Secure and Reliable Knowledge-Based Intrusion Detection Using Mobile Base Stations in Smart Environments

Author(s):  
Ambika N.

Wireless sensor nodes are low cost tiny devices deployed in unsupervised environment. These devices require some kind of security mechanism to tackle different kinds of attacks. Intrusion detection is one such methodology used where the malicious activity is observed, and the target is isolated. Many authors have suggested different methodologies which are detailed in the work. The article also uses intrusion detection scheme to provide reliable network. A mobile agent and an assistance node aids in increasing security and efficiency of the work. The illegitimacy of the node is inferred using the data provided by the assistance and mobile agent. The work minimizes 12.9% of energy consumption, increases security by 3.025%, and increases reliability by 7.07% compared to the previous work.

Author(s):  
Dina M. Ibrahim ◽  
Nada M. Alruhaily

With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). A very significant research problem related to identifying Wireless Sensor Networks (WSN) attacks and the analysis of the sensor data is the detection of the relevant anomalies. In this paper, we propose a framework for intrusion detection system in WSN. The first two levels are located inside the WSN, one of them is between sensor nodes and the second is between the cluster heads. While the third level located on the cloud, and represented by the base stations. In the first level, which we called light mode, we simulated an intrusion traffic by generating data packets based on TCPDUMP data, which contain intrusion packets, our work, is done by using WSN technology. We used OPNET simulation for generating the traffic because it allows us to collect intrusion detection data in order to measure the network performance and efficiency of the simulated network scenarios. Finally, we report the experimental results by mimicking a Denial-of-Service (DOS) attack. <em> </em>


2012 ◽  
Vol 263-266 ◽  
pp. 2972-2978
Author(s):  
Ju Long Pan ◽  
Ling Long Hu ◽  
Wen Jin Li ◽  
Hui Cui ◽  
Zi Yin Li

To identify the malicious nodes timely in wireless sensor networks(WSNs), a cooperation intrusion detection scheme based on weighted k Nearest Neighbour(kNN) is proposed. Given a few types of sensor nodes, the test model extracts the properties of sensor nodes related with the known types of malicious nodes, and establishes sample spaces of all sensor nodes which participate in network activities. According to the known node’s attributes sampled, the unknown type sensor nodes are classified based on weighted kNN. Considering of energy consumption, an intrusion detection system selection algorithm is joined in the sink node. Simulation results show that the scheme has a lower false detection rate and a higher detection rate at the same time, and it can preserve energy of detection nodes compared with an existing intrusion detection scheme.


2020 ◽  
Author(s):  
Nishu Gupta

The wireless sensor nodes utilizes the wireless channels in the frequency bands of the 802.11, 802.16, 802.15.4, 802.15.1 and other similar wireless standards. The wireless sensor networks are built of the small sensor nodes built upon the microcontroller platforms such as PIC, 8051, ARM, AVR, etc. During the periods when the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. Efficient key management and distribution scheme play an important role for the data security in WSNs. Existing cryptographic key management and distribution technique usually consume higher amount of energy and put larger computational overheads on Wireless sensor nodes. The cryptographic keys are used on different communication levels of WSN communications i.e. neighbour nodes, cluster heads and base stations. A successful corporate key administration and distribution policy is required to keep up the security of the remote sensor systems. The problems described in the base papers are related to the requirement of energy efficient key exchange policies for WSNs. So to overcome the above problem there is a need to design the model to solve the key-problem of energy efficient and secure key exchange scheme. The proposed model has been found improved after the in-depth result analysis over the given scenario.


IoT ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 5-20 ◽  
Author(s):  
Petros Spachos

Precision Agriculture (PA) is an ever-expanding field that takes modern technological advancements and applies it to farming practices to reduce waste and increase output. One advancement that can play a significant role in achieving precision agriculture is wireless technology, and specifically the Internet of Things (IoT) devices. Small, inch scale and low-cost devices can be used to monitor great agricultural areas. In this paper, a system for precision viticulture which uses IoT devices for real-time monitoring is proposed. The different components of the system are programmed properly and the interconnection between them is designed to minimize energy consumption. Wireless sensor nodes measure soil moisture and soil temperature in the field and transmit the information to a base station. If the conditions are optimal for a disease or pest to occur, a drone flies towards the area. When the drone is over the node, pictures are captured and then it returns to the base station for further processing. The feasibility of the system is examined through experimentation in a realistic scenario.


2011 ◽  
Vol 201-203 ◽  
pp. 1573-1576
Author(s):  
Xiu Feng Li ◽  
Hong Xiong Xian

A system by using computer techniques, wireless communication and sensors is designed for monitoring electroplating current of PCB. This monitoring system uses wireless sensor nodes based on NEF9E5 MCU as the center unit, and uses a Hall current-sensor and its peripheral circuit. The system implements the wireless communication between wireless sensor nodes and the computer by using the method of time partitioned multiple addresses. The tested results show that the system is practicable, reliable and low-cost,and could be widely applied and developed in the future.


Sign in / Sign up

Export Citation Format

Share Document