Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
In recent years, wireless sensor network (WSN) is used in several application areas resembling observance, tracking, and dominant in IoTs. for several applications of WSN, security is a crucial demand. However, security solutions in WSN disagree from ancient networks because of resource limitation and process constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. This paper additionally presents characteristics, security needs, attacks, cryptography algorithms, and operation modes. This paper is taken into account to be helpful for security designers in WSNs.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
In recent years, wireless sensor network (WSN) is used in several application areas resembling observance, tracking, and dominant in IoTs. for several applications of WSN, security is a crucial demand. However, security solutions in WSN disagree from ancient networks because of resource limitation and process constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. This paper additionally presents characteristics, security needs, attacks, cryptography algorithms, and operation modes. This paper is taken into account to be helpful for security designers in WSNs.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Now-a-days, Internet has become an important part of human’s life, a person
can shop, invest, and perform all the banking task online. Almost, all the organizations have
their own website, where customer can perform all the task like shopping, they only have to
provide their credit card details. Online banking and e-commerce organizations have been
experiencing the increase in credit card transaction and other modes of on-line transaction.
Due to this credit card fraud becomes a very popular issue for credit card industry, it causes
many financial losses for customer and also for the organization. Many techniques like
Decision Tree, Neural Networks, Genetic Algorithm based on modern techniques like
Artificial Intelligence, Machine Learning, and Fuzzy Logic have been already developed for
credit card fraud detection. In this paper, an evolutionary Simulated Annealing algorithm is
used to train the Neural Networks for Credit Card fraud detection in real-time scenario.
This paper shows how this technique can be used for credit card fraud detection and
present all the detailed experimental results found when using this technique on real world
financial data (data are taken from UCI repository) to show the effectiveness of this
technique. The algorithm used in this paper are likely beneficial for the organizations and
for individual users in terms of cost and time efficiency. Still there are many cases which are
misclassified i.e. A genuine customer is classified as fraud customer or vise-versa.
Wireless sensor networks (WSN) have been widely used in various applications.
In these networks nodes collect data from the attached sensors and send their data to a base
station. However, nodes in WSN have limited power supply in form of battery so the nodes
are expected to minimize energy consumption in order to maximize the lifetime of WSN. A
number of techniques have been proposed in the literature to reduce the energy
consumption significantly. In this paper, we propose a new clustering based technique
which is a modification of the popular LEACH algorithm. In this technique, first cluster
heads are elected using the improved LEACH algorithm as usual, and then a cluster of
nodes is formed based on the distance between node and cluster head. Finally, data from
node is transferred to cluster head. Cluster heads forward data, after applying aggregation,
to the cluster head that is closer to it than sink in forward direction or directly to the sink.
This reduction in distance travelled improves the performance over LEACH algorithm
significantly.
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
This paper presents the design and performance comparison of a two stage
operational amplifier topology using CMOS and BiCMOS technology. This conventional op
amp circuit was designed by using RF model of BSIM3V3 in 0.6 μm CMOS technology and
0.35 μm BiCMOS technology. Both the op amp circuits were designed and simulated,
analyzed and performance parameters are compared. The performance parameters such as
gain, phase margin, CMRR, PSRR, power consumption etc achieved are compared. Finally,
we conclude the suitability of CMOS technology over BiCMOS technology for low power
RF design.
In Cognitive Radio Networks (CRN), Cooperative Spectrum Sensing (CSS) is
used to improve performance of spectrum sensing techniques used for detection of licensed
(Primary) user’s signal. In CSS, the spectrum sensing information from multiple unlicensed
(Secondary) users are combined to take final decision about presence of primary signal. The
mixing techniques used to generate final decision about presence of PU’s signal are also
called as Fusion techniques / rules. The fusion techniques are further classified as data
fusion and decision fusion techniques. In data fusion technique all the secondary users
(SUs) share their raw information of spectrum detection like detected energy or other
statistical information, while in decision fusion technique all the SUs take their local
decisions and share the decision by sending ‘0’ or ‘1’ corresponding to absence and presence
of PU’s signal respectively. The rules used in decision fusion techniques are OR rule, AND
rule and K-out-of-N rule. The CSS is further classified as distributed CSS and centralized
CSS. In distributed CSS all the SUs share the spectrum detection information with each
other and by mixing the shared information; all the SUs take final decision individually. In
centralized CSS all the SUs send their detected information to a secondary base station /
central unit which combines the shared information and takes final decision. The secondary
base station shares the final decision with all the SUs in the CRN. This paper covers
overview of information fusion methods used for CSS and analysis of decision fusion rules
with simulation results.
ZigBee has been developed to support lower data rates and low power consuming
applications. This paper targets to analyze various parameters of ZigBee physical (PHY).
Performance of ZigBee PHY is evaluated on the basis of energy consumption in
transmitting and receiving mode and throughput. Effect of variation in network size is
studied on these performance attributes. Some modulation schemes are also compared and
the best modulation scheme is suggested with tradeoffs between different performance
metrics.
This paper gives a brief idea of the moving objects tracking and its application.
In sport it is challenging to track and detect motion of players in video frames. Task
represents optical flow analysis to do motion detection and particle filter to track players
and taking consideration of regions with movement of players in sports video. Optical flow
vector calculation gives motion of players in video frame. This paper presents improved
Luacs Kanade algorithm explained for optical flow computation for large displacement and
more accuracy in motion estimation.
A rapid progress is seen in the field of robotics both in educational and industrial
automation sectors. The Robotics education in particular is gaining technological advances
and providing more learning opportunities. In automotive sector, there is a necessity and
demand to automate daily human activities by robot. With such an advancement and
demand for robotics, the realization of a popular computer game will help students to learn
and acquire skills in the field of robotics. The computer game such as Pacman offers
challenges on both software and hardware fronts. In software, it provides challenges in
developing algorithms for a robot to escape from the pool of attacking robots and to develop
algorithms for multiple ghost robots to attack the Pacman. On the hardware front, it
provides a challenge to integrate various systems to realize the game. This project aims to
demonstrate the pacman game in real world as well as in simulation. For simulation
purpose Player/Stage is used to develop single-client and multi-client architectures. The
multi- client architecture in player/stage uses one global simulation proxy to which all the
robot models are connected. This reduces the overhead to manage multiple robots proxy.
The single-client architecture enables only two robot models to connect to the simulation
proxy. Multi-client approach offers flexibility to add sensors to each port which will be used
distinctly by the client attached to the respective robot. The robots are named as Pacman
and Ghosts, which try to escape and attack respectively. Use of Network Camera has been
done to detect the global positions of the robots and data is shared through inter-process
communication.
In Content-Based Image Retrieval (CBIR) systems, the visual contents of the
images in the database are took out and represented by multi-dimensional characteristic
vectors. A well known CBIR system that retrieves images by unsupervised method known
as cluster based image retrieval system. For enhancing the performance and retrieval rate
of CBIR system, we fuse the visual contents of an image. Recently, we developed two
cluster-based CBIR systems by fusing the scores of two visual contents of an image. In this
paper, we analyzed the performance of the two recommended CBIR systems at different
levels of precision using images of varying sizes and resolutions. We also compared the
performance of the recommended systems with that of the other two existing CBIR systems
namely UFM and CLUE. Experimentally, we find that the recommended systems
outperform the other two existing systems and one recommended system also comparatively
performed better in every resolution of image.
Information Systems and Networks are subjected to electronic attacks. When
network attacks hit, organizations are thrown into crisis mode. From the IT department to
call centers, to the board room and beyond, all are fraught with danger until the situation is
under control. Traditional methods which are used to overcome these threats (e.g. firewall,
antivirus software, password protection etc.) do not provide complete security to the system.
This encourages the researchers to develop an Intrusion Detection System which is capable
of detecting and responding to such events. This review paper presents a comprehensive
study of Genetic Algorithm (GA) based Intrusion Detection System (IDS). It provides a
brief overview of rule-based IDS, elaborates the implementation issues of Genetic Algorithm
and also presents a comparative analysis of existing studies.
