International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126 | Views: 285

Research Paper | Information Technology | India | Volume 3 Issue 2, February 2014 | Popularity: 6.3 / 10


     

WSN: Various Attacks and IDS in WSN

Amol N. Rindhe, Sanjay V. Dhopte


Abstract: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. Intrusion detection system in wireless sensor network is one of the growing research areas in recent years. Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. Therefore, intrusion detection is one of the important aspects for wireless sensor networks. For the instrusion detection it is necessary to know the various attacks on WSN. In this report I mention several attacks on WSN and primarily focus only on the anomaly based intrusion detection system.


Keywords: IDS, WSN, Anomaly, Security, Threats, Sensor Network


Edition: Volume 3 Issue 2, February 2014


Pages: 88 - 90



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Amol N. Rindhe, Sanjay V. Dhopte, "WSN: Various Attacks and IDS in WSN", International Journal of Science and Research (IJSR), Volume 3 Issue 2, February 2014, pp. 88-90, https://www.ijsr.net/getabstract.php?paperid=2013849

Similar Articles

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 0

Informative Article, Information Technology, India, Volume 12 Issue 2, February 2023

Pages: 1722 - 1729

The Role of Artificial Intelligence in Data Analytics

Pranay Mungara

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022

Pages: 1382 - 1391

Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience

Wasif Khan

Share this Article
Top