A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks

The intrusion detection is defined as a mechanism for a wireless sensor network to detect the existence of incorrect and inappropriate moving attackers in the network. We consider the intrusion detection issue according to two sensing models such as homogeneous and heterogeneous sensing models. We derive the detection probability by considering these two sensing models. Further, we discuss the broadcast reachability and network connectivity, which are very important conditions to make sure the detection probability in wireless networks. In this paper Watchdog monitoring technique is presented to detect misbehaving nodes. It is based on the broadcast concept of communication in sensor networks, where each node hears the communication of surrounding nodes even if it is not intended.

[1]  V Kantharaju,et al.  A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks , 2017 .

[2]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[3]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  T. Khoshgoftaar,et al.  Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.

[5]  Neeraj Kumar,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2015, Multimedia Systems.

[6]  Chunguang Ma,et al.  Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..

[7]  Mahua Bhattacharya,et al.  Automatic Speech Recognition of accented Hindi data , 2014, 2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).

[8]  Dawei Zhao,et al.  A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2013, Wireless Personal Communications.

[9]  Jianfeng Ma,et al.  An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks , 2012, Wireless Personal Communications.

[10]  G. Appa Rao,et al.  Intrusion detection: An energy efficient approach in heterogeneous WSN , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[11]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[12]  Chin-Chen Chang,et al.  Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[14]  P.R. Kumar,et al.  Distributed Clock Synchronization over Wireless Networks: Algorithms and Analysis , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[15]  Mingyan Liu,et al.  Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[16]  Jie Tian,et al.  Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage , 2016, Ad Hoc Networks.

[17]  Puja Padiya,et al.  Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function , 2015 .

[18]  E. Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[19]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[20]  Dongho Won,et al.  Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity , 2012, ITCS.

[21]  Safiqul Islam,et al.  Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .

[22]  Monalisa Mishra,et al.  A Two Stage Language Independent Named Entity Recognition for Indian Languages , 2010 .

[23]  Chin-Laung Lei,et al.  A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS , 2009 .