A Survey of Intrusion Detection Systems for Wireless Sensor Networks
Report
This is the paper review of the paper “A survey of Intrusion detection systems in WSNs by Ashfaq Hussain Farooqi and Farrukh Aslam Khan”. This report is being submitted to Madam. Dr. Mehreen Afzal in the course “Advanced Cryptography and Cryptanalysis” by “Iftikhar Zafar”
Center For Advance Studies In Engineering, CASE, Islamabad, Pakistan 12/22/2012
2
ABSTRACT:
Wireless sensor networks (WSNs) are in a wide usage. Many applications in military, ecology use them, which often need sensitive information. Security is therefore really important in WSNs. But many constraints of WSNs make security a challenge. Various kinds of attacks can target the network resultants in performance degradations and wrong info. The key management, authentication and secure routing protocols don’t secure WSNs against internal breach. IDS are a solution to this issue. Various approaches have been proposed. In this paper, different types of attacks on WSNs, various approaches of detection mechanisms in a WSNs are discussed. Introduction WSNs are a great advancement in wireless communication. They comprise of sink or base and a no. of sensor nodes deployed S.node gather useful info from their surroundings and transmits it to sink or BS which is user controlled Some app of WSNs at involve battle surveillance, volcanic observation, animal movement observation, tsunami prediction etc. WSNs are of interest to adversary as they are deployed in open and unprotected environments. In order to handle unknown attacks preservative mechanisms can be applied. Intrusion detection mechanisms can prevent intrudes and also acquires info about attacks techniques which can be useful in deploying prevention schemes. WSNs consist of sensor nodes and sink or base station(BS). Sensor nodes are small sized, low power and self-controlled. These nodes have low memory, less computation capacity and limited battery life.
References: [1]. Ashfaq Hussain Farooqi, Farrukh Aslam Khan “A survey of Intrusion Detection Systems for Wireless Sensor Networks” [2].David Culler, Deborah Estrin, Mani Srivastava (2004)”Overview of Sensor Networks” [3].Ruchi Bhatnagar, Dr. A.K. Srivastava, Anupriya Sharma(2010)” An Implementation Approach for Intrusion Detection System in Wireless sensor Network” , International Journal on Computer Science and Engineering Vol. 02. [4]. Dmitriy Martynov, Jason Roman, Samir Vaidya, and Huirong Fu (2007)” Design and Implementation of an Intrusion Detection System for Wireless Sensor Networks”. [5]. Yong Wang, Garhan Attebury, Byrav Ramamurthy (2006)” A Sur vey of Security Issues In Wireless Sensor Networks”. *6+. Teresa F.Lunt (1993)”A Survey of Intrusion detection techniques”. [7]. DOUGLAS J. BROWN, BILL SUCKOW, and TIANQIU WANG“A Survey of Intrusion Detection Systems”. 8 [8]. Vera Marinova-Boncheva (2007)” A Short Survey of Intrusion Detection Systems”. *9+. Stefan Axelsson (1999)”Research in IntrusionDetection systems: A Survey”.