19-02-2013, 04:34 PM
Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN
Intrusion Detection.pdf (Size: 221.73 KB / Downloads: 82)
Abstract
Intrusion detection in Wireless Sensor Network (WSN) is widely used in many applications such as detecting an intruder. The intrusion detection is a mechanism for a Wireless Sensor Network to detect the existence of inappropriate, incorrect or unsuspicious moving attackers. WSN consumes lots of energy to detect an intruder. The main objective of this approach was developed under JFrame Builder tools is to provide simple and secure algorithm for energy efficient approach for external intrusion as well as internal intrusion detection. Wireless sensor networks (WSNs) often consist of tiny devices with limited energy, computational power, transmission range, and memory. WSNs offer a variety of potential means to monitor environments. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection. Our simulation results show the advantage of multiple sensor heterogeneous WSNs.
INTRODUCTION
n Intrusion detection system (IDS) is designed to detect unwanted attempts at accessing, disabling of computer mainly through a network, such as the Internet. Intrusion detection plays an key role in the area of network security, so an attempt to apply the idea in WSNs makes a lot of sense. Intrusion, i.e. unauthorized access or login (to the system, or the network or other resources); intrusion is a set of actions from internal or external of the network, which violate security aspects (including integrity, confidentiality, availability and authenticity) of a network’s resource. There are two approaches: misuse detection and anomaly detection. Misuse detection identifies an unauthorized use from signatures while anomaly detection identifies from analysis of an event. When both techniques detect violation; they raise an alarm signal to warn the system. Wang divides intrusion detection techniques into single-sensing detection and multi-sensing detection. In single-sensing detection, the intruder can be successfully detected by one sensor. While in multisensing detection, multiple collaborating sensors are used to detect the intrusion.
HETEROGENEOUS WSN
A heterogeneous wireless sensor network (WSN) consists of several different types of sensor nodes (SNs). Various applications supporting different tasks, e.g., event detection, localization, and monitoring may run on these specialized sensor nodes. In addition, new applications have to be deployed as well as new configurations and bug fixes have to be applied during the lifetime. In a network with thousands of nodes, this is a very complex task .A heterogeneous node has more complex processor and memory so that they can perform sophisticated tasks compared to a normal node. A heterogeneous node possesses high bandwidth and long distant transceiver than a normal node proving reliable transmission.
COMPARATIVE STUDY OF HETROGENEOUS WSN AND HOMOGENEOUS WSN
In homogeneous networks, all the sensor nodes are identical in terms of battery energy and hardware complexity. heterogeneous networks achieve the former and the homogeneous networks achieve the latter. In homogeneous network, single (uniform) platform is used for per research group and all nodes in the network share the same functionality where as in heterogeneous network all the nodes treated differently. In the real world, the assumption of homogeneous sensors may not be practical because sensing applications may require heterogeneous sensors in terms of their sensing and communication capabilities in order to enhance network reliability and extend network lifetime. Also, even if the sensors are equipped with identical hardware, they may not always have the same communication and sensing models. In fact, at the manufacturing stage, there is no guarantee that two sensors using the same platform have exactly the same physical properties. This taxonomy focuses on heterogeneity at the designing stage, when sensors are designed to have non identical capabilities to meet the specific needs of sensing applications.
RESULT AND SIMULATIONS
In the results, it shows a number of alarm messages and active nodes. This also represents the energy consumption. IDS mechanism detects unusual behavior from incorrect format. In case an incorrect packet is not related to transmission error (for example an incorrect node id), it raises an alarm signal to prepare for intruders. Then a group of activated nodes will be surrounded the intruders to protect from breaking into network. We have performed a simulation-based verification of our analytical results in both homogeneous and heterogeneous WSNs. The simulation is carried out for single-sensing. The analytical results are calculated by using Theorems 1-3.For successive simulation runs, the sensors are uniformly redistributed in the network domain.
CONCLUSION
This paper presents an energy efficient intrusion detection mechanism that improves life of WSN. Wireless sensor networks are vulnerable to several attacks because of their deployment in an open and unprotected environment. This paper describes the major security threats in heterogeneous WSN and also describes different intrusion detection techniques by using various algorithm Moreover, the paper also describes several existing approaches to find out how they have implemented their intrusion detection system.