We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Multiple Sensing Intrusion Detection System in Wireless Sensor Networks

Published on January 2014 by R. Brintha, S. Bhuvaneswari
National Conference on Future Computing 2014
Foundation of Computer Science USA
NCFC2014 - Number 1
January 2014
Authors: R. Brintha, S. Bhuvaneswari
4c86550f-6532-461c-926c-f6c9a02f87b5

R. Brintha, S. Bhuvaneswari . Multiple Sensing Intrusion Detection System in Wireless Sensor Networks. National Conference on Future Computing 2014. NCFC2014, 1 (January 2014), 5-8.

@article{
author = { R. Brintha, S. Bhuvaneswari },
title = { Multiple Sensing Intrusion Detection System in Wireless Sensor Networks },
journal = { National Conference on Future Computing 2014 },
issue_date = { January 2014 },
volume = { NCFC2014 },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/ncfc2014/number1/14788-1402/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Future Computing 2014
%A R. Brintha
%A S. Bhuvaneswari
%T Multiple Sensing Intrusion Detection System in Wireless Sensor Networks
%J National Conference on Future Computing 2014
%@ 0975-8887
%V NCFC2014
%N 1
%P 5-8
%D 2014
%I International Journal of Computer Applications
Abstract

Availing security in a wireless sensor network requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The openness of wireless sensor network model makes it vulnerable and prone to sophisticated intrusion attacks like Denial of Service (DDOS) and side channel attacks. To handle large scale network access traffic and administrative control of data and application in wireless sensor network, a Multiple Sensing Intrusion Detection model has been proposed. Our proposed Multiple Sensing Intrusion Detection model handles large flow of data packets, analyze them and generate reports efficiently by finding the probability of network being attacked by an intruder. The intrusion distance, the minimum coverage of an area where the intruder can be sensed is found and multiple (sensing) detectors are situated there to detect the intruder once it enters or establishes its effect in the network.

References
  1. R. Hemenway, R. Grzybowski, C. Minkenberg, and R. Luijten, "Optical-packet-switched interconnect for supercomputer applications,"OSA J. Opt. Netw. , vol. 3, no. 12, pp. 900–913, Dec. 2004.
  2. C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, M. Gusat, P. Dill, I. Iliadis, R. Luijten, B. R. Hemenway, R. Grzybowski, and E. Schiattarella, "Designing a crossbar scheduler for HPC applications,"IEEE Micro, vol. 26, no. 3, pp. 58–71, May/Jun. 2006.
  3. E. Oki, R. Rojas-Cessa, and H. Chao, "A pipeline-based approach formaximal-sized matching scheduling in input-buffered switches," IEEE Commun. Lett. , vol. 5, no. 6, pp. 263–265, Jun. 2001.
  4. C. Minkenberg, I. Iliadis, and F. Abel, "Low-latency pipelined crossbar arbitration," in Proc. IEEE GLOBECOM, Dallas, TX, vol. 2, pp. 1174–1179, 2004.
  5. C. Minkenberg, R. Luijten, F. Abel, W. Denzel, and M. Gusat, "Current issues in packet switch design," ACM Comput. Commun. Rev. , vol. 33, no. 1, pp. 119–124, Jan. 2003.
  6. C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, and M. Gusat,"Control path implementation of a low-latency optical HPC switch," inProc. Hot Interconnects 13, Stanford, CA, pp. 29–35,Aug. 2005.
  7. C. -S. Chang, D. -S. Lee, and Y. -S. Jou, "Load-balanced Birkhoff-von Neumann switches, part I: One-stage buffering," Elsevier Comput. Commun. , vol. 25, pp. 611–622, 2002.
  8. A. Tanenbaum, Computer Networks, 3rd ed. Englewood Cliffs, NJ: Prentice Hall, 1996.
  9. R. Krishnamurthy and P. Müller, "An input queuing implementation for low-latency speculative optical switches," in Proc. X Int. Conf. Parallel Processing Techniques and Applications (PDPTA'07), Las Vegas, NV, vol. 1, pp. 161–167, , Jun. 2007.
  10. H. Takagi, Queueing Analysis, Volume 3: Discrete-Time Systems. Amsterdam: North-Holland, 1993.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Multiple Sensing Heterogeneous/homogeneous Intrusion Detection System Attacks Packet Filtration Packet Generation