Downloads: 126 | Views: 285
Research Paper | Information Technology | India | Volume 3 Issue 2, February 2014 | Popularity: 6.3 / 10
WSN: Various Attacks and IDS in WSN
Amol N. Rindhe, Sanjay V. Dhopte
Abstract: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. Intrusion detection system in wireless sensor network is one of the growing research areas in recent years. Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. Therefore, intrusion detection is one of the important aspects for wireless sensor networks. For the instrusion detection it is necessary to know the various attacks on WSN. In this report I mention several attacks on WSN and primarily focus only on the anomaly based intrusion detection system.
Keywords: IDS, WSN, Anomaly, Security, Threats, Sensor Network
Edition: Volume 3 Issue 2, February 2014
Pages: 88 - 90
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1597 - 1600Real - Time Monitoring and Alerting Systems for Fintech
Ankur Mahida
Downloads: 0
Informative Article, Information Technology, India, Volume 12 Issue 2, February 2023
Pages: 1722 - 1729The Role of Artificial Intelligence in Data Analytics
Pranay Mungara
Downloads: 0
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2487 - 2494Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices
Jeevan Manda
Downloads: 0
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022
Pages: 1382 - 1391Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience
Wasif Khan