Step by step operations by which we make a group of objects in which attributes
of all the objects are nearly similar, known as clustering. So, a cluster is a collection of
objects that acquire nearly same attribute values. The property of an object in a cluster is
similar to other objects in same cluster but different with objects of other clusters.
Clustering is used in wide range of applications like pattern recognition, image processing,
data analysis, machine learning etc. Nowadays, more attention has been put on categorical
data rather than numerical data. Where, the range of numerical attributes organizes in a
class like small, medium, high, and so on. There is wide range of algorithm that used to
make clusters of given categorical data. Our approach is to enhance the working on well-
known clustering algorithm k-modes to improve accuracy of algorithm. We proposed a new
approach named “High Accuracy Clustering Algorithm for Categorical datasets”.
Brain tumor is a malformed growth of cells within brain which may be
cancerous or non-cancerous. The term ‘malformed’ indicates the existence of tumor. The
tumor may be benign or malignant and it needs medical support for further classification.
Brain tumor must be detected, diagnosed and evaluated in earliest stage. The medical
problems become grave if tumor is detected at the later stage. Out of various technologies
available for diagnosis of brain tumor, MRI is the preferred technology which enables the
diagnosis and evaluation of brain tumor. The current work presents various clustering
techniques that are employed to detect brain tumor. The classification involves classification
of images into normal and malformed (if detected the tumor). The algorithm deals with
steps such as preprocessing, segmentation, feature extraction and classification of MR brain
images. Finally, the confirmatory step is specifying the tumor area by technique called
region of interest.
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Water marking has been proposed as a method to enhance data security. Text
water marking requires extreme care when embedding additional data within the images
because the additional information must not affect the image quality. Digital water marking
is a method through which we can authenticate images, videos and even texts. Add text
water mark and image water mark to your photos or animated image, protect your
copyright avoid unauthorized use. Water marking functions are not only authentication, but
also protection for such documents against malicious intentions to change such documents
or even claim the rights of such documents. Water marking scheme that hides water
marking in method, not affect the image quality. In this paper method of hiding a data using
LSB replacement technique is proposed.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
This paper presents a survey of Dependency Analysis of Service Oriented
Architecture (SOA) based systems. SOA presents newer aspects of dependency analysis due
to its different architectural style and programming paradigm. This paper surveys the
previous work taken on dependency analysis of service oriented systems. This study shows
the strengths and weaknesses of current approaches and tools available for dependency
analysis task in context of SOA. The main motivation of this work is to summarize the
recent approaches in this field of research, identify major issue and challenges in
dependency analysis of SOA based systems and motivate further research on this topic.
In this paper, proposed a novel implementation of a Soft-Core system using
micro-blaze processor with virtex-5 FPGA. Till now Hard-Core processors are used in
FPGA processor cores. Hard cores are a fixed gate-level IP functions within the FPGA
fabrics. Now the proposed processor is Soft-Core Processor, this is a microprocessor fully
described in software, usually in an HDL. This can be implemented by using EDK tool. In
this paper, developed a system which is having a micro-blaze processor is the combination
of both hardware & Software. By using this system, user can control and communicate all
the peripherals which are in the supported board by using Xilinx platform to develop an
embedded system. Implementing of Soft-Core process system with different peripherals like
UART interface, SPA flash interface, SRAM interface has to be designed using Xilinx
Embedded Development Kit (EDK) tools.
The article presents a simple algorithm to construct minimum spanning tree and
to find shortest path between pair of vertices in a graph. Our illustration includes the proof
of termination. The complexity analysis and simulation results have also been included.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2. 502
sensors for observing battlefield activities. In 1996 UCLA and Rockwell Science Centre developed Low
Power Wireless Integrated Micro sensors (LWIM).It has ability to use low cost CMOS fabrication integrate
multiple sensors, electronic interfaces, control, and communication on a single device. In 1998 this team
developed second generation sensor node by applying some innovations which was named as Wireless
Integrated Network Sensors (WINS) [2] [5] [6]. These WINS had a processor board with an Intel strong
ARM SA1100 32-bit embedded processor (1 MB SRAM and 4 MB flash memory), radio board that supports
100 kbps with adjustable power consumption from 1 to 100 mW, a power supply board, and sensor board.
