireless Sensor Networks },
journal = { National Conference on Emerging Trends in Advanced Communication Technologies },
issue_date = { June 2015 },
volume = { NCETACT2015 },
number = { 1 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/ncetact2015/number1/20976-2001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Advanced Communication Technologies
%A Swati Kasar
%A Trupti Wagh
%T A Survey on Intrusion Detection Techniques in Wireless Sensor Networks
%J National Conference on Emerging Trends in Advanced Communication Technologies
%@ 0975-8887
%V NCETACT2015
%N 1
%P 1-3
%D 2015
%I International Journal of Computer Applications
Abstract

This paper discuss various techniques of intrusion detection in wireless sensor networks available. This paper gives an introduction to wireless sensor networks, security in WSN and describe various techniques used to overcome attacks. The prevention techniques according to the network structure of WSN and a convenient method of intrusion detection and prevention in wireless sensor networks are studied in this paper. Thus, the papers main aim is to include the most recent advancements in this area as well as to predict the future course of research so that the general as well as expert readers could be greatly benefited.

References
  1. Abduvaliyev, A. ; Pathan, A. -S. K. ; Jianying Zhou; Roman, R. ; Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks," Communications Surveys & Tutorials, IEEE , vol. 15, no. 3, pp. 1223,1237, Third Quarter 2013
  2. Research Article Intrusion Detection Systems in Wireless Sensor Networks: A Review Nabil Ali Alrajeh, S. Khan, and Bilal Shams, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 167575.
  3. Intrusion Detection and Security Mechanisms for Wireless Sensor Networks S. Khan, Jaime Lloret, and Jonathan Loo, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 747483
  4. Soo Young Moon; Ji Won Kim; Tae Ho Cho, "An energy-efficient routing method with intrusion detection and prevention for wireless sensor networks," Advanced Communication Technology (ICACT), 2014 16th International Conference on , vol. , no. , pp. 467,470, 16-19 Feb. 2014
  5. Karlof, C. ; Wagner, D. , "Secure routing in wireless sensor networks: attacks and countermeasures," Sensor Network Protocols and Applications, 2003. Proceedings of the first IEEE. 2003 IEEE International Workshop on, vol. , no. , pp. 113,127, 11 May 2003
  6. Yih-Chun Hu; Perrig, A. ; Johnson, D. B. , "Packet leashes: a defense against wormhole attacks in wireless networks," INFOCOM 2003. Twenty-Second Annual Joint Conferences of the IEEE Computer and Communications. IEEE Societies, vol. 3, no. , pp. 1976,1986 vol. 3, 30 March-3 April 2003
  7. Khalil, I. ; Bagchi, S. ; Shroff, N. B. , "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, vol. , no. , pp. 612,621, 28 June-1 July 2005
  8. B. Xiao, B. Yu and C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks", published in IEEE journal of Parallel and distributed computing, Vol. 67, No. 11, pp. 1218-1230, 2007.
  9. J. Deng, R. Han and S. Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks", published in international conference of Computer communication, Vol. 29, No. 2, pp 216-230, 2006.
  10. Fan Ye; Haiyun Luo; Songwu Lu; Lixia Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on , vol. 23, no. 4, pp. 839,850, April 2005
  11. Akyildiz, I. F. Weilian Su; Sankarasubramaniam, Y. Cayirci, E, "A survey on sensor networks," Communications Magazine, IEEE , vol. 40, no. 8, pp. 102,114, Aug 2002
  12. Butun I, Morgera, S. D, Sankar R, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 266,282, First Quarter 2014
  13. Bashir, U. ; Chachoo, M. , "Intrusion detection and prevention system: Challenges & opportunities," Computing for Sustainable Global Development (INDIACom), 2014 International Conference on , vol. , no. , pp. 806,809, 5-7 March 2014
  14. Roman, R. ; Jianying Zhou; Lopez, J. , "Applying intrusion detection systems to wireless sensor networks," Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE , vol. 1, no. , pp. 640,644, 8-10 Jan. 2006
  15. Techateerawat, P. ; Jennings, A. , "Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks," Web Intelligence and Intelligent Agent Technology Workshops, 2006. WI-IAT 2006 Workshops. 2006 IEEE/WIC/ACM International Conference on , vol. , no. , pp. 227,230, 18-22 Dec. 2006
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Intrusion Detection.