Probabilistic Model for Single and Multi-Sensing Intrusion Detection in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected (anomalous) moving object(attacker) within the reach of a Wireless Sensor Network area is referred to as intrusion detection. In this paper, we propose an algorithm to detect the intruder by the cluster heads in a 2D and 3D homogeneous Wireless Sensor Networks. This algorithm overcomes the attacks on implementation and also, reduces the energy consumption. The proposed algorithm considers Single Sensing and Multi-Sensing Intrusion Detection using minimum number of sensor nodes and a probabilistic model has been developed for both 2D and 3D homogeneous networks. Simulation results show that the power analysis attack and energy consumption is minimized by activating only few sensor nodes for detection and using only few sensor nodes for processing of data. The performance of the proposed algorithm is better compared to using all the sensor nodes for detection where the energy consumption is more.
Authors and Affiliations
Shaila K
Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors
Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...
IOT Based Coal Mine Safety Monitoring and Control Automation
In this paper we are organizing an IoT (Internet of Things) screen, a safety efforts for excavators which is most basic in underground mining domains. In this undertaking, the system is build using particular sensors sor...
Artificial Neural Network To Detect Know And Unknown DDOS Attack
The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely contro...
Protocols for detection of node replication attack on wireless sensor network
Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These a...
Image Denoising with Wavelet Based Thresholding
Abstract: Image processing is a field that continues to grow, with new applications being developed at an ever increasing pace. Image Denoising is an important part of image processing and computer vision problems. The...