Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection System for a Cluster Based WSN

C. Ashitha, Saju P. John, Serin V. Simpson

Abstract


Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks. Hence security is very important for various WSN applications. Most of the energy efficient routing protocols for WSN are hierarchical or cluster-based routing protocol. The important concern of routing protocols of WSNs is to balance the energy consumption as well as maintaining the security level. Many secure cluster-based routing protocols have been proposed to achieve the above concern. In this paper, an intrusion detection system in a clustered network model is proposed, that addresses the problem of performance and security of existing protocols in WSN. It makes use of the concept of clustering architecture of WSN, key management techniques, and trust computation methods.


Keywords


Wireless Sensor Network, Intrusion Detection System, Clustering, Key Management, Trust Computation.

Full Text:

PDF

References


F. Akyildiz, W.Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless Sensor Networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, Mar 2002

S. Md Zin N. B. Anuar, L. M. Kiah and A. S. K. Pathan, “Routing protocol design for secure WSN: Review and open research issues,” Journal of Network and Computer Applications, Vol.41, pp. 517–530, May 2014.

X. Liu, A Survey on Clustering Routing Protocols in Wireless Sensor Networks, Sensors 2012.

J. Jabez, Dr. B. Muthukumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach, In International Conference on Intelligent Computing, Communication & Convergence, pp. 338 – 346, 2015.

Siva Ram Murthy and B.S. Manoj, “Ad Hoc Wireless Networks (Chapter 07)”, Pearson, 2007.

L. M. C. Arboleda, N. Nasser, “Comparison of Clustering Algorithms and Protocols for Wireless Sensor Networks”, In Proceedings of Sixth IEEE Canadian Conference on Electrical and Computer Engineering, pp. 1787–1792, May 2006.

A. Kemal and M. Younis, “A survey on routing protocols for wireless sensor networks”, International Journals on Ad-hoc Networks, vol. 3, pp. 325-349, Nov 2003.

R. Azarderakhsh, A. Reyhani-Masoleh, and Z. E. Abid, “A Key Management Scheme for Cluster Based Wireless Sensor Networks,” In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Vol.2, pp. 222 – 227, Dec 2008.

L. Dongjiang, W. Yandan, and C. Hong, “The Research on Key Generation in RSA Public-Key Cryptosystem”, In Proceedings of Fourth International Conference on Computational and Information Sciences, pp. 578 - 580, Aug 2012.

H. Xia, Z. Jia, X. Li, L. Ju, Edwin H, and E. M. Sha, “Trust prediction and trust-based secure routing in mobile ad hoc networks,” Ad Hoc Networks, pp. 2096-2114, 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.