An Implementation Approach for Intrusion Detection System in Wireless sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. In this paper we have made an effort to document related issues and challenges of intrusion detection system for wireless sensor network and proposed a novel secure strategy for their mplementation that can detect possible intrusion in the network, alerting user after intrusion had been detected and reconfigure the network if possible.
Authors and Affiliations
Ruchi Bhatnagar , Dr. A. K. Srivastava , Anupriya Sharma
Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET
An ad-hoc network is self-organizing and adaptive. Networks are formed on-the-fly, devices can leave and join the network during its lifetime, devices can be mobile within the network, the network as a whole may be mobil...
A Comparative Study of Public Key Cryptosystem based on ECC and RSA
The paper gives an introduction to the public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The main emphasize is on some public key algorithms such as RSA and...
Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
This paper discusses the effective coding of Rijndael algorithm, Advanced Encryption Standard (AES) in Hardware Description Language, Verilog. In this work we analyze the structure and design of new AES, following three...
Effect of Optical Pulse Shape on the Performance of OCDMA in Presence of GVD and Pulse Linear Chirp
In this paper, the effect of optical pulse shape on the performance of direct sequence optical code division multiple access in presence of fiber group velocity dispersion (GVD) and pulse linear chirp is analyzed. In our...
A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network
In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like sourc...