As we know, wireless mobile network is made up of mobile nodes which are capable of maintaining the
wireless communication channel among them without depending on any kind of fixed infrastructure. Such
factors are more enough to make them different from the wired networks like for the wireless networks there
is no single access point, all the network nodes should be involved in the creation of network as well as
infrastructure setups and services like routing and data collection. All the operations in MANET or WSN are
conducted in a distributed manner as compared to the wired networks. So this is all about the wired and
wireless networks differentiations. Nowadays this technology is used in many real world applications like
organization, home appliances etc. In organizations, wireless sensor networks are used for intrusion detection
for detecting attacks which are trying to get the information from the organization [6].
We can define the term intrusion as a set of actions, which are used for system alteration or unauthorized user
access. Main task of the Intrusion Detection Systems (IDS), is to carry out the monitoring of systems and
computer networks, detecting all the possible intrusions in those networks, user’s alteration, etc. After the
detection of intrusions network reconfiguration is done if possible. In literature we have studied many
existing methods for the intrusion detection in WSN. Each method has its own advantages and disadvantages.
In the real time applications, heterogeneous WSNs are frequently used for the important information sharing
as compared to homogeneous WSNs. Hence there must have efficient multi sensing IDS system in place to
provide the security to WSNs.
Recently some work has been done over the IDS through the routing protocol for heterogeneous WSNs. In
this paper our aim is to present the review of IDS mechanism in WSN, review of literature and methods
presented for IDS in WSN, introduction to homogeneous and heterogeneous WSNs and giving a comparative
study among single sensing and multi sensing WSN. Finally we also give a possible future direction in the
particular research field. In Section II, discussion over different methods presented for IDS in WSN is done.
In section III introduction to homogeneous as well as heterogeneous WSNs with single sensing and multi
sensing approaches are briefly described. In section IV, we are discussing the different IDS techniques and
attacks in WSN. This paper is concluded with a glimpse of the proposed work where we have used intrusion
detection system and heterogeneous wireless sensor network for detecting various attacks.
II. NEED OF IDS IN WSN
WSN means one type of network where multiple sensors scattered on the field for monitoring physical or
environmental actions in the network. This network technology is basically developed for civil and military
applications for defense network security. Nowadays this networks are used everywhere in organizations,
home, offices etc. Intrusion detection system in wireless sensor network has become crucial for safe
operation of wireless sensor network. The IDS is nothing but mechanism which is deployed into the sensor
network protocols, which monitors malicious activities or policy violations and generates a report for
management. There are several defense methods in WSNs but Intrusion detection system has become a major
and efficient method against the intruders. In wireless sensor network to detect the attack in the network
intrusion detection techniques is used. To implements the intrusion detection system in WSN, the sensor
networks must have localized and partial audit information, because there are no centralized points in WSN
for example routers, gateways, switches etc. The IDS uses small amount of resources for data checking and
sending the data packets destination node. While creating IDS it must be assumed that no node will be fully
trusted. The traditional defense mechanisms must also be used for data transportation. In intrusion detection
system we will detect network attacks with the help of sensors that are scattered on the network field. The
intrusion detection system stands between the sensor nodes and the base station as shown in Fig. 1. Intrusion
detection system has following functionalities:
It will monitor activities in the network and analyze the problem.
It will detect all vulnerabilities with the help of audit.
It also checks abnormal activities in the network.
It also done operating systems audit.
3. 503
The intrusion detection systems carries it operation in three different levels. There are three main components
in an Intrusion Detection System (IDS) which are as follows:
A. Network Intrusion Detection System (NIDS):
This system performs the analysis for the traffic passing on the whole network. It matches data with the
traffic data that have been travelled on the subnets and then adds the information to the library of attacks
details. And when attack is detected the system will send the alert message to the administrator.
Figure 1. IDS in Wirless Sensor Network
B. Network Node Intrusion Detection System (NNIDS):
It observes network traffic which has passed by network specific node to host. NNIDS monitors only the
single host while it cannot monitor the entire network or subnet, and this property differs NNIDS from NIDS.
C. Host Intrusion Detection System (HIDS):
The working of this type of intrusion detection system is by taking snapshots of the current system files and
then matching the snapshot with the previous systems files. If in the current snapshot any problem is detected
then an alert is generated. The problems such as missing a file may also be alarmed to the administrator.
Wireless sensor networks are always in need of the four major requirements, namely confidentiality, data
integrity, service availability and energy. The first three requirements are related to the wireless sensor
network’s security. The energy is a unique requirement that cannot be fulfilled easily. The four basic needs of
WSN are described below:
Confidentiality: In wireless sensor network data confidentiality is very important when we send data
over the network. We must use cryptography mechanisms when we send data in the network. We must
encrypt our data before sending using cryptography algorithm. In the network lots of attackers
continuously watch our network, if we our data is not confidential means not encrypted then hacker can
easily hack our data. In the wireless sensor network data confidentiality is very important to protect our
data against attackers.
Integrity: We used sensor network to monitors environment changes, in wireless sensor network data
integrity is very important, because multiple object moving on the field attackers only see physical
environment, they retrieve data about where the sensors located. If attacker can retrieve and alter the data
then Wireless sensor network will not be able to know what actually attackers have generated. Data
integrity is very important to protect our data.
Availability: Availability is not concern about data being sent in the network, it’s related to check
network availability for data packet sending, or network functionality not working properly. These
problems created because of many issues such as wrong routing information or data packets flooding in
the network, etc. Another type of attack is the homing attack, in this attacker finds network traffic and
detects critical sensor node and disables this node physically.
Energy: For attack detection, sensor node requires a lot of battery power. As the battery energy is having
limited power it may be difficult to prolong the network’s lifetime. For increasing the power for a long
time and saving the energy, we send sensor nodes into sleep mode when the nodes remain idle and when
Intrusion
Detection
System
(IDS)
Internet
Base
Station
Sensor Nodes
User
4. 504
the nodes are required they are again converted into active state. This is one of the methods for saving
the battery power of the sensor node.
IIIREVIEW OF IDS METHODS IN WSN
In this section, we discuss the different methods presented for the detection of intrusion in WSN. There are
different intrusion detection methods based on two basic approaches namely distributed approach and
hierarchical approach.
In [1], the author has proposed a protocol that fulfils the unique requirements of WSNs, which is low
complexity and energy efficiency. The protocol has two unique properties: firstly it is self-learning and
secondly it is distributed in nature. Simple Learning Automata based ID (S-LAID) functions in a distributed
manner with each node functioning independently without any knowledge about the adjacent nodes. If a node
is compromised it will not affect other working nodes because the network is in distributed format. This
schema is based on the concept of stochastic learning automata on packet sampling mechanism, which
benefits the proposed work to achieve the goal of energy aware intrusion detection system.
The author has tried to solve the problems of wireless sensor network, by using multi-agent and semantic
techniques [2]. Thus, a semantic based intrusion detection framework is proposed. In this IDS security
ontology is constructed according to the features of WSN to represent the formal semantics for intrusion
detection. The ontology is used to improve the process of intrusion detection. This method uses distributed
nature of the network and has a layered architecture of the proposed framework. There are many algorithms
proposed by the author and these algorithms have tried to solve the problem in decentralized and cooperative
mechanism. In this mechanism, each selected rule of security ontology is mapped to sensing data collected
from common sensor nodes to detect anomaly.
The proposed intrusion detection system is a hierarchical design based system for wireless ad-hoc networks.
