A Survey of Intrusion Detection System in Wireless Sensor Networks

Author: Mehul S. Patel, Govind V. Patel, Jayesh M. Mevada, Ankur J. Goswami, Rupal R. Chaudhari
Published Online: January 30, 2024
DOI: https://doi.org/10.63766/spujstmr.24.000009
Abstract
References

Remote sensor networks is more valuable where we can't lay out the conventional organization. The remote sensor network comprises of sensor hub, which has detecting parts, on-board handling, conveying and stockpiling capacities. Sensor hubs have less memory and less figuring power. Due to the large number of sensor nodes used in a variety of applications, there may not be a global identification number for sensor nodes. Every sensor hub detects the data and through information collection sends this data to a baser station. Remote sensor networks are open in nature and there are no cryptographic systems or security for sensor hubs to shield from outside Assaults. So we required the interruption recognition framework should be presented. Sensor hubs have restricted assets so we require Interruption distinguish frameworks such as lightweight and productive. Interruption identification conspires in a remote sensor network to distinguish the pernicious hub or gatecrasher. This paper presents a review of Interruption Discovery Frameworks in Remote Sensor Organizations. Out of a few identification methods, this paper centers on signature-based, Oddity based and half, and half-based procedures.

Keywords: intrusion detection, Sensor security, wireless sensor network, sensor node, malicious node, attacks
Download PDF Pages ( 56-60 ) Download Full Article (PDF)
←Previous