INTRUSION DETECTION: AN ENERGY EFFICIENT APPROACH IN HETEROGENEOUS WSN

Under the guidance of Mr. V. Sridhar M-Tech
Asst . Professor

by:
Batch No: A3 Radhika. Ch Bhargavi. K SaiDeepthi. K RamyaSri. Ch

08C11A1230 08C11A1209 08C11A1239 08C11A1237

1

CONTENTS
o

Abstract

o
o

Necessity
Existing System

o
o o o o

Problem Statement
Solution Strategy Proposed System System Requirement Specifications Limitations
2

ABSTRACT

Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder.

Therefore we derive an algorithm for energy efficient external and internal intrusion detection.
We also analyze the probability of detecting the intruder for heterogeneous WSN. It considers single sensing and multi sensing intruder detection models.
3

NECESSITY

Intrusion Detection Systems (IDS) are used “to monitor a resource

and notify someone in the event of a specific occurrence for an
appropriate response” .

IDS is an alarm system and does not prevent malicious behaviour or
any other type of threat.

The idea is that the earlier an organization is aware of a malicious
attack or misuse, the better able it is to defend itself and its resources.
4

EXISTING SYSTEM

In single-sensing detection, at a time only one intruder detected by the WSN. Our Previous work was according to homogeneous heterogeneous single sensor in wireless sensor network. and

DISADVANTAGES:

The sensed information provided by a inadequate for recognizing the intruder.

single sensor might be

So that there is no guarantee for our information that has been sent 5 securely. Data will not routed if primary detector fails.

PROBLEM STATEMENT

The life span of wireless sensor network directly depends on the power. The power required to transfer a data from sensor is more compared to its internal processing. All sensors are performing the intrusion detection and passing this information to base station may cause unnecessary usage of power.

It is better to activate only few sensors within a region of WSN at a time for intrusion detection.
6

SOLUTION STRATEGY

One possible solution for intrusion detection is to use a "honey pot,"

which is a fake network that serves to attract the attackers so that you
can track their activities without exposing your real networks.

The "honey pot" appears to hackers, to be a part of your real network, whereas it is in fact isolated so that the hackers who break into it cannot reach the rest of your network.

Businesses can monitor the "honey pot" so that they can detect any intrusions early on and track them back to the hackers. 7

PROPOSED SYSTEM

In Heterogeneous wireless sensor ,Intruder detected anywhere in the network. We are detecting the intruder in multiple heterogeneous wireless sensor networks. ADVANTAGES:

If primary detector fails another detector detect the intruder. By finding the intruders we can send our information in a secured manner. 8

SYSTEM REQUIREMENT SPECIFICATIONS:
SOFTWARE REQUIREMENTS:
 

Operating System Front end

: Windows XP : Java

HARDWARE REQUIREMENTS:
  

Processor RAM Hard disk

: PENTIUM IV (2.6 GHz) : 1 GB : 80 GB

9

LIMITATIONS

Noise can severely effectiveness.

limit

an

Intrusion

detection

system's

Bad packets generated from software bugs, corrupt DNS data, and local packets that escaped can create a significantly high false-alarm rate. It is common for the number of real attacks to be far below the falsealarm rate.

10

THANK YOU

11

QUERIES?

12

Sign up to vote on this title
UsefulNot useful