Data Integrity And Intrusion Detection In Wireless Sensor Networks

被引:0
|
作者
Acharya, Rathanakar [1 ]
Asha, K. [1 ]
机构
[1] Alliance Business Acad Bangalore, PG Dept Comp Applicat, Bangalore, Karnataka, India
关键词
Couple Algorithm; wireless sensor networks; ad-hoc networks; Intrusion detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are emerging as cost effective solutions to critical applications such as remote monitoring of strategic installations covering large geographical areas, pollution control and disaster recovery. Their ability of self-organization, built-in redundancy and operational capabilities without needing human intervention make Wireless Sensor Networks suitable for such remote monitoring applications. But the unattended operation of WSNs and limited processing capabilities of the individual nodes make them vulnerable to a variety of security attacks, especially disruption of information flow or data corruption. For wired or wireless ad-hoc networks, there exist several automated systems for maintaining their functional integrity. Unfortunately, these strategies are not directly applicable to WSNs since ad-hoc networks are not as resource constrained as WSNs. This paper tries to develop distributed algorithms for detecting anomalous activity in information flow patterns in large-scale sensor networks. These algorithms will be used as building blocks of an integrated system for intrusion detection, attack isolation and fully automated response for assuring WSN survivability and information flow continuity.
引用
收藏
页码:462 / +
页数:2
相关论文
共 50 条
  • [1] On Data-centric Intrusion Detection in Wireless Sensor Networks
    Riecker, Michael
    Barroso, Ana
    Hollick, Matthias
    Biedermann, Sebastian
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 325 - 334
  • [2] Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 127 - 131
  • [3] Intrusion Detection in Wireless Sensor Networks
    Mettu, NaveenaReddy
    Sasikala, T.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 84 - 89
  • [4] Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Romano, Luigi
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 247 - 254
  • [5] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [6] Adaptive intrusion detection in wireless sensor networks
    Techateerawat, Piya
    Jennings, Andrew
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 23 - 28
  • [7] An Intrusion Detection Algorithm for Wireless Sensor Networks
    Eissa, Alaa
    Zied, Samir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 80 - 85
  • [8] Cooperative Intrusion Detection in Wireless Sensor Networks
    Krontiris, Ioannis
    Benenson, Zinaida
    Giannetsos, Thanassis
    Freiling, Felix C.
    Dimitriou, Tassos
    [J]. WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2009, 5432 : 263 - +
  • [9] Anomaly intrusion detection in wireless sensor networks
    Bhuse, V
    Gupta, A
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (01) : 33 - 51
  • [10] Behavioural Intrusion Detection for Wireless Sensor Networks
    Smith, A.
    Ramotsoela, T. D.
    Hancke, G. F.
    [J]. PROCEEDINGS OF 2021 IEEE 30TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2021,