The significant challenge of wireless ad-hoc sensor networks is to maintain the security of the network, and
this challenge has been addressed by the author in [3]. The proposed hierarchical design based intrusion
detection system fulfils the demands and restrictions of WSN. The intrusion detection system uses policy
based detection mechanism. This model follows core defence strategy where cluster-head is the centre point
to defend intruder and concentrates on saving the power of sensor nodes by distributing the responsibility of
intrusion detection to three layer nodes.
Another IDS method based on hierarchical wireless sensor networks is been proposed in [4]. This method
uses routing tables and isolation tables to spot the intrusions and to estimate the usage of IDS. The proposed
method isolates malicious nodes by avoiding consumption of unnecessary energy by IDS (ITIDS). The IDS
makes use of four different nodes, which are BS, Primary Cluster Head, many Secondary Cluster Heads and
the remaining sensor nodes MNs. The ITIDS is based on cluster networks and can detect serious attacks.
As there are inherent disadvantages of static IDS the author proposes a dynamic model of intrusion detection
system (DIDS) in [5]. This is a hierarchical model of IDS based on clustered network to battle the low energy
problem of sensor networks. It can use distributed defence which has the advantage of detecting multiple
intruders, albeit, with an increased rate of energy consumption with increase in cluster size.
A Hybrid Intrusion Detection System (HIDS) has been proposed in cluster based WSN (CWSN) [6]. As the
sensor network is cluster based, the nodes in the network may possess different capabilities, and hence, the
network is called as heterogeneous wireless sensor network. As the cluster heads and sensor nodes have
different capabilities and responsibilities, there should be a hybrid IDS to detect intruders. The cluster head
detects the intruders that attempt to decrease the energy consumption as well as reduce the quantity of
information in the whole network. Also the proposed IDS proves to be advantageous in prolonging the
networks lifetime.
G.V.Crosby et. al., proposed a protocol that detects and isolates the compromised nodes [7]. In addition to
reputation based trust framework, the authors have proposed allocation-aware trust-based protocol that not
only detects the compromised nodes but also can isolate the node. The wireless sensor network is formed in
clusters by using secure cluster formation algorithms. The trust and reputation values are calculated by using
a method where the neighbouring nodes monitor each other. A simple location verification algorithm is also
proposed. This algorithm has been constructed by utilizing the signal strength information. The simulation
results indicated that the protocol effectively detects and isolates the compromised nodes even when the
nodes are colluding.
The concept of ontology is used for collecting and organizing the attributes of attacks. But there is a link
between ontology concept and lightweight intrusion detection system (IDS). The author explores how the
5. 505
intrusion detection system about ontology and lightweight IDS are related. Ranger based IDS (RIDS) has
been proposed in [8]. It combines the ranger method to reduce energy consumption and the isolation tables to
avoid detecting anomaly repeatedly. This lightweight IDS model relates ontology concept mechanism about
anomaly detection. In this technique, rough set theory (RST) is used for pre-processing of packets and
anomaly models will be trained by support vector machine.
In [9] the author has proposed a detection system, which is deployed on a hierarchical WSN architecture. The
author states that, it is difficult to detect a compromised node and to avoid the situation were the victim can
be misled by the false information given by the adversary through a compromised node. The proposed
scheme is based on the weighted-trust evaluation. The hierarchical architecture of WSN has three types of
nodes which makes it a three layered architecture: Access Points (AP) layer, Forwarding Nodes (FN) Layer
and the Sensor Nodes (SN) layer. The major assumption made in this scheme is that the base stations are
trusted and majority of the sensor nodes are working properly.
Xi Peng et. al., proposed a security management model for self organizing wireless sensor networks based on
intrusion detection [10]. It can prevent most of attacks. Then an analysis of each layer of networks in security
model is discussed and the security management measures in the data link layer and network layer are
described in detail especially. Such a structure is built, based on the existing encryption and authentication
protocols.
Byunggil Lee et al., [11] have developed management platform and security framework for WSN. The
proposed framework has advantages as regard secure association and intrusion detection. The paper also
provides the background of WSN, its security issues and requirements.
