CFP last date
20 January 2025
Reseach Article

A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks

by Kantharaju V., S. C. Lingareddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 1
Year of Publication: 2017
Authors: Kantharaju V., S. C. Lingareddy
10.5120/ijca2017915856

Kantharaju V., S. C. Lingareddy . A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks. International Journal of Computer Applications. 179, 1 ( Dec 2017), 1-8. DOI=10.5120/ijca2017915856

@article{ 10.5120/ijca2017915856,
author = { Kantharaju V., S. C. Lingareddy },
title = { A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2017 },
volume = { 179 },
number = { 1 },
month = { Dec },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number1/28697-2017915856/ },
doi = { 10.5120/ijca2017915856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:54:07.740597+05:30
%A Kantharaju V.
%A S. C. Lingareddy
%T A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 1
%P 1-8
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The intrusion detection is defined as a mechanism for a wireless sensor network to detect the existence of incorrect and inappropriate moving attackers in the network. We consider the intrusion detection issue according to two sensing models such as homogeneous and heterogeneous sensing models. We derive the detection probability by considering these two sensing models. Further, we discuss the broadcast reachability and network connectivity, which are very important conditions to make sure the detection probability in wireless networks. In this paper Watchdog monitoring technique is presented to detect misbehaving nodes. It is based on the broadcast concept of communication in sensor networks, where each node hears the communication of surrounding nodes even if it is not intended.

References
  1. S Biswas, MK Mishra, S Acharya Sitanath biswas, and S Mohanty. A two stage language independent named entity recognition for indian languages. IJCSIT) International Journal of Computer Science and Information Technologies, 1(4):285– 289, 2010.
  2. Enrique J Duarte-Melo and Mingyan Liu. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks. In Global Telecommunications Conference, 2002. GLOBECOM’02. IEEE, volume 1, pages 21–25. IEEE, 2002.
  3. Arvind Giridhar and PR Kumar. Distributed clock synchronization over wireless networks: Algorithms and analysis. In Decision and Control, 2006 45th IEEE Conference on, pages 4915–4920. IEEE, 2006.
  4. Daojing He, Maode Ma, Yan Zhang, Chun Chen, and Jiajun Bu. A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3):367–374, 2011.
  5. Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, and Seng-Soo Yeo. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21(1):49–60, 2015.
  6. Md Safiqul Islam and Syed Ashiqur Rahman. Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches. International Journal of Advanced Science and Technology, 36(1):1–8, 2011.
  7. Mian Jan, Priyadarsi Nanda, Muhammad Usman, and Xiangjian He. Pawn: a payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17), 2017.
  8. Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho Won. Security analysis of authentication scheme for wireless communications with user anonymity. In Information technology convergence, secure and trust computing, and data management, pages 225–231. Springer, 2012.
  9. Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, and Mohsen Guizani. An efficient distributed trust model for wireless sensor networks. IEEE transactions on parallel and distributed systems, 26(5):1228–1237, 2015.
  10. Qi Jiang, Jianfeng Ma, Guangsong Li, and Li Yang. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4):1477–1491, 2013.
  11. Preeti Kumari, D Shakina Deiv, and Mahua Bhattacharya. Automatic speech recognition of accented hindi data. In Computation of Power, Energy, Information and Communication (ICCPEIC), 2014 International Conference on, pages 68–76. IEEE, 2014.
  12. Chun-Ta Li and Cheng-Chi Lee. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1):35–44, 2012.
  13. Chun-Guang Ma, Ding Wang, and Sen-Dong Zhao. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, 27(10):2215–2227, 2014.
  14. SaiSujith Reddy Mankala, Sainath Reddy Bojja, V Subba Ramaiah, and R Rajeswara Rao. Automatic speech processing using htk for telugu language. International Journal of Advances in Engineering & Technology, 6(6):2572–2578, 2014.
  15. T Mohamed Mubarak, Syed Abdul Sattar, G Appa Rao, and M Sajitha. Intrusion detection: An energy efficient approach in heterogeneous wsn. In Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on, pages 1092–1096. IEEE, 2011.
  16. Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, and Hyo Hyun Choi. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1):214– 222, 2012.
  17. Ujwala Ravale, Nilesh Marathe, and Puja Padiya. Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function. Procedia Computer Science, 45:428–435, 2015.
  18. Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1):98–110, 2015.
  19. Jie Tian, Xiaoyuan Liang, and Guiling Wang. Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage. Ad Hoc Networks, 36:321–331, 2016.
  20. Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei, et al. A robust authentication scheme with user anonymity for wireless environments. International Journal of Innovative Computing, Information and Control, 5(4):1069–1080, 2009.
  21. Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, and Dharma P Agrawal. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE transactions on mobile computing, 7(6):698–711, 2008.
  22. Chia-Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur, et al. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10):722– 723, 2008.
  23. Dawei Zhao, Haipeng Peng, Lixiang Li, and Yixian Yang. A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1):247–269, 2014.
  24. Richard Zuech, TaghiMKhoshgoftaar, and RandallWald. Intrusion detection and big heterogeneous data: a survey. Journal of Big Data, 2(1):3, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Intrusion detection Security Privacy Heterogeneous networks