Abstract

Objectives: This research developed an IDS based on cross layer interaction between network, and MAC layers of OSI model. XLID is checked against other traditional (non-cross-layered) IDS that are based on single layer protocol. Methods/ Statistical Analysis: For this purpose, a simulator was built specifically for simulating the proposed approach. XLID showed its superiority in terms of number of detected intruders, power consumption, and throughput, over other noncross-layered IDS. Findings: Based on the results XLID enhanced the intrusion detection rate by 42% on average, 75% higher throughput to base station, and a 23% reduction of power consumption compared to non-cross-layered IDS. Moreover, the total energy saved during simulation time ranges from 25% up to 45% compared to non-cross-layered IDS. Application/Improvements: Findings pointed out that, the detection rate at Network layer ranges from 5% up to 18% compared to non-cross-layered IDS, while it is from 2% up to 15% in the MAC layer. Keywords: Cross-Layer Intrusion Detection, Intrusion Detection System (IDS), Security Attacks, Wireless Sensor Networks (WSNs)

Highlights

  • Wireless Sensor Network (WSN) is a sort of system that have many minor gadgets, detecting and gathering point by point data about a physical situation

  • The second attempt of simulation was for 427.5s, and the third simulation experiment has been executed for a time of 394.7s.Table 2 summarizes the results of each detection method for both number of intruders, and total energy consumption

  • Numerous interruption identification framework (IDS) have been proposed to anchor WSNs, yet a large portion of these frameworks work in a solitary layer of the OSI display

Read more

Summary

Introduction

Wireless Sensor Network (WSN) is a sort of system that have many (from handfuls to thousands) minor gadgets, detecting and gathering point by point data about a physical situation. WSNs arrange must be adaptable, solid, secure, self-association and have adaptation to noncritical failure1 These networks are composed of sensor nodes and sinks. Numerous security-related answers for WSNs have been proposed, for example, validation, key trade, and secure steering or security systems for explicit assaults. The reason for an aggressor is to upset the security traits of WSNs, including privacy, trustworthiness, accessibility and validation To accomplish these goals, the assailant may dispatch assaults from various convention layers of WSNs. At the physical layer, the aggressor can stick the physical channel by meddling with the radio frequencies that hubs use for correspondence. Three main type of WSN intrusion detection techniques were discussed in, they are Anomaly detection, Misuse detection and Specificationbased detection

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.