CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks

Published on May 2012 by Ajay Gautam, Ritu, Naveen Sharma
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 6
May 2012
Authors: Ajay Gautam, Ritu, Naveen Sharma
12d88995-ae03-45f5-a26c-a2069a7bdcac

Ajay Gautam, Ritu, Naveen Sharma . Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 6 (May 2012), 21-25.

@article{
author = { Ajay Gautam, Ritu, Naveen Sharma },
title = { Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 6 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/rtmc/number6/6662-1045/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Ajay Gautam
%A Ritu
%A Naveen Sharma
%T Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 6
%P 21-25
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless Sensor Network (WSN) is a new computing paradigm that emerged from the fusion of the SCADA systems and Ad hoc networks technologies. WSN derives the networking characteristics of ad-hoc network and combines it with the hardware facilities of tiny wireless sensors. Once a sufficient number of nodes have been deployed, the sensor network can be used to fulfill its task, such as measuring the physical variables. This task can be issued and supervised by an external entity connected to the WSN, such as manager or supervisor. Due to insecure nature of the wireless link and the dynamically changing topology, wireless ad-hoc networks require a careful and security oriented approach for designing protocols. Also any node can join or leave the network at any time. This is security breach as the joining node can be a malicious node and can have unwilling effects on the network performance. So it is very important to authenticate the joining nodes from the establishment of the network. Cluster based architecture is used because it is easily manageable and more secure than other architectures. In cluster based architectures gateways are used for inter cluster communication. The aim of this article to proposes the new cluster base security architecture which starts from the initialization of the network.

References
  1. E. Guillen, D. Padilla, and Y. Colorado, "based Intrusion Detection and Prevention Systems," Latin-American Conference Communications, 2009, pp.
  2. T. Ghorbani, A. A. , Lu, W. , Network Intrusion Detection and Prevention: Concepts and Technique, Springer, 2009. . .
  3. T. Dutkevych, A. Piskozub, and N. Tymoshyk, "Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks," IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems Technology and Application, 2007, pp. 599-602.
  4. E. E. Schultz and E. Ray, "Future of Intrusion Prevention," Computer Fraud & Security, 2007, pp. 11-13.
  5. H. S. Rhee, C. Kim, and Y. U. Ryu, "Self-efficacy in information security: Its influence on end users' information security practice behavior," Journal Computer & Security, vol. 28, 2009, pp. 816-826.
  6. V. Frias-martinez, J. Sherrick, S. J. Stolfo, and A. D. Keromytis, "A Network Access Control Mechanism Based on Behavior Profiles," Annual Computer Security Applications Conference, 2009, pp. 3-12.
  7. W. Kim, O. K. Jeong, and S. W. Lee, "On social Web sites," Journal of Information Systems, vol. 35, 2010, pp. 215-236.
  8. C. Y. Wang, S. -cho T. Chou, and H. -ching Chang, "Emotion and Motivation: Understanding User Behavior of Web 2. 0 Applications," IEEE Computer Society Seventh Annual Commnucation Networks and Services Research Conference, 2009, pp. 1341-1346.
  9. S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing, vol. 10, 2010, pp. 1-35.
  10. A. D. Todd, R. A. Raines, R. O. Baldwin, B. E. Mullins, and S. K. Rogers, "Alert Verification Evasion Through Server Response Forging," Alert Verification Evaluation Through Server Response Forging, LNCS, vol. 4637/2007, 2007, pp. 256-275.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (wsn)