International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-7  ( Jul, 2020 )
Past issues
  1. Volume-8,Issue-6  ( Jun, 2020 )
  2. Volume-8,Issue-5  ( May, 2020 )
  3. Volume-8,Issue-4  ( Apr, 2020 )
  4. Volume-8,Issue-3  ( Mar, 2020 )
  5. Volume-8,Issue-2  ( Feb, 2020 )
  6. Volume-8,Issue-1  ( Jan, 2020 )
  7. Volume-7,Issue-12  ( Dec, 2019 )
  8. Volume-7,Issue-11  ( Nov, 2019 )
  9. Volume-7, Issue-10  ( Oct, 2019 )
  10. Volume-7, Issue-9  ( Sep, 2019 )

Statistics report
Sep. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 90
Paper Published : 1248
No. of Authors : 3136
  Journal Paper

Paper Title
Intrusion Detection System In Heterogeneous Wireless Sensor Network: A Design Approach

Abstract- Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation and performance of the system in the presence of and malicious nodes. Also, to address the energy consumption, gain in reliability, delay and security with the goal to maximize the lifetime of a clustered HWSN while satisfying application QoS requirements. The proposed research is a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with unreliable or malicious nodes. The proposed work considers trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. System describes a heterogeneous WSN comprising a large number of sensor nodes with vastly different social and quality of service (QoS) behaviors with the objective to yield “ground truth” node status through “weighted voting” leveraging knowledge of trust/reputation of neighbor nodes. To demonstrate the utility of the hierarchical trust management protocol, it can be apply to trust-based intrusion detection system. For trust-based intrusion detection, there exists an optimal trust threshold for minimizing false positives and false negatives probability. Furthermore, trust-based intrusion detection outperforms traditional anomaly-based intrusion detection approaches in both the detection probability and the false positive probability. The proposed research also makes use of AOMDV routing protocol which provides strong fault tolerance in WSNs. The protocol relies on a new multipath constructions paradigm that is defined specifically for heterogeneous WSN. The approach leverages a reasonable increase in the network lifetime and a higher resilience and fault tolerance.

Author - Sneha Dhage, A.R. Tayal, Purnima Soni

| PDF |
Viewed - 37
| Published on 2014-06-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World