Evaluating The Performance Of Wireless Sensor Networks, Wsn After The Introduction Of Intrusion Detection System Ids

Read Complete Research Material



[EVALUATING ThE PERFORMANCE OF WIRELESS SENSOR NETWORKS, WSN AFTER THE INTRODUCTION OF INTRUSION DETECTION SYSTEM IDS]

by

Abstract

This dissertation is based on the topic of “WIRELESS SENSOR NETWORKS, WSN AFTER THE INTRODUCTION OF INTRUSION DETECTION SYSTEM IDS”. The first chapter provides an introduction to the topic including the purpose and significance of the study. The second chapter presents a review of relevant literature, highlighting the previous research carried out in this field. The third chapter covers the methodology for this study, followed by the analysis of findings and discussion. The fourth chapter concludes the dissertation, providing implications and useful recommendations for further research.

Acknowledgement

I would take this opening to express gratitude my study supervisor, family and associates for their support and guidance without which this study would not have been possible Table of Contents

ABSTRACT2

ACKNOWLEDGEMENT3

CHAPTER 1: INTRODUCTION5

CHAPTER 2. BACKGROUND14

2.1. Wireless Sensor Networks16

2.2. Intrusion Detection System18

2.3. Finite State Machine21

CHAPTER 4. CASE STUDY27

CHAPTER 4. RESULTS AND CONCLUSION34

REFERENCES43

APPENDIX I: TABLES46

Chapter 1: Introduction

Many mission critical wireless sensor systems need an effective, lightweight and flexible intrusion detection algorithm to recognise malicious attackers. In this paper, we suggest a circulated group-based intrusion detection design that meets all the overhead obligations by partitioning the sensor systems into numerous assemblies in which the sensors in each assembly are bodily close to each other and are equipped with the identical feeling capability. Our intrusion detection algorithm takes simultaneously into concern of multiple attributes of the sensor nodes to notice malicious attackers precisely. We show through experiments with genuine facts and figures that our algorithm can decline the untrue alarm rate and boost the detection correctness contrasted with living intrusion detection designs while lowering the computation and transmission power consumption.

Background

Wireless sensor systems have become one of the most interesting and undertaking study and development localities over the past few years. Such systems generally consist of hundreds or even thousands of small-sized, reduced power, cheap sensors to monitor some exact phenomenon cooperatively. The characteristics of sensor networks such as flexibility, self-organization, fault tolerance, high sensing fidelity, reduced cost and rapid deployment have conceived many new and stimulating submissions such as wildlife monitoring, catastrophe answer, infantry surveillance, smart building and developed value control, to title a few.

In general, the sensors in a mesh are established in unattended natural environment or even hostile circumstance, and broadcast with each other utilising wireless signals which can be eavesdropped very easily. The guarded capability of wireless sensor nodes such as limitation in computation power, recollection and electric battery lifetime farther increases the insecurity of wireless sensor networks. Many different types of attacks against wireless sensor systems have been recognised so far, e.g., bogus routing and felt data strike, choose ahead strike, sink hole strike, worm hole strike, very dark aperture strike and hello flood strike, etc. . . .

Purpose

For the reasons of investigation and replication in this paper, two popular wireless propagation models are introduced. A line-of-sight route between the transmitter and receiver is presumed in the free space propagation model. In compare to free space propagation form, both the direct ...
Related Ads