Qi Wang et al., [14] have developed an intruder detection algorithm for static wireless sensor networks. The
proposed IDS is of low complexity. The intrusion detection model includes characteristics that determine the
average frequency of execution of order. A distributed algorithm in which the sensor collects the information
from the neighbouring nodes to analyses the anomalies if any from the neighbours. The intrusion detection
algorithm on detecting anomalies packets received from its neighbours basic alarms to report the anomaly.
IV. REVIEW OF HOMOGENEOUS AND HETEROGENEOUS WSN
There are different types of wireless sensor network with different approaches such as single sensing and
multi sensing approach. In WSNs with single sensing approach, the network algorithm is not able to detect
any type of attack in the wireless sensor network. This type of network is not efficient it will not give
guarantee about maximum security against the attacks. And the sensor’s battery backup is not good as
compare to multi sensing sensors. In wireless sensor networks with multi sensing approach, the algorithm is
able detect any type of attack in the sensor network. This network is very efficient; it will give guarantee
about maximum protection against attacks. And the multi sensing batteries are rechargeable and having good
battery backup as compare to single sensing. There are also wireless sensor networks with different
infrastructure such as heterogeneous and homogeneous WSNs. Fig 2. illustrates the heterogeneous and
homogeneous WSNs.
A. Homogeneous WSN
In homogeneous network all the nodes are identical in terms of battery energy and hardware complexity.
Homogenous networks have pure static clustering. In homogeneous type of network, single network topology
is used and this is not a complex network. Thus in short we can say that, sensor network in which the sensor
nodes having the similar hardware complexity and battery energy is called as homogenous sensor network.
Homogeneous wireless sensor network with pure static clustering is also said to have the possibility where
the cluster head nodes should be over loaded with transmissions of long range to remotely situated base
stations, also the more processing needed for the protocol coordination and data aggregation [15]. And hence
this is resulted into the fact that cluster nodes are expired before the other sensor network nodes. But, one can
also ensure that all the sensor nodes expire at the same time, resulting into less residual energy wastage
whenever the complete system expires. We can ensure this by rotating role of the cluster head periodically
and randomly all the nodes as introduced in the LEACH protocol.
But the most important drawback of homogeneous sensor network as well as role rotation is that all network
nodes will be able to act as cluster heads, and hence they should posses the required capabilities related to
hardware requirements.
6. 506
Figure 2. Heterogeneous and Homogeneous WSN
B. Heterogeneous WSN
In heterogeneous networks more than one and different types of nodes with different battery functionality are
used. In heterogeneous network different topologies are used and this makes the network a very complex
network. Thus in short, we can say that in case of heterogeneous sensor network there are two or more
various types of network nodes along with different functionality and battery energy is used. The real
motivation behind the heterogeneous networks is the need of extra battery energy and more complex
hardware is embedded in some cluster heads, hence this reducing the overall cost of hardware for the
remaining sensor network. But the fixing of cluster head nodes is nothing but the role rotation which is not
possible longer [13]. Whenever sensor nodes uses the mechanism of single hopping in order to reach cluster
head, then sensor nodes those are farthest from cluster head are often spending most of energy as compared
to the nodes those are closer to cluster heads. Heterogeneous networks are using the concept of multiple
hopping in order to reach the cluster head, the nodes which are closer to cluster head having the more energy
burden because of relaying. In addition to this, existence of non uniform energy drainage patter is always
there [12, 13]. But the heterogeneous networks adhere with advantage of increasing the lifetime of the
wireless sensor network.
Finally, basically there are two kinds of sensor network characteristics such as uniform energy drainage and
lower hardware cost. A heterogeneous sensor network achieves lower hardware cost whereas a homogeneous
sensor network achieves the uniform energy drainage. However both features cannot be incorporated in the
same network.
