Evaluation of Intrusion Detection Schemes in Wireless Sensor Network

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2

Abstract

Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environmentand the sensors nodes are fully distributed in nature. In order to communicate with each other a multi hop communication should be used. Moreover, WSNs have limitations in terms of computations, memory, bandwidth, and energy. The distributed nature, multi hop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. IDS is capable to detect an intrusion and raise an alarm for appropriate responses. The aim of this paper is to provide a detailed review about current IDS schemes for WSN. Finally we focus on comparison of recent Intrusion Detection Schemes in WSNs.

Authors and Affiliations

Ishu Gupta , Kishu Gupta

Keywords

Related Articles

Simulating ECA-AODV Routing Scheme using TCP for MANETs

ECA model checks different resource constraints before constructing the path. This will ensure long time connectivity between source and destination nodes. TCP model will provide reliable data transfer between source nod...

 Image Based Relational Database Watermarking: A Survey

 Abstract: In past few years relational databases watermarking has emerged a great topic for research becauseof increase in use of relational databases. The basic need for relational database watermarking is to prev...

FEQRP: a Fuzzy based Energy-efficient and QoS Routing Protocol over WSNs

Abstract: In this paper, an energy efficient and QoS routing protocol; named Fuzzy based Energy-efficient and QoS Routing protocol (FEQRP) for wireless sensor networks; is proposed to extend the life time of the network....

 Enhanced Message Digest Version 5 Architecture for Secure Hashing

 Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...

 Cryptanalysis and Security Enhancement of a Khan et al.'sScheme

 Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplys...

Download PDF file
  • EP ID EP164509
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Ishu Gupta, Kishu Gupta (2016). Evaluation of Intrusion Detection Schemes in Wireless Sensor Network. IOSR Journals (IOSR Journal of Computer Engineering), 18(2), 60-63. https://europub.co.uk/articles/-A-164509