Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks

被引:2
作者
Putty, Srividya [1 ]
Lavadya, Nirmala Devi [1 ]
Rao, Nageswar A. [2 ]
机构
[1] Osmania Univ, Univ Coll Engn, Dept ECE, Hyderabad, India
[2] Hindustan Aeronaut Ltd, Design, Hyderabad, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC) | 2021年
关键词
Intrusion Detection; Security Attacks; Rule based IDS; Anomaly based IDS; Clustering; Trust (Reputation); False Positives; FORWARDING ATTACK DETECTION; WORMHOLE ATTACK; SINKHOLE ATTACKS; SCHEME;
D O I
10.1109/ICMNWC52512.2021.9688522
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.
引用
收藏
页数:6
相关论文
共 50 条
[21]   Data Integrity And Intrusion Detection In Wireless Sensor Networks [J].
Acharya, Rathanakar ;
Asha, K. .
PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, :462-+
[22]   Intrusion Detection in Wireless Sensor Networks for Destructive Intruders [J].
Yu, Qixiang ;
Luo, Zhenxing ;
Min, Paul .
2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, :68-75
[23]   Intrusion Detection System in Wireless Sensor Networks: A Review [J].
Ananthakumar, Anush ;
Ganediwal, Tanmay ;
Kunte, Ashwini .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) :131-139
[24]   Hybrid intrusion detection system for wireless sensor networks [J].
Hai, Tran Hoang ;
Khan, Faraz ;
Huh, Eui-Nam .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 :383-396
[25]   Efficient monitoring for intrusion detection in wireless sensor networks [J].
Abdellatif, Takoua ;
Mosbah, Mohamed .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15)
[26]   An Intrusion Detection Scheme for Home Wireless Sensor Networks [J].
Wei, Min ;
Rim, Keewook ;
Kim, Keecheon .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 :3799-+
[27]   An Efficient Intrusion Detection Scheme for Wireless Sensor Networks [J].
Rong, Chunming ;
Eggen, Skjalg ;
Cheng, Hongbing .
SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 :116-+
[28]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[29]   Analysis of anomaly-based intrusion detection techniques for mobile wireless networks [J].
Liu, Lijun ;
Ma, Hongxia ;
Liu, Jianqiu ;
Li, Zhuowei .
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, :827-832
[30]   Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks [J].
Xin Xiao ;
Ruirui Zhang .
Arabian Journal for Science and Engineering, 2017, 42 :3159-3174