Evaluation of Intrusion Detection Schemes in Wireless Sensor Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environmentand the sensors nodes are fully distributed in nature. In order to communicate with each other a multi hop communication should be used. Moreover, WSNs have limitations in terms of computations, memory, bandwidth, and energy. The distributed nature, multi hop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. IDS is capable to detect an intrusion and raise an alarm for appropriate responses. The aim of this paper is to provide a detailed review about current IDS schemes for WSN. Finally we focus on comparison of recent Intrusion Detection Schemes in WSNs.
Authors and Affiliations
Ishu Gupta , Kishu Gupta
Implementing bigdata analytics for small and medium enterprise (SME) regional growth
Abstract: In all economies, especially in developing and transition economies, there is now a consensus among state policy makers, development economists as well as international development partners that small andmedium...
Comprehensive Review: Intrusion Detection System and Techniques
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there i...
Comparative Analysis of Different Types of Full Adder Circuits
The Full Adder circuit is an important component in application such as Digital Signal Processing (DSP) architecture, microprocessor, and microcontroller and data processing units. This paper discusses the ev...
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch &nbs...
Smart Car Collision Avoidance System
Abstract: In this paper we demonstrate the potential usage of vehicle to vehicle communication(V2V) to reduce the number of road accidents caused due to over taking of vehicles. The system will operate by transferring da...