Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks

被引:2
作者
Putty, Srividya [1 ]
Lavadya, Nirmala Devi [1 ]
Rao, Nageswar A. [2 ]
机构
[1] Osmania Univ, Univ Coll Engn, Dept ECE, Hyderabad, India
[2] Hindustan Aeronaut Ltd, Design, Hyderabad, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC) | 2021年
关键词
Intrusion Detection; Security Attacks; Rule based IDS; Anomaly based IDS; Clustering; Trust (Reputation); False Positives; FORWARDING ATTACK DETECTION; WORMHOLE ATTACK; SINKHOLE ATTACKS; SCHEME;
D O I
10.1109/ICMNWC52512.2021.9688522
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.
引用
收藏
页数:6
相关论文
共 50 条
[41]   A survey on energy efficient intrusion detection in wireless sensor networks [J].
Ghosal, Amrita ;
Halder, Subir .
JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2017, 9 (02) :239-261
[42]   Key Management Integrated with Intrusion Detection in Wireless Sensor Networks [J].
Zhang, Xing ;
He, Jingsha ;
Wei, Qian .
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, :744-+
[43]   Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks [J].
Gupta, Ayushi ;
Gupta, Ayushi ;
Virmani, Deepali ;
Pahwa, Payal .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 :445-455
[44]   Wireless sensor networks for intrusion detection:: Packet traffic modeling [J].
Demirkol, I ;
Alagöz, F ;
Deliç, H ;
Ersoy, C .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (01) :22-24
[45]   Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection [J].
Granjal, Jorge ;
Silva, Joao M. ;
Lourenco, Nuno .
SENSORS, 2018, 18 (08)
[46]   A Study of Clustering Techniques for Wireless Sensor Networks [J].
Kalla, Neeharika ;
Parwekar, Pritee .
SMART COMPUTING AND INFORMATICS, 2018, 77 :475-485
[47]   SLGBM: An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments [J].
Jiang, Shuai ;
Zhao, Juan ;
Xu, Xiaolong .
IEEE ACCESS, 2020, 8 :169548-169558
[48]   Source redundancy management and host intrusion detection in wireless sensor networks [J].
Singh V. ;
Sharma G. ;
Poonia R.C. ;
Trivedi N.K. ;
Raja L. .
Recent Advances in Computer Science and Communications, 2021, 14 (01) :43-47
[49]   A novel Rule Based Intrusion Detection Framework for Wireless Sensor Networks [J].
Eswari, T. ;
Vanitha, V. .
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, :1019-1022
[50]   Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks [J].
Wang, Yun ;
Fu, Weihuang ;
Agrawal, Dharma P. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (02) :342-355