Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks

Author(s): Vijander Singh*, Gourav Sharma, Ramesh C. Poonia, Narendra K. Trivedi and Linesh Raja

Volume 14, Issue 1, 2021

Published on: 07 December, 2018

Page: [43 - 47] Pages: 5

DOI: 10.2174/2213275912666181207154754

Price: $65

Abstract

Background: Intrusion Detection System (IDS) is a Software application which gives the facility to monitor the traffic of network, event or activities on network and finds out any malicious operation if present.

Objective: In this paper, a new protocol was developed that can detect the Wireless Network Attack based on the reference of TCP/IP Model. In the proposed system the new feature is integrated in the IDS which are built in the router itself.

Methods: If any intruder tries to connect with router, intruder has to authenticate himself/herself. To find the authentication key the intruder attacks on the router to matches the authentication key with the key which he/she has. The intruder has a file with the multiple different keys in it and with that file intruder applies a brute-force attack on the router, the brute-force checks every key of the file by applying them on the router when a key matches with the authenticated key the brute-force software inform the intruder about the key matching. The IDS of the router will checks the rapid tries arriving from the same MAC address, if any MAC address tries the false key many of time than the IDS will identify the MAC as intruder and inform the system administrator about the intrusion by popping up a message on the system of the administrator.

Results: Simulation of the two different scenarios is done by using the Network simulator (NS 2) and NAM (Network animator). In scenario 1 the node 1 is intruder and the IDS protocols have figure it out. The intruder is labeled as 2. In scenario 2 node 1 is the sentinel node and it gets connected to router after authentication.

Conclusion: The mechanism can detect a false node in the network which is major threat in WSNs. Result has been evaluated the performance of IDS protocol by using Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for routing.

Keywords: Intrusion detection, security, attack, TCP/IP, WLAN, ns-2, packet.

Graphical Abstract

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy