Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Multiple Sensing Intrusion Detection System in Wireless Sensor Networks

Print
PDF
IJCA Proceedings on National Conference on Future Computing 2014
© 2014 by IJCA Journal
NCFC 2014 - Number 2
Year of Publication: 2014
Authors:
R. Brintha
S. Bhuvaneswari

R Brintha and S Bhuvaneswari. Article: Multiple Sensing Intrusion Detection System in Wireless Sensor Networks. IJCA Proceedings on National Conference on Future Computing 2014 NCFC 2014(1):5-8, January 2014. Full text available. BibTeX

@article{key:article,
	author = {R. Brintha and S. Bhuvaneswari},
	title = {Article: Multiple Sensing Intrusion Detection System in Wireless Sensor Networks},
	journal = {IJCA Proceedings on National Conference on Future Computing 2014},
	year = {2014},
	volume = {NCFC 2014},
	number = {1},
	pages = {5-8},
	month = {January},
	note = {Full text available}
}

Abstract

Availing security in a wireless sensor network requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The openness of wireless sensor network model makes it vulnerable and prone to sophisticated intrusion attacks like Denial of Service (DDOS) and side channel attacks. To handle large scale network access traffic and administrative control of data and application in wireless sensor network, a Multiple Sensing Intrusion Detection model has been proposed. Our proposed Multiple Sensing Intrusion Detection model handles large flow of data packets, analyze them and generate reports efficiently by finding the probability of network being attacked by an intruder. The intrusion distance, the minimum coverage of an area where the intruder can be sensed is found and multiple (sensing) detectors are situated there to detect the intruder once it enters or establishes its effect in the network.

References

  • R. Hemenway, R. Grzybowski, C. Minkenberg, and R. Luijten, "Optical-packet-switched interconnect for supercomputer applications,"OSA J. Opt. Netw. , vol. 3, no. 12, pp. 900–913, Dec. 2004.
  • C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, M. Gusat, P. Dill, I. Iliadis, R. Luijten, B. R. Hemenway, R. Grzybowski, and E. Schiattarella, "Designing a crossbar scheduler for HPC applications,"IEEE Micro, vol. 26, no. 3, pp. 58–71, May/Jun. 2006.
  • E. Oki, R. Rojas-Cessa, and H. Chao, "A pipeline-based approach formaximal-sized matching scheduling in input-buffered switches," IEEE Commun. Lett. , vol. 5, no. 6, pp. 263–265, Jun. 2001.
  • C. Minkenberg, I. Iliadis, and F. Abel, "Low-latency pipelined crossbar arbitration," in Proc. IEEE GLOBECOM, Dallas, TX, vol. 2, pp. 1174–1179, 2004.
  • C. Minkenberg, R. Luijten, F. Abel, W. Denzel, and M. Gusat, "Current issues in packet switch design," ACM Comput. Commun. Rev. , vol. 33, no. 1, pp. 119–124, Jan. 2003.
  • C. Minkenberg, F. Abel, P. Müller, R. Krishnamurthy, and M. Gusat,"Control path implementation of a low-latency optical HPC switch," inProc. Hot Interconnects 13, Stanford, CA, pp. 29–35,Aug. 2005.
  • C. -S. Chang, D. -S. Lee, and Y. -S. Jou, "Load-balanced Birkhoff-von Neumann switches, part I: One-stage buffering," Elsevier Comput. Commun. , vol. 25, pp. 611–622, 2002.
  • A. Tanenbaum, Computer Networks, 3rd ed. Englewood Cliffs, NJ: Prentice Hall, 1996.
  • R. Krishnamurthy and P. Müller, "An input queuing implementation for low-latency speculative optical switches," in Proc. X Int. Conf. Parallel Processing Techniques and Applications (PDPTA'07), Las Vegas, NV, vol. 1, pp. 161–167, , Jun. 2007.
  • H. Takagi, Queueing Analysis, Volume 3: Discrete-Time Systems. Amsterdam: North-Holland, 1993.