07-01-2013, 04:40 PM
Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN
[attachment=46595]
Abstract-
Intrusion detection in Wireless Sensor Network (WSN) is widely used in many applications such as detecting an intruder. The intrusion detection is a mechanism for a Wireless Sensor Network to detect the existence of inappropriate, incorrect or unsuspicious moving attackers. WSN consumes lots of energy to detect an intruder. The main objective of this approach was developed under JFrame Builder tools is to provide simple and secure algorithm for energy efficient approach for external intrusion as well as internal intrusion detection. Wireless sensor networks (WSNs) often consist of tiny devices with limited energy, computational power, transmission range, and memory. WSNs offer a variety of potential means to monitor environments. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection. Our simulation results show the advantage of multiple sensor heterogeneous WSNs.
INTRODUCTION
an Intrusion detection system (IDS) is designed to detect unwanted attempts at accessing, disabling of computer mainly through a network, such as the Internet. Intrusion detection plays an key role in the area of network security, so an attempt to apply the idea in WSNs makes a lot of sense. Intrusion, i.e. unauthorized access or login (to the system, or the network or other resources); intrusion is a set of actions from internal or external of the network, which violate security aspects (including integrity, confidentiality, availability and authenticity) of a network’s resource. There are two approaches: misuse detection and anomaly detection. Misuse detection identifies an unauthorized use from signatures while anomaly detection identifies from analysis of an event. When both techniques detect violation; they raise an alarm signal to warn the system. Wang divides intrusion detection techniques into single-sensing detection and multi-sensing detection. In single-sensing detection, the intruder can be successfully detected by one sensor. While in multisensing detection, multiple collaborating sensors are used to detect the intrusion.
LITERATURE SURVEY
There exist several tools for security in networks and IDSs are important tools. Many solutions have been proposed in traditional networks but it cannot be applied directly to WSN because the resources of sensor nodes are restricted. Ad-hoc and WSNs security has been studied in a number of proposals.
Zhang and Lee [5] are among the first to study the problem of intrusion detection in wireless Ad-hoc networks. They proposed architecture for a distributed and cooperative intrusion detection system for Ad-hoc networks; their scheme was based on statistical anomaly detection techniques. But the scheme need much time, data and traffic to detect intrusion.
Detecting a moving intruder is a crucial application in wireless sensor networks, thus, first contact time when the intruder hits the sensing range of a sensor belonging to the large sensor cluster. To date, most of the existing work focus on the problem of network configuration for efficiently detecting the intruder within a pre-specified time threshold, under the constraints of tight power saving and/or cost efficiency.
Liu et al. [6] have explored the effects of sensor mobility on sensing coverage and detection capability in a mobile WSN. It is demonstrated that sensor mobility can improve the sensing coverage of the network, and provide fast detection of targeted events.
OUTCOME
In our survey we have studied about the intrusion detection, wireless sensor network and about the heterogeneous wireless sensor network and about the homogeneous wireless sensor network. In this approach we see that ID becomes very
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 3
fast and effective. Its detection rate and accuracy are high for using hybrid approach. Also we have studied about the WSN, Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. There are two types of WSN first, homogeneous WSN and second, heterogeneous WSN. We have chosen heterogeneous WSN for our servay because there are following advantages of heterogeneous WSN: