A Brief survey on Intrusion Detection System for WSN

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-40 Number-3
Year of Publication : 2016
Authors : L.Sheeba, Dr.V.S.Meenakshi
DOI :  10.14445/22312803/IJCTT-V40P121

MLA

L.Sheeba, Dr.V.S.Meenakshi "A Brief survey on Intrusion Detection System for WSN". International Journal of Computer Trends and Technology (IJCTT) V40(3):109-113, October 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Wireless Sensor Networks (WSNs) are the collection of autonomous sensor nodes spread out in various hostile environments statically or dynamically depend upon the application to monitor temperature, sound, pressure, etc. The security is a major component in wireless sensor networks. It degrades the performance of the network. The intrusion detection system is the solution to detect different kinds of attacks occurring on sensor nodes.Wireless sensor networks (WSN) are a group of tiny devices. These tiny devices have few energy, computational power, transmission range and memory. The more modern networks are bidirectional, also enabling control of sensor activity. At the beginning wireless sensor networks was developed for military applications such as battlefield surveillance; nowadays such networks are mostly used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. This model uses anomaly detection based on support vector machine (SVM) algorithm and a set of signature rules to detect malicious behaviours and provide global lightweight IDS. Though a few restricted survey works on this topic have already been done but there is a great need of performing a detailed study on the vital aspects so that the IDS is analyzed in all the different angles. Three most intrusion detection techniques explored in this paper. Such as Anomaly detection, Misuse detection and Specification based detection. Here in this review paper various attacks on Wireless Sensor Networks and existing Intrusion detection techniques are discussed to detect the compromised node/s.

Keywords
IDS, DOS, Anomaly Detection.