Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection in Wireless Sensor Network Based on Mutual Authentication and Access Control based on ECC

B. Vijaya Nirmala, Dr. S. Jeyanthi


Mobile Ad-hoc network, a wireless network mechanism that sounds enormous in recent years. Its increasing growth and popularity maximize the research and development’s attention towards wireless networks. It forms a network with one another and transfers files by forwarding to the nearby nodes still its reaches the destination.  However, the technology is improved the two most critical challenge still exists are intrusion detection and packet duplication. It will lead to privacy breach and packet duplication will leverage the overall system performance. In this work, several existing works were analyzed and explained the effectiveness of proposed scheme implementation towards de-duplication. We propose the combination of the Misuse Based Detection (MBD) method and Mutual Authentication and Access Control based on the ECC algorithm for overcoming the above-mentioned issues. With the collected information, a threshold value is created and the compare operator implements the threshold value operations. By which the MBD will identify the duplicate packets in the network and the implementation of Mutual Authentication and Access Control based on the ECC algorithm enhance the security level.


MANET, File Transferring, Encryption, Decryption, Intrusion Detection.

Full Text:



Sana UllahJan, Saeed Ahmed, Vladimir Shakhov and Insoo Koo, “Toward a Lightweight Intrusion Detection System for the Internet of Things”, 2019.

FeiZhao, Jiyong Zhao , XinxinNiu , ShoushanLuo and Yang Xin ,” A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection”, Appl. Sci, 2018.

F. H. Tseng, H. P. Chiang, and H. C. Chao, “Black hole along with other attacks in MANETs: a survey,” Journal of Information Processing Systems, vol. 14, no. 1, pp. 56–78, 2018.

B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017.

A. Ghosal and S. Halder, “A survey on energy efficient intrusion detection in wireless sensor networks,” Journal of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239–261, 2017.

M. Gunasekaran and S. Periakaruppan, “GA-DoSLD: genetic algorithm based denial-of-sleep attack detection in WSN,” Security and Communication Networks, vol. 2017, Article ID 9863032, 10 pages, 2017.

Q. Shi, L. Qin, L. Song, R. Zhang, and Y. Jia, “A dynamic programming model for internal attack detection in wireless sensor networks,” Discrete Dynamics in Nature and Society, vol. 2017, Article ID 5743801, 9 pages, 2017.

X. Xiao and R. Zhang, “Study of immune-based intrusion detection technology in wireless sensor networks,” Arabian Journal for Science and Engineering, vol. 42, no. 8, pp. 3159–3174, 2017.

Kalnoor, G.; Agarkhed, J. Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks. Proc. Comput. Sci. 2018,125, 187–193.

Lu, T.; Liu, G.; Chang, S. Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network. Wirel.Netw. 2018, 24, 611–625.

Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of- trust model for public-key authentication in MANET. Computer Communications, 63, 24–39.

Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3),158–164.

Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sen- sor networks in internet of things environments. Journal of Net- work and Computer Applications, 103, 194–204.

Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–5), Las Vegas, NV.

Yi Yang; Hai-Qing Xu; Lei Gao; Yu-Bo Yuan; Kieran McLaughlin; Sakir Sezer, Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks, IEEE Transactions on Power Delivery ( Volume: 32, Issue: 2, April 2017), Page(s): 1068 – 1078, 26 August 2016

D. Sadhukhan, S. RayCryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication, 2018 4th International Conference on Recent Advances in Information Technology (RAIT), IEEE (2018), pp. 1-6

Farash Mohammad Sabzinejad, Kumari Saru, Bakhtiari Majid (2016) Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimed Tools Appl 75(8):4485–4504

Liao Y-P, Hsiao C-M (2012) A secure ECC-based RFID authentication scheme using hybrid protocols. In: Proceedings of the International Computer Symposium ICS 2012-Advances in Intelligent Systems and Applications, vol 2. Springer, pp 1–13


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.