energy and memory efficient clone detection in wireless sensor networks

F.Vladymir,J.Sivanesa Selvan,D.Prabhu

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 03 April,2017         Pages:1334-1341

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder. Therefore we derive an algorithm for energy efficient external and internal intrusion detection. We also analyse the probability of detecting the intruder for heterogeneous WSN. This paper considers single sensing and multi sensing intruder detection models. It is found that our experimental results validate the theoretical results.

Kewords

WSN, MANET SPINS,LEAPS

Reference

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A Survey on Sensor Networks”, IEEECommunication Magazine, vol. 40, no. 8, pp. 102-14, Aug. 2002. [2] Lee, J.J., Krishnamachari, B., Kuo, C.C.J.: Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks (IEEE SECON). (2004) [3] Hu, W., Chou, C.T., Jha, S., and Bulusu, N.: Deploying Long- Lived and Cost-effective Hybrid Sensor Networks. Elsevier Ad- Hoc Networks, Vol. 4, Issue 6. (2006) 749-767. [4] A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. [5] I. Onat and A. Miri, “An intrusion detection system for wireless sensor networks,” in Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, Montreal, Canada, August 2005, pp. 253–259. [6] A. Perrig, et al., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, 8(5):521- 534, Sep. 2002. [7] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks”, Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 03), Oct. 2003. [8] J. Deng, R. Han, and S. Mishra, “A Performance Evaluation of Intrusion-tolerant Routing in Wireless Sensor Networks”, Proc. of the 2nd Int. IEEE Workshop on Information Processing in Sensor Networks (IPSN03), Apr. 2003. [9] Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, “Intrusion detection in homogeneous and heterogeneous wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 698–711, 2008. [10] O. Dousse, C. Tavoularis, and P. Thiran, “Delay of intrusion detection in wireless sensor networks,” in Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2006.