Comparison and detail study of attacks and detection methods for wireless sensor network

2018 ◽  
Vol 7 (2.21) ◽  
pp. 405
Author(s):  
T Karthik Krishnan ◽  
S Sridevi ◽  
G Bindu ◽  
R Anandan

Wireless sensor network is emanating technology in the field of telecommunications. WSNs can be applied in many fields like machine surveillance, precision agriculture, home automation and intelligent building environments. However the major aspect of WSN is the security as the sensor nodes are limited because of these facing several security threats such as black hole attack, worm hole attack, flooding etc. which is finally affecting the functioning of the whole network. These attacks are maximizing the consumption of power in the node and also it decreases life of the battery. In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes in the WSN. And also we discuss about the different intrusion detection methods with the help of machine learning algorithms. In future these techniques can be helpful to create a safe and sophisticated network.  

Author(s):  
Ortega-Corral César ◽  
B. Ricardo Eaton-González ◽  
Florencio López Cruz ◽  
Laura Rocío, Díaz-Santana Rocha

We present a wireless system applied to precision agriculture, made up of sensor nodes that measure soil moisture at different depths, applied to vine crops where drip irrigation is applied. The intention is to prepare a system for scaling, and to create a Wireless Sensor Network (WSN) that communicates by radio frequency with a base station (ET), so that the gathered data is stored locally and can be sent out an Internet gateway.


2012 ◽  
Vol 8 (8) ◽  
pp. 54-64
Author(s):  
Qutaiba Ali ◽  
Sahar Lazim ◽  
Enaam Fathi

This paper focuses on designing distributed wireless sensor network gateways armed with Intrusion Detection System (IDS). The main contribution of this work is the attempt to insert IDS functionality into the gateway node (UBICOM IP2022 network processor chip) itself. This was achieved by building a light weight signature based IDS based on the famous open source SNORT IDS. Regarding gateway nodes, as they have limited processing and energy constrains, the addition of further tasks (the IDS program) may affects seriously on its performance, so that, the current design takes these constrains into consideration as a priority and use a special protocol to achieve this goal. In order to optimize the performance of the gateway nodes, some of the preprocessing tasks were offloaded from the gateway nodes to a suggested classification and processing server and a new searching algorithm was suggested. Different measures were taken to validate the design procedure and a detailed simulation model was built to discover the behavior of the system in different environments.


2019 ◽  
Vol 8 (2) ◽  
pp. 2612-2616

Intrusion detection is the one of the challenging task in wireless sensor network and prevents the system and network resources from being intrude or compromised. One of the ongoing strategies for recognizing any anomalous activities presented in a network is done by intrusion detection systems (IDS) and it becomes an essential part of defense system against attacker problems. The primary goal of our work is to study and analyze intrusion detection technique meant for improving the performance of Intrusion Detection using hybrid ANN based Clustering technique. To estimate the effectiveness of the proposed strategy, KDD CUP 99 dataset is utilized for testing and assessment. Based on the analysis, it is noticed that the proposed ANN clustering performs much better than other methods with respect to accuracy which attains an average high accuracy of 93.91%when compared with other methods.


21st century is considered as the era of communication, and Wireless Sensor Networks (WSN) have assumed an extremely essential job in the correspondence period. A wireless sensor network is defined as a homogeneous or heterogeneous system contains a large number of sensors, namely called nodes used to monitor different environments in cooperatives. WSN is composed of sensor nodes (S.N.), base stations (B.S.), and cluster head (C.H.). The popularity of wireless sensor networks has been increased day by day exponentially because of its wide scope of utilizations. The applications of wireless sensor networks are air traffic control, healthcare systems, home services, military services, industrial & building automation, network communications, VAN, etc. Thus the wide range of applications attracts attackers. To secure from different types of attacks, mainly intruder, intrusion detection based on dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed. The trust evaluation is carried out in hierarchical way. The trust of sensor nodes is evaluated by cluster head (C.H.), whereas the trust of the cluster head is evaluated by a neighbor cluster head or base station. Hence the content trust, honest trust, and interactive trust are put forward by combining direct evaluation and feedback based evaluation in the fixed hop range. In this way, the complexity of trust management is carried in a hierarchical manner, and trust evaluation overhead is minimized.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7256
Author(s):  
Marcin Lewandowski ◽  
Bartłomiej Płaczek

Wireless sensor networks have found many applications in detecting events such as security threats, natural hazards, or technical malfunctions. An essential requirement for event detection systems is the long lifetime of battery-powered sensor nodes. This paper introduces a new method for prolonging the wireless sensor network’s lifetime by reducing data transmissions between neighboring sensor nodes that cooperate in event detection. The proposed method allows sensor nodes to decide whether they need to exchange sensor readings for correctly detecting events. The sensor node takes into account the detection algorithm and verifies whether its current sensor readings can impact the event detection performed by another node. The data are transmitted only when they are found to be necessary for event detection. The proposed method was implemented in a wireless sensor network to detect the instability of cargo boxes during transportation. Experimental evaluation confirmed that the proposed method significantly extends the network lifetime and ensures the accurate detection of events. It was also shown that the introduced method is more effective in reducing data transmissions than the state-of-the-art event-triggered transmission and dual prediction algorithms.


2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Noureddine Assad ◽  
Brahim Elbhiri ◽  
Moulay Ahmed Faqihi ◽  
Mohamed Ouadou ◽  
Driss Aboutajdine

The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known ask-coverage wherekis the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic intrusion detection models are adopted, called single/multi-sensing detection, and the deployment quality issue is surveyed and analysed in terms of coverage. We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance.


A wireless sensor network generally defined as the collection of sensors that are utilized to track and record the data in real-time on an ongoing basis from different applications. In comparison with other sensor nodes, data transmission obtained through sinks in WSN eliminates the energy in nearby nodes. This issue is identified as one of the major problems in a wireless sensor network. Two new algorithms were proposed in this research paper that mainly focused on the usage of machine learning algorithms to solve the data collection issue in the wireless sensor network. The algorithms proposed will able to create cluster heads to decrease energy usage, this will save about 50% of battery power consumption and mobile sinks are used to record the data from cluster heads in a network. Ultimately, current algorithms such as RLLO, DBRkM, CLIQUE, RL-CRC, and EPMS were compared.


Sign in / Sign up

Export Citation Format

Share Document