{"title":"Decentralised clustered and hash based intrusion detection system for wireless sensor networks","authors":"S. Patel, K. Pandey, V. Rathod","doi":"10.1109/WCSN.2008.4772676","DOIUrl":null,"url":null,"abstract":"Looking at the future of the wireless sensor networks and the applications which are likely to be deployed on it, the security is now becoming an evident feature. Lot many security architectures are proposed, but looking to the energy and memory constraints, the implementation still demands good amount of research. The simpler way seems is, to detect the intruder as early as possible and take the corrective steps for damage control. Here we propose an improved secured hash based IDS strategy using deployment knowledge. This knowledge and strategy can be used to prevent exterior and interior intruders using one way spatial and temporal hash functions.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSN.2008.4772676","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Looking at the future of the wireless sensor networks and the applications which are likely to be deployed on it, the security is now becoming an evident feature. Lot many security architectures are proposed, but looking to the energy and memory constraints, the implementation still demands good amount of research. The simpler way seems is, to detect the intruder as early as possible and take the corrective steps for damage control. Here we propose an improved secured hash based IDS strategy using deployment knowledge. This knowledge and strategy can be used to prevent exterior and interior intruders using one way spatial and temporal hash functions.