Intrusion Detection Technique For Wireless Sensor Networks And Its Implementation Issues.

Read Complete Research Material



Intrusion Detection Technique for Wireless Sensor Networks And Its Implementation Issues.

Abstract

Wireless Sensor Networks (WSNs) is a very common and effective networking device which is being used for various purposes by organizations such as (military, health, control and tracking and others. However, depiste of its importance and value this device is being surrounded with severe security issues probably because of its complex setup and limited resources. Various companie are using innovative techniques to protect this network device from internal and external threat, however, these steps have proved to be unsuccessful in providing complete protection. Through this article researcher has tried to identify various detection based devices for protecting (WSNs), challagnes in using these devicies, types of attacks that could be protected with the help of these devices.

Introduction5

Prevention-Based Safety6

Detection-Based Techniques6

Classification of IDS7

Supervised IDS:7

Semi-Supervised IDS:7

The Unsupervised8

The Requirements of ID Schemes in WSN8

Generality8

Independent of Previous Data8

Fast Detection8

Accuracy of Detection9

Localize Auditing9

Use of More Vital Resources9

Tolerance When Under Attack9

Ensuring Real Time Response In Case of Attacks9

Supporting Scalability10

Intrusion Detection Techniques10

Rule-Based10

Malicious Node Detection10

IDS of Sinkhole Attack11

Neighbor-Based11

Fuzzy Logic11

Clustering-Based System For Routing Attacks12

Support Vector Machines (SVM)12

Optimized ID with Genetic Algorithm (GA)13

Ant-Based Intrusion Detection13

Hidden-Markove Model (HMM)14

Game Theory:14

Group-Based System14

Statistical Wormhole Detection14

Auto Regression Technique15

Implementation Issues15

Resource Constraints15

Continuously Changing Position16

Continuous Data Streaming16

Varying Routing Protocols16

Lack of Intelligent IDS Models17

Lack of Standards17

Conclusion………………………………………………………………………………… 17

References18

Intrusion Detection Technique For Wireless Sensor Networks And Its Implementation Issues.

Introduction

Wireless Sensor Networks (WSNs) are now increasingly been employed in several multi-disciplinary areas that includes military applications, health services, tracking and monitoring applications, environment and habitat monitoring applications. These WSNs offer great combination of wide spread sensing, computing and communication of a wide range of distributed data. At the same time, they create a number of challenges related to the privacy of data, mainly because of their unsystematic, random and unattended deployment and the restrictions of the resources (Alemdar, 2007).

The WSN applications can be categorized into two groups: i.e. Monitoring and Tracking and than are further divided into several sub classes. A large amount of these monitoring and tracking systems have previously been employed to the public, industry and research based services (Yick et al., 2008).The key advantage of the WSN system is that they can carry out in-network processing to cut down the huge streams of raw data, deduce only the useful and precise information for the transmission and this makes the protection of data much easier, however, the challenges posed by the sensor networks are unique.

Due to the harsh environment and the differences with the network, WSN is extremely vulnerable and subjected to diverse kinds of attacks. It is quite understandable that the solutions adopted for the security of network systems cannot be used for the security of WSNs (Akyildiz et al., 2002). Thus, researcger primary objective is “protection of valuable data present in NWS by identifying techniques of intrusion detection” and to accomplish this objective researcher has used tool-centric research approach.

Discussion

Prevention-Based Safety

To guard WSNs from different kinds of attacks and breaches, preventive-security techniques like authentication and cryptography can be used. But these kind of preventive systems are not successful against all kinds ...