International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 17 | Number 2 | Year 2014 | Article Id. IJCTT-V17P132 | DOI : https://doi.org/10.14445/22312803/IJCTT-V17P132

Survey of Intrusion Detection Techniques in LEACH


Sugandha Gupta , Vandita Grover

Citation :

Sugandha Gupta , Vandita Grover, "Survey of Intrusion Detection Techniques in LEACH," International Journal of Computer Trends and Technology (IJCTT), vol. 17, no. 2, pp. 166-171, 2014. Crossref, https://doi.org/10.14445/22312803/IJCTT-V17P132

Abstract

Security of Wireless sensor network (WSN) turn out to be a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Clustered Networks have been proposed to reduce the power consumption in sensor networks. LEACH is a clustering based protocol that lessens energy dissipation in sensor networks. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. This paper surveys the basic IDS mechanisms that are applied in LEACH.

Keywords

Wireless Sensor Networks, Cluster-based routing, LEACH, Intrusion Detection Systems, Watchdog-LEACH, Specification based IDS, Intrusion detection IDS.

References

[1] Wendi Rabiner Heinzalman, Anantha Chandrakasan, Hari Balakrishnan, “Energy Efficient Protocol for Wireless Microsensor Networks”, IEEE, Hawaii Intenational Conference, 2000
[2] Soojin Lee, Yunho Lee and Sang-Guun Yoo, “A Specification based Intrusion Detection Mechanism for LEACH Protocol”, Information Technology Journal 11(1): 40-48, 2012
[3] Bishan Ying, “CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks”, Journal of Electrical and Computer Engineering, Volume 2014, Article ID 245938
[4] Mohammad Reza Rohbanian, Mohammad Rafi Khan, Alireza Keshavarz-Haddad and Manije Keshtgary, “Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks”.
[5] Nancy Alrajei, George Corser, Huirong Fu and Ye Zhu, “Energy Prediction Based Intrusion Detection in Wireless Sensor Networks”, International Journal of Emerging Technology and Advanced Engineering, 2014, vol. 4, Issue 2.
[6] Hossein Jadidoleslamy, “A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks”, International Journal of Network Security & its Applications, vol. 3, No.5, Sep. 2011.
[7] Ms. Rachana Deshmukh, Ms. Rashmi Deshmukh and Prof. Manoj Sharma, “Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network”, International Journal of Computer Science and Mobile Computing, 2013, Vol. 2, Issue 6, pg. 200 – 208.
[8] Hossein Jadidoleslamy, “A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable”, Wireless Sensor Network, 2011,3, 241 – 26.
[9] Yassine Maleh and Abdellah Ezzati, “A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network”
[10] Zhang, Y. and W. Lee, “Intrusion detection techniques for mobile ad hoc networks. “ ACM WINET J., 2003: 1-16.