Survey of Intrusion Detection Techniques in LEACH

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-17 Number-4
Year of Publication : 2014
Authors : Sugandha Gupta , Vandita Grover
DOI :  10.14445/22312803/IJCTT-V17P132


Sugandha Gupta and Vandita Grover "Survey of Intrusion Detection Techniques in LEACH". International Journal of Computer Trends and Technology (IJCTT) V17(4):166-171, Nov 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Security of Wireless sensor network (WSN) turn out to be a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Clustered Networks have been proposed to reduce the power consumption in sensor networks. LEACH is a clustering based protocol that lessens energy dissipation in sensor networks. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. This paper surveys the basic IDS mechanisms that are applied in LEACH.

[1] Wendi Rabiner Heinzalman, Anantha Chandrakasan, Hari Balakrishnan, “Energy Efficient Protocol for Wireless Microsensor Networks”, IEEE, Hawaii Intenational Conference, 2000
[2] Soojin Lee, Yunho Lee and Sang-Guun Yoo, “A Specification based Intrusion Detection Mechanism for LEACH Protocol”, Information Technology Journal 11(1): 40-48, 2012
[3] Bishan Ying, “CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks”, Journal of Electrical and Computer Engineering, Volume 2014, Article ID 245938
[4] Mohammad Reza Rohbanian, Mohammad Rafi Khan, Alireza Keshavarz-Haddad and Manije Keshtgary, “Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks”.
[5] Nancy Alrajei, George Corser, Huirong Fu and Ye Zhu, “Energy Prediction Based Intrusion Detection in Wireless Sensor Networks”, International Journal of Emerging Technology and Advanced Engineering, 2014, vol. 4, Issue 2.
[6] Hossein Jadidoleslamy, “A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks”, International Journal of Network Security & its Applications, vol. 3, No.5, Sep. 2011.
[7] Ms. Rachana Deshmukh, Ms. Rashmi Deshmukh and Prof. Manoj Sharma, “Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network”, International Journal of Computer Science and Mobile Computing, 2013, Vol. 2, Issue 6, pg. 200 – 208.
[8] Hossein Jadidoleslamy, “A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable”, Wireless Sensor Network, 2011,3, 241 – 26.
[9] Yassine Maleh and Abdellah Ezzati, “A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network”
[10] Zhang, Y. and W. Lee, “Intrusion detection techniques for mobile ad hoc networks. “ ACM WINET J., 2003: 1-16.

Wireless Sensor Networks, Cluster-based routing, LEACH, Intrusion Detection Systems, Watchdog-LEACH, Specification based IDS, Intrusion detection IDS.