A Survey on Intrusion Detection in Wireless Sensor Networks

作者: Deepak singh Rajput , Nitesh Kumar Singh

DOI: 10.32628/IJSRSET162190

关键词: Application areasComputer networkMisuse detectionComputer securityWireless sensor networkIntrusion prevention systemIntrusion detection systemAnomaly detectionKey distribution in wireless sensor networksEngineeringNode (networking)

摘要: In recent years, the applications based on Wireless Sensor Networks are growing very fast. The application areas include agriculture, healthcare, military, hospitality management, mobiles and many others. So these networks important for us security of network from various attacks is also a more issue in WSN now days. Stopping or enhancing system intrusion detection policies developed till date to detect node/s that is/are not working normally. Out techniques three major categories explored this paper Anomaly detection, Misuse Specification- detection. Here review existing Intrusion discussed compromised node/s. provides brief discussion about characteristics classification attacks.

参考文章(14)
Jim Alves-Foss, Karl Levitt, Calvin Ko, Cui Zhang, Tao Song, Using ACL2 to Verify Security Properties of Specification- based Intrusion Detection Systems ,(2003)
K. Yoshida, Entropy based intrusion detection pacific rim conference on communications, computers and signal processing. ,vol. 2, pp. 840- 843 ,(2003) , 10.1109/PACRIM.2003.1235912
J.E. Dickerson, J.A. Dickerson, Fuzzy network profiling for intrusion detection north american fuzzy information processing society. pp. 301- 306 ,(2000) , 10.1109/NAFIPS.2000.877441
Guan Jian, Liu Da-Xin, Cui Bin-Ge, An induction learning approach for building intrusion detection models using genetic algorithms world congress on intelligent control and automation. ,vol. 5, pp. 0- 0 ,(2004) , 10.1109/WCICA.2004.1342332
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 265- 274 ,(2002) , 10.1145/586110.586146
Christopher Krügel, Thomas Toth, Engin Kirda, Service specific anomaly detection for network intrusion detection acm symposium on applied computing. pp. 201- 208 ,(2002) , 10.1145/508791.508835
Filippo Neri, None, Comparing local search with respect to genetic evolution to detect intrusions in computer networks congress on evolutionary computation. ,vol. 1, pp. 238- 243 ,(2000) , 10.1109/CEC.2000.870301
S. Mukkamala, G. Janoski, A. Sung, Intrusion detection using neural networks and support vector machines international joint conference on neural network. ,vol. 2, pp. 1702- 1707 ,(2002) , 10.1109/IJCNN.2002.1007774
Chris Karlof, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures Ad Hoc Networks. ,vol. 1, pp. 293- 315 ,(2003) , 10.1016/S1570-8705(03)00008-8
U. Bilstrup, K. Sjoberg, B. Svensson, P.-A. Wiberg, Capacity limitations in wireless sensor networks emerging technologies and factory automation. ,vol. 1, pp. 529- 536 ,(2003) , 10.1109/ETFA.2003.1247752