ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intrusion Detection System in Wireless Sensor Networks

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 7)

Publication Date:

Authors : ;

Page : 1052-1058

Keywords : IDS; WSN; Malicious node; Blackhole; selective forwarding;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless sensor nodes have wide range of applications like monitoring data to surveillance, healthcare to agriculture etc. . In all these above monitoring system there is no any physical line of defense against data hacking and to stop malicious nodes, data stealing or destroying. So Intrusion Detection System (IDS) protects data from malicious nodes. In this paper we study to implement Intrusion Detection in sensor networks and propose a scheme that can be applied to such networks. Its basic concept is that nodes monitor their adjacent node and cooperate with their nearest neighbors to make the network back to its normal operational condition. We start in a simple approach in which, even though nodes don't have a global view, they can still detect an intrusion. We apply our design principles for the black hole and selective forwarding attacks by defining appropriate rules that characterize malicious behavior.

Last modified: 2021-06-30 21:50:52