Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks

被引:2
|
作者
Putty, Srividya [1 ]
Lavadya, Nirmala Devi [1 ]
Rao, Nageswar A. [2 ]
机构
[1] Osmania Univ, Univ Coll Engn, Dept ECE, Hyderabad, India
[2] Hindustan Aeronaut Ltd, Design, Hyderabad, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC) | 2021年
关键词
Intrusion Detection; Security Attacks; Rule based IDS; Anomaly based IDS; Clustering; Trust (Reputation); False Positives; FORWARDING ATTACK DETECTION; WORMHOLE ATTACK; SINKHOLE ATTACKS; SCHEME;
D O I
10.1109/ICMNWC52512.2021.9688522
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6
  • [2] Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
    Sun, Bo
    Osborne, Lawrence
    Xiao, Yang
    Guizani, Sghaier
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 56 - 63
  • [3] Intrusion Detection in Wireless Sensor Networks
    Mettu, NaveenaReddy
    Sasikala, T.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 84 - 89
  • [4] Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Romano, Luigi
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 247 - 254
  • [5] Monitoring of Wireless Sensor Networks : Analysis of Intrusion Detection Systems
    Mekelleche, Fatiha
    Hafid
    OuldBouamam, Belkacem
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 421 - 426
  • [6] Performance Analysis for Intrusion Target Detection in Wireless Sensor Networks
    Fan Gaojuan
    Wang Ruchuan
    Huang Haiping
    Sun Lijuan
    Xiao Fu
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 725 - 729
  • [7] Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, Moulay Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015, 2015
  • [8] Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
    Alrajeh, Nabil Ali
    Lloret, J.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [9] Intrusion detection systems for wireless sensor networks using computational intelligence techniques
    Vaishnavi Sivagaminathan
    Manmohan Sharma
    Santosh Kumar Henge
    Cybersecurity, 6
  • [10] A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks
    Soliman, H. H.
    Hikal, Noha A.
    Sakr, Nehal A.
    EGYPTIAN INFORMATICS JOURNAL, 2012, 13 (03) : 225 - 238