Abstract

Wireless sensor networks (WSNs) are vulnerable to various types of security threats that may degrade the performance of the entire network. This problem could not provide protection for the attacks on key management and authentication protocols during fatal issues such as service denial attacks, routing attacks, sybil attacks and few other. Over the last few years, researchers have developed different distributed and centralized intrusion detection systems for wireless sensor networks but not reached to a higher performance level. A solution to this problem is the proposed Intrusion Detection System (IDS) with an implementation of more efficient algorithms that can perform routing decisions at every node. There are a couple of routing algorithms in the wireless sensor network which use topology data and takes routing decisions instantly. Extensions to the original position-based algorithm were subsequently presented to perform even more efficiently in conditions where they do not operate. Host growth brings about a route transition, which causes some network to settle on new routes. For ad hoc networks certain routing protocols have already been proposed. The fundamental idea is to allow cellular beneficiaries with bad channel conditions to use the ad hoc network to connect to those cellular collectors who experience great cellular channel conditions. The proposed system can also analyze the network by collecting enough data and detects irregular sensor node(s) behaviour. Finally, the current article explains the implementation of the lower algorithm in sensor networks for evaluating the network intrusion detection system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.