Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks

Wireless sensor networks consists of tiny sensor nodes deployed in various geographic conditions to gather the information about the environment. The distributed and unattended environment makes the network more prone to security breaches. Rather than many studies discuss many potential issues of WSN security and detection mechanisms, most of these are discussed in isolation. An attempt has been made to provide a summary of the major security attacks and present a comprehensive analysis of various Intrusion Detection approaches. In addition, we present the comparison of Intrusion Detection systems.

[1]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[2]  F MidkiffScott,et al.  Denial-of-Service in Wireless Sensor Networks , 2008 .

[3]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[4]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[5]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[6]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[7]  Yassine Maleh,et al.  A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.

[8]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[9]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[10]  Andreas Strikos A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .

[11]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[12]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[13]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[14]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[15]  Guiling Wang,et al.  Catching Packet Droppers and Modifiers in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[16]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[17]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[18]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[19]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[20]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[21]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[22]  Kumaraguru,et al.  A Survey On Intrusion Detection System In Wireless Sensor Networks , 2017 .

[23]  Padmavati Khandnor,et al.  Intrusion detection system in wireless sensor networks: A comprehensive review , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[24]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.