Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks

被引:0
作者
Kalnoor, Gauri [1 ]
Agarkhed, Jayashree [1 ]
机构
[1] PDA Coll Engn, Comp Sci & Engn, Kalaburagi, India
来源
PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016) | 2016年
关键词
Wireless Sensor Network; Intrusion Detection System; Intrusion Prevention System; pattern matching; security goal;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless Sensor Network (WSN) is a network with large number of tiny sensor devices which are of low cost, and minimum consumption of power called as sensor nodes. These type of nodes have great sensing technology which are specifically designed for applications such as military, smart homes and other security related areas. Due its wireless nature, network can be deployed anywhere in the environment, which becomes more vulnerable for attackers to destroy the network. Most importantly, WSN should be protected from malicious activities to take place and thus security becomes a major issue. However, such security can be provided by applying mechanisms for both intrusion detection and prevention. In our study, pattern matching is one of the mechanism that can be used for security of WSN. We also discuss some of the preventive measures that can be considered for protecting the sensor network.
引用
收藏
页码:724 / 728
页数:5
相关论文
共 14 条
[1]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[2]   Fast and scalable pattern matching for network intrusion detection systems [J].
Dharmapurikar, Sarang ;
Lockwood, John W. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1781-1792
[3]  
Gonzalez F., 2013, P 4 ANN IEEE INF ASS, P251
[4]  
Mishra A., 2014, WIRELESS COMMUNICATI, V11, P48
[5]  
Pathan ASK, 2006, 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3, pU1043
[6]  
Poorani M., 2010, 2010 2nd International Conference on Advanced Computing (ICoAC), P26, DOI 10.1109/ICOAC.2010.5725357
[7]  
Pramod PJ, 2009, IEEE INT C NETW SENS, P581
[8]  
Tan Lin., 2006, ACM T ARCHIT CODE OP, V3, P3, DOI DOI 10.1145/1132462.1132464
[9]   Pushing support constraints into association rules mining [J].
Wang, K ;
He, Y ;
Han, JW .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (03) :642-658
[10]  
Wang Ke, 2009, KNOWL DAT ENG INT C, V2