V. CONCLUSIONS
In this review paper we have reviewed the different intrusion detection methods and systems in WSN, single
sensing, multi sensing, homogenous and heterogeneous WSN. As the WSN is consisting of tiny devices
called sensors, these devices are having limitations factors such as energy constrained, memory storage,
transmission range and computational power. But as per our discussion above, in real time scenarios most of
networks are deployed in heterogeneous manner. Therefore, there are two types WSNs such as homogenous
and heterogeneous WSN. In this paper we have discussed on two important concepts of wireless sensor
networks.
In our proposed work we use heterogeneous type of wireless sensor network with intrusion detection system.
As we have surveyed both the concepts, we have implemented the intrusion detection system for detecting
packet loss attack and bad mouthing attack. In our future work, we are further plan to use intrusion detection
system for detecting more attacks, with energy efficient IDS for heterogeneous WSN. This is because of the
several advantages of heterogeneous WSN.
Homogeneous WSN
Sink
Heterogeneous WSN
Sink
Sensor Nodes
Cluster Heads
7. 507
REFERENCES
[1] S. Misra, P. Venkata Krishna and Kiran Isaac Abraham, “Energy Efficient Learning Solution for Intrusion Detection
in Wireless Sensor Networks”, COMSNETS'10 proceedings of the 2nd international conference on Communication
systems and Networks, 2010.
[2] Yuxin Mao, “A Semantic-based Intrusion Detection Framework for Wireless Sensor Network”, Networked
Computing (INC), 6th International Conference, Gyeongju, Korea, 2010.
[3] M. S. I. Mamun, A.F.M. Sultanul Kabir, “Hierarchical Design Based Intrusion Detection System For Wireless Ad
Hoc Sensor Network”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3 July
2010.
[4] Rung-Ching Chen, Chia-Fen Hsieh and Yung-Fa Huang, “An Isolation Intrusion Detection System for Hierarchical
Wireless Sensor Network”, Journal of Networks, Vol. 5, Number 3 March 2010.
[5] G. Huo and Xiaodong Wang, “DIDS: A Dynamic Model of Intrusion Detection System in Wireless Sensor
Networks”, IEEE, International Conference on Information and Automation, Zhangjiajie, China, June 20 –23, 2008.
[6] K. Q. Yan, S.C. Wang and C.W. Liu, “A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor
Networks”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 , Vol
IIMECS 2009 ,Hong Kong, March 18 - 20, 2009.
[7] Garth V. Crosby, Lance Hester, and Niki Pissinou, “Location-aware, Trust-based Detection and Isolation of
Compromised Nodes in Wireless Sensor Networks”, International Journal of Network Security, Vol.12, No.2,
PP.107- 117 March 2011.
[8] Chia-Fen Hsieh, Yung-Fa Huang and Rung-Ching Chen, “A Light-Weight Ranger Intrusion Detection System on
Wireless Sensor Networks”, published in IEEE Genetic and Evolutionary Computing (ICGEC), 2011.
[9] Idris M. Atakli , Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su “Malicious Node Detection in Wireless Sensor
Networks using Weighted Trust Evaluation”, The Symposium on Simulation of Systems Security (SSSS’08),
Ottawa, Canada, April 14 –17, 2008.
[10] Xi Peng, Wuhan Zheng Wu, Debao Xiao, Yang Yu,"Study on Security Management Architecture for Sensor
Network Based on Intrusion Detection '" IEEE, Volume: 2, 25-26 April 2009.
[11] Byunggil Lee, Seungjo Bae and Dong Won Han, “Design of network management platform and security framework
for WSN”, IEEE International conference on signal image technology and internet based system, 2008.
[12] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, “Mobility improves coverage of sensor networks,” in
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc),
2005.
[13] Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad-Hoc Networks. In Proc. ACM MobiCom, pages 275-283,
2000.
[14] Qi Wang, Shu Wang, “Applying an Intrusion detection algorithm to wireless sensor networks”, Second international
workshop on Knowledge Discovery and Data Mining, 2009.
[15] Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal ,“Intrusion detection in homogeneous and heterogeneous
wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 698–711, 2008.