Professional Documents
Culture Documents
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856
malicious node. The vast varieties of security threats can happen in wireless sensor network because of its nature. The current security solutions can be classified in following categories: 1) Key management: Many of the ideas have been developed in defining cryptographic keys for security which provides encryption and authentication [1]. 2) Authentication and Secure Routing: Several protocols [2] have been implemented that protects the data to be revealed to the unauthorized party. 3) Secure services: Certain progress has been made in providing specialized secure services, like secure localization [3], secure aggregation [4] and secure time synchronization [5]. The above solutions basically come under the primary line of defense which is the prevention based techniques. The main problem with these solutions is that only few predefined security attacks can be handled. On the contradictory, the wireless sensor network is vulnerable to bounty of attacks. Therefore, we always need a second line of defense which provides detection based solution i.e. Intrusion Detection System.
Keywords: Clusters, Cluster Head, Function Point, Intrusion Detection System, Node Feature Value, Wireless Sensor Network.
1. INTRODUCTION
Wireless sensor network (WSN) is the most interesting and promising wireless technology that has wide variety of applications and provide unlimited potentials. The wireless sensor network comprises of plenty of small sized, low power, inexpensive and resource constrained sensor devices which communicate through radio frequency. Each sensor node senses some physical phenomenon (e.g., temperature, pressure, light etc.) inside deployment area. The collected details are sent to a base station. The sensor nodes cannot directly communicate to base station. Therefore, data are passed from multiple layers or hierarchy and sent ultimately to base station Figure 1 depicts the wireless sensor network with one base station that is depicted as the black outlined circle and sensor nodes that are depicted as blue ones. The star boundary specifies the range of communication. Many of the operations of sensor nodes remain unattended and the sensor nodes need to work in hostile environment. That raises an important issue of security. There is always a possibility to get stuck. That results in an anomaly data reception because of the compromised or Volume 2, Issue 6 November December 2013
Figure 1. A wireless sensor network with one base station. In this paper, the effort has been made to define the powerful yet trouble-free solution for developing intrusion detection system which may set aside the wireless sensor network from the primary security threats. The rest of the paper is organized as follows: the foundation of the intrusion detection system and the related work is discussed in section 2. Section 3 dictates the network model for incremental intrusion detection system. The main algorithm for detecting malicious node is explored in section 4 and section 5 concludes the paper and suggests the research thrust area for defining more commanding intrusion detection system for wireless sensor network. Page 322
5. CONCLUSION
Volume 2, Issue 6 November December 2013
Page 326