Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks

(E-pub Ahead of Print)

Author(s): Vijander Singh, Ramesh C Poonia, Linesh Raja, Gourav Sharma, Narendra Kumar Trivedi.

Journal Name: Recent Patents on Computer Science

Become EABM
Become Reviewer

Abstract:

Background: Intrusion Detection System (IDS) is a Software application which gives the facility to monitor the traffic of network, event or activities on network and finds out any malicious operation if present.

Objective: In this paper, a new protocol was developed that can detect the Wireless Network Attack based on the reference of TCP/IP Model. In the proposed system the new feature is integrated in the IDS which are built in the router itself.

Methods: If any intruder tries to connect with router, intruder has to authenticate himself/herself. To find the authentication key the intruder attacks on the router to matches the authentication key with the key which he/she has. The intruder has a file with the multiple different keys in it and with that file intruder applies a brute-force attack on the router, the brute-force checks every key of the file by applying them on the router when a key matches with the authenticated key the brute-force software inform the intruder about the key matching. The IDS of the router will checks the rapid tries arriving from the same MAC address, if any MAC address tries the false key many of time than the IDS will identify the MAC as intruder and inform the system administrator about the intrusion by popping up a message on the system of the administrator.

Results: Simulation of the two different scenarios is done by using the Network simulator (NS 2) and NAM (Network animator). In scenario 1 the node 1 is intruder and the IDS protocols have figure it out. The intruder is labeled as 2. In scenario 2 node 1 is the sentinel node and it gets connected to router after authentication.

Conclusion: The mechanism can detect a false node in the network which is major threat in WSNs. Result has been evaluated the performance of IDS protocol by using Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for routing.

Keywords: Intrusion detection, security, attack, TCP/IP, WLAN, ns-2, packet.

Rights & PermissionsPrintExport Cite as

Article Details

(E-pub Ahead of Print)
DOI: 10.2174/2213275912666181207154754
Price: $95