INTRUSION DETECTION TECHNIQUE FOR WIRELESS SENSOR NETWORK AND ITS IMPLEMENTATION ISSUES
BY
OMBU DIENEBI
DSPZ/H/SST/10/15601
DEPARTMENT OF COMPUTER SCIENCE,
SCHOOL OF SCIENCE AND TECHNOLOGY,
DELTA STATE POLYTECHNIC, OZORO
SEPTEMBER, 2012
Title Page
INTRUSION DETECTION TECHNICQUE FOR WIRELESS SENSOR NETWORK AND ITS IMPLEMENTATION ISSUES
BY
OTOIKHIAN OHIMAI GABRIEL
DSPZ/H/SST/10/15601
A PROJECT REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE, SCHOOL OF SCIENCE AND TECHNOLOGY, DELTA STATE POLYTECHNIC, OZORO
IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN COMPUTER SCIENCE
OCTOBER, 2012
Declaration
I hereby declare that this project is entitled “Intrusion Detection Technique for Wireless Sensor Network and its Implementation Issues” is an original of my research work. All published literatures used are duly reference.
Otoikhian Ohimai Gabriel | | Date | The above declaration is hereby confirmed | | | | Mr. Wilfred Adigwe | | Date |
Certification
This is to certify that this project entitled “Intrusion Detection Technique for Wireless Sensor Network and its Implementation Issues” submitted by Otoikhian Ohimai Gabriel, meets the regulations governing the award of Higher National Diploma (HND) in Computer Science and it is hereby, approved for its contributions to knowledge and literature presentation.
Mr. Wilfred AdigweProject Supervisor | | Date | Mr. Wilfred AdigweHead of Department | | Date | Dean School of Science & Technology | | Date |
Dedication
This project is dedicated to Jehovah Almighty and to the entire family of Pa. G. U. Otoikhian, Children, Grandchildren, Great Grandchildren and the unborn.
Acknowledgement
In the first instance, I wish to return all glory to Jehovah almighty for His abundant grace, blessing and favour during my stay in this school and in this project. I specifically acknowledge my family members especially my
References: Bace. R (2000): “Intrusion Detection”. MacMillan Technical Publishing London Bhuse V., Terwilliger M., Gupta A., Kamal Z Bhargava, S and Agrawal, D. (2001) “Security enhancements in AODV protocol for wireless adhoc networks”, in Proceedings of Vehicular Technology Conference,. Chebrolu S., Abraham A. and Thomas J.( 2004.) Feature Deduction andEnsemble Design of Intrusion Detection Systems, Computers and Security, Elsevier Science, 2005 (in press). http://dx.doi.org/10.1016/j.cose. Chaudhary, V., (2007) “Wireless sensor network security - a survey”, Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, CRC Press. Denning, D.(1987): “An Intrusion Detection Model”, IEEE Transactions on Software Engineering, 13(2):222—232, Du, W., Fang, L Duarte-Melo E. J. and M. Liu. (2000): Analysis of energy consumption and Lifetime of heterogeneous wireless sensor networks. Ephremides, A. Wieselthier, J. and Baker, D (1987.) “A design concept for reliable mobile radio networks with frequency hopping signaling”, Proceedings of the IEEE, 75(1):56-73, Jan. Estrin, D. Govindan, R. Heidemann, R.S. and Kumar, S. (1999.) Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263 Fernandes, L Huang, Y. and W. Lee, (2003): “A Cooperative Intrusion Detection System for Adhoc Networks,” In Proceedings of the ACM Workshop on Security of Adhoc and Sensor Networks (SASN '03), Fairfax VA. Intanagonwiwat, C., Govindan, R. & Estrin, D., (2003) “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transaction on Networking, VOL. 11, NO. 1. Intanagonwiwat, C Govindan R, and Estrin, D (2000.) “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks”, Mobile Computing and Networking, pages 56-67 J John A. Stankovic (2006). Wireless Sensor Networks (pp. 1-11). Charlottesville, Virginia 22904. Kumar, S. (1995): “Classification and detection of computer intrusions”, PhD thesis, Purdue University, Karlof, C Lin, R., Wang, Z. & Sun, Y., (2004) “Wireless Sensor Networks Solutions for Real Time Monitoring of Nuclear Power Plant in”, The Proceedings of the 5’ World Congress on intelligent Control and Automation, Hangzhou, P.R. China. lead, N.R Perkins, C. and P. Bhagwat. (1994) “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, proceedings of the ACM SIGCOMM. Royer E.M. and Toh C-K (1999) “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications. Saxena, M., (2007) “Security in Wireless Sensor Networks – A Layer based classification”, Technical Report [CERIAS TR 2007-04], Center for Education and Research in Information Assurance and Security - CERIAS, Purdue University. Wang, W and Lu, A. (2004): “ Interactive wormhole detection in large scale wireless networks” Wei Ye Heidemann, J Woo, A. and Culler, D., (2001) “A Transmission Control Scheme for Media Access in Sensor Networks”, Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2001), Rome, Italy. Zhang Y and Lee W. (2000) "Intrusion detection in wireless adhoc networks," ACM MOBICOM. Zhu, S. Setia, S. and Jajodia. S(2003): efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62, New York, NY, USA.