Intrusion Detection Systems in Wireless Sensor Networks

Topics: OSI model, Wireless sensor network, Internet Protocol Suite Pages: 9 (2943 words) Published: December 30, 2012

A Survey of Intrusion Detection Systems for Wireless Sensor Networks Report
This is the paper review of the paper “A survey of Intrusion detection systems in WSNs by Ashfaq Hussain Farooqi and Farrukh Aslam Khan”. This report is being submitted to Madam. Dr. Mehreen Afzal in the course “Advanced Cryptography and Cryptanalysis” by “Iftikhar Zafar”

Center For Advance Studies In Engineering, CASE, Islamabad, Pakistan 12/22/2012



Wireless sensor networks (WSNs) are in a wide usage. Many applications in military, ecology use them, which often need sensitive information. Security is therefore really important in WSNs. But many constraints of WSNs make security a challenge. Various kinds of attacks can target the network resultants in performance degradations and wrong info. The key management, authentication and secure routing protocols don’t secure WSNs against internal breach. IDS are a solution to this issue. Various approaches have been proposed. In this paper, different types of attacks on WSNs, various approaches of detection mechanisms in a WSNs are discussed. Introduction WSNs are a great advancement in wireless communication. They comprise of sink or base and a no. of sensor nodes deployed S.node gather useful info from their surroundings and transmits it to sink or BS which is user controlled Some app of WSNs at involve battle surveillance, volcanic observation, animal movement observation, tsunami prediction etc. WSNs are of interest to adversary as they are deployed in open and unprotected environments. In order to handle unknown attacks preservative mechanisms can be applied. Intrusion detection mechanisms can prevent intrudes and also acquires info about attacks techniques which can be useful in deploying prevention schemes. WSNs consist of sensor nodes and sink or base station(BS). Sensor nodes are small sized, low power and self-controlled. These nodes have low memory, less computation capacity and limited battery life.

In an outside attack key management, authentication and secure routing protocols restrict the adversary from getting access to the resources. While in an inside attack, nodes starts behaving maliciously. These attacks exploit the constrains of WSNs. Their aim is not to access the network but to drop the important info being delivered to sink or BS. A sensor consists of 4 basic parts 1).A sensing unit 2).Processing unit 3).Transceiver unit 4). Power unit It may also have location finding system, power generation and mobilize sensing units composed of sub unit 1) ADCs and 2) sensor. The processing unit associated with the small stage units helps sensor unit to coordinate with other nodes. The transceiver unit connects the node to the network. The one of the most important unit is power unit .Which may be infinite or supported by powers scavenging devices. Location finding system helps the sensor network with routing techniques and sensing task to get knowledge about location. Depending on the app a mobilize may be needed to move the sensor board. The protocol tag used in sensor nodes contain physical data link, network, and transport and application layer defined as follows: Physical Layer: Physical Layer responsible for the frequency selection, signal detection, career frequency generation, modulation and inscription. Data Link Layer: Data link layer is responsible for data multiple flexing from detecton, medium access and error control. It also ensures secure point to point and point to multipoint connection.


Network Layer: Network layer is responsible for assignment of addresses and packets forwardness. Transport Layer: Transport layer is responsible for valuables delivery of packets. Application Layer: Application layer is responsible for how data are requested and provided for sensor nodes and interactions with the user. CONSTRAINS IN WSNs WSNs network containing sensor nodes are recourse constrains. They have limited storage capacity , processing...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Applying an Intrusion Detection Algorithm to Wireless Sensor Networks Essay
  • Intrusion Detection Technique for Wireless Sensor Network and Its Implementation Issues Essay
  • Wireless Sensor Network Essay
  • Essay on A Secure Intrusion Detection System Against Ddos Attack in Wireless Mobile Ad1
  • A Study of Wireless Sensor Network Research Paper
  • wireless sensors networks Research Paper
  • Routing in Wireless Sensor Networks Essay
  • Wireless Sensor Network Essay

Become a StudyMode Member

Sign Up - It's Free