Abstract

Wireless sensor network (WSN) consists of a small size sensor nodes depends on battery power. Applications of sensor networks are street lighting, home automation, industrial plant, environmental parameters, health care and military. Security is becoming a major concept in the design of wireless sensor networks. Attacks on sensor networks include attack on confidentiality, integrity and availability. Lack of confidentiality means that the secret information is revealed to attackers. Lack of integrity means that the attacker modifies the contents (data) communicated in the sensor network. Lack of availability means the resources in the network is not available to authorized users. So to avoid these problems we need better security measures. In this paper we are dealing with intrusion detection. Intrusion detection plays an important role in the design of wireless sensor networks. An intruder can perform various attacks like replay, interception, worm hole, sink hole attacks. So our aim in this paper is to find such intrusions as early as possible, when they occurred and to enhance the life tome of the sensor network. This is because sensors nodes depend only on battery power. Our intrusion detection is based on clustering of the sensor network. This makes routing process, medium control and intrusion detection simple. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.8072

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.