scholarly journals Implementation of Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

Author(s):  
Manoshri A. Ghawade ◽  
Dr. Sheetal S. Dhande

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.

2010 ◽  
Vol 7 (2) ◽  
pp. 369-380
Author(s):  
M. Vasim Babu

Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications in warfare. Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting intruder .The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers In this paper, I consider the cluster based architecture according to two WSN models: homogeneous and heterogeneous WSN. Furthermore, I derive the detection probability by considering two sensing models: single-sensing detection and multiple-sensing detection. In this Intrusion detection model we are going to track and detect Intrusion in a Homogenous and Heterogeneous Wireless Sensor Networks (WSN) using the intrusion distance and detection probability with various Tracking and Detection models.


21st century is considered as the era of communication, and Wireless Sensor Networks (WSN) have assumed an extremely essential job in the correspondence period. A wireless sensor network is defined as a homogeneous or heterogeneous system contains a large number of sensors, namely called nodes used to monitor different environments in cooperatives. WSN is composed of sensor nodes (S.N.), base stations (B.S.), and cluster head (C.H.). The popularity of wireless sensor networks has been increased day by day exponentially because of its wide scope of utilizations. The applications of wireless sensor networks are air traffic control, healthcare systems, home services, military services, industrial & building automation, network communications, VAN, etc. Thus the wide range of applications attracts attackers. To secure from different types of attacks, mainly intruder, intrusion detection based on dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed. The trust evaluation is carried out in hierarchical way. The trust of sensor nodes is evaluated by cluster head (C.H.), whereas the trust of the cluster head is evaluated by a neighbor cluster head or base station. Hence the content trust, honest trust, and interactive trust are put forward by combining direct evaluation and feedback based evaluation in the fixed hop range. In this way, the complexity of trust management is carried in a hierarchical manner, and trust evaluation overhead is minimized.


2018 ◽  
Vol 7 (4.5) ◽  
pp. 657
Author(s):  
Jayashree Agarkhed ◽  
Gauri Kalnoor

Design of an intrusion detection system in the sensor network to improve the behavior of the network is the major challenge is theVariety of intrusion detection mechanisms are being used now a days, to provide security in Wireless Sensor networks (WSN). Since WSN works with set of tiny nodes called as sensor nodes, there are high chances of intrusions for malicious attacks. WSN is deployed in medium open to many users wherever possible. A multiple sensing environment of WSN consists of sensors which acts as agents called as multi agents system for detecting an intruder. Ant colony is an effective approach where each agent communicate with each other for updating the information of intruder to the colony administration. The multi agents based system is best phenomenon suitable for optimization of ant colony. In this approach, the ants form a colony where it goes for search continuously until an intruder is found and once searched, it returns back with the best shortest path available with path traces stored in its database for its future reference. An optimized multi agent approach using ant colony is proposed for detection of lightweight intruders for WSN to protect against harmful malicious attacks.  


2018 ◽  
Vol 7 (4) ◽  
pp. 2746
Author(s):  
Dr. G. Murugan

Wireless Sensor Networks (WSNs) have many potential applications. Multi-path routing is widely used in WSN to achieve reliability and perform Fault Tolerance. Multi-path routing determines and assigns multiple routes from a given sensor node to the sink. The transmission of data among the multi-path brings path redundancy, which increases the reliability and reduces the network congestion. In this research work, a dynamic redundancy management algorithm is proposed. To exploit multi-path routing in order to process the user request with existence of defective and malicious nodes. The objective of this work is to analyze the trade-off between energy consumption and Quality of Service (QoS) gain in security and reliability in order to increase the lifetime. The optimized redundancy level of multipath routing is determined dynamically which is used to improve the query response while extending the network lifetime and also for detecting intrusions and send alert to the system through Intrusion Detection System (IDS). Then, a voting-based distributed Intrusion Detection (ID) algorithm is proposed to detect and remove malicious nodes in a sensor network. The malicious node has been determined through number of voters using voting-based distributed ID algorithm. The efficient redundancy management of a clustered Heterogeneous Wireless Sensor Network (HWSN) is to increase the network lifetime in the presence of unreliable and malicious nodes. Therefore, the reliability improved dramatically.  


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Guangjie Han ◽  
Xu Jiang ◽  
Aihua Qian ◽  
Joel J. P. C. Rodrigues ◽  
Long Cheng

Recently, heterogeneous wireless sensor network (HWSN) routing protocols have drawn more and more attention. Various HWSN routing protocols have been proposed to improve the performance of HWSNs. Among these protocols, hierarchical HWSN routing protocols can improve the performance of the network significantly. In this paper, we will evaluate three hierarchical HWSN protocols proposed recently—EDFCM, MCR, and EEPCA—together with two previous classical routing protocols—LEACH and SEP. We mainly focus on the round of the first node dies (also called the stable period) and the number of packets sent to sink, which is an important aspect to evaluate the monitoring ability of a protocol. We conduct a lot of experiments and simulations on Matlab to analyze the performance of the five routing protocols.


Sign in / Sign up

Export Citation Format

Share Document