{"title":"基于状态上下文和分层信任的无线传感器网络入侵检测与防御","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441415","DOIUrl":null,"url":null,"abstract":"This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks\",\"authors\":\"R. Maidhili, G. Karthik\",\"doi\":\"10.1109/ICCCI.2018.8441415\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN\",\"PeriodicalId\":141663,\"journal\":{\"name\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI.2018.8441415\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441415","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks
This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN