Intrusion Detection in Wireless Sensor Networks

被引:0
作者
Mettu, NaveenaReddy [1 ]
Sasikala, T. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
来源
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT) | 2018年
关键词
WirelessSensorNetworks; Intrusion detection; Sensing node; Processing Node; Selfish Attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks are prone to many effects due to its openness characteristic. In this Paper we are going to inject a selfish attack to some nodes which would act selfish and would not send packets to destination. There are two types of nodes, Sensing node and processing node. The sensing node will sense the action of every node. The processing node will participate in the routing activity to forward the packets. The processing node either drops the packet or sends the packet back It stops normal behavior of the packet route. In order to find the malicious node a threshold limit is maintained for every node, if it exceeds the limit the particular node is malicious node. Whenever the limit is exceeded an alarm is raised. All alarms raised are handled by sensing node. The sensing node will filter the alarms that are valid and generate an alarms file with Node ID and alarm threshold value. The alarm file is given to Naive Bayes algorithm which will generate the True positive and True negative rate of the malicious and non-malicious nodes.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 14 条
[1]  
Abdellatif Takoua, 2017, IEEE 26 INT C EN TEC, V1, p54
[2]  
Bagaa M, 2014, IEEE WCNC, P2402, DOI 10.1109/WCNC.2014.6952725
[3]  
Coppolino L., 2012, International Journal of Critical Computer-Based Systems, V3, P210
[4]  
Deng Hongwei, 2009, P IEEE GLOB TEL C GL, P1
[5]  
Fei Song, 2008, 2008 Second International Conference on Future Generation Communication and Networking (FGCN), P202, DOI 10.1109/FGCN.2008.41
[6]  
Hur J, 2005, 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, P1
[7]  
Pradhan Puja, 2015, 2015 IEEE 42nd Photovoltaic Specialist Conference (PVSC). Proceedings, P1, DOI 10.1109/PVSC.2015.7355890
[8]  
Rajesh M., 2017, INT C ADV COMP COMM
[9]   False Data Elimination in Heterogeneous Wireless Sensor Networks Using Location-Based Selection of Aggregator Nodes [J].
Sandhya, M. K. ;
Murugan, K. ;
Devaraj, P. .
IETE JOURNAL OF RESEARCH, 2014, 60 (02) :145-155
[10]  
Sreevidya B., 2017, SPRINGER J ADV INTEL