International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-11,Issue-12  ( Dec, 2023 )
Past issues
  1. Volume-11,Issue-11  ( Nov, 2023 )
  2. Volume-11,Issue-10  ( Oct, 2023 )
  3. Volume-11,Issue-9  ( Sep, 2023 )
  4. Volume-11,Issue-8  ( Aug, 2023 )
  5. Volume-11,Issue-7  ( Jul, 2023 )
  6. Volume-11,Issue-6  ( Jun, 2023 )
  7. Volume-11,Issue-5  ( May, 2023 )
  8. Volume-11,Issue-4  ( Apr, 2023 )
  9. Volume-11,Issue-3  ( Mar, 2023 )
  10. Volume-11,Issue-2  ( Feb, 2023 )

Statistics report
Mar. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 132
Paper Published : 1541
No. of Authors : 4000
  Journal Paper

Paper Title :
Intrusion Detection System In Heterogeneous Wireless Sensor Network: A Design Approach

Author :Sneha Dhage, A.R. Tayal, Purnima Soni

Article Citation :Sneha Dhage ,A.R. Tayal ,Purnima Soni , (2014 ) " Intrusion Detection System In Heterogeneous Wireless Sensor Network: A Design Approach " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 13-18, Volume-2,Issue-6

Abstract : Abstract- Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation and performance of the system in the presence of and malicious nodes. Also, to address the energy consumption, gain in reliability, delay and security with the goal to maximize the lifetime of a clustered HWSN while satisfying application QoS requirements. The proposed research is a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with unreliable or malicious nodes. The proposed work considers trust attributes derived from communication and social networks to evaluate the overall trust of a sensor node. System describes a heterogeneous WSN comprising a large number of sensor nodes with vastly different social and quality of service (QoS) behaviors with the objective to yield “ground truth” node status through “weighted voting” leveraging knowledge of trust/reputation of neighbor nodes. To demonstrate the utility of the hierarchical trust management protocol, it can be apply to trust-based intrusion detection system. For trust-based intrusion detection, there exists an optimal trust threshold for minimizing false positives and false negatives probability. Furthermore, trust-based intrusion detection outperforms traditional anomaly-based intrusion detection approaches in both the detection probability and the false positive probability. The proposed research also makes use of AOMDV routing protocol which provides strong fault tolerance in WSNs. The protocol relies on a new multipath constructions paradigm that is defined specifically for heterogeneous WSN. The approach leverages a reasonable increase in the network lifetime and a higher resilience and fault tolerance.

Type : Research paper

Published : Volume-2,Issue-6


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 43
| Published on 2014-06-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World