{"title":"Intrusion detection system for mitigating attacks using energy monitoring in wireless sensor networks","authors":"B. Yasotha, T. Sasikala","doi":"10.1504/IJMNDI.2016.081663","DOIUrl":null,"url":null,"abstract":"In wireless sensor network WSN, the existing literature works predicts the energy consumption using operational state transition model. In this method, each state should be known to the sink, in order to predict accurately. Also, in some cases, if the residual energy estimation is not based on the operational states of a sensor node, it may not reflect the exact amount of energy consumed by each node. In order to overcome these issues, in this paper, we propose to design an intrusion detection system to detect and mitigate the attacks using energy monitoring technique. In this technique, the malicious attacks are detected by monitoring the node's energy. The monitoring nodes predicts the energy using hidden Markov model HMM and compares it with the actual energy detected through an energy query technique. The detected attacks are classified based on the energy threshold levels. The attacks are then mitigated by establishing the attack-free route between source and destination, respectively. By simulation results, we show that the proposed technique increases the efficiency, reduces overhead and energy consumption.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"1 1","pages":"219-227"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2016.081663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 6
Abstract
In wireless sensor network WSN, the existing literature works predicts the energy consumption using operational state transition model. In this method, each state should be known to the sink, in order to predict accurately. Also, in some cases, if the residual energy estimation is not based on the operational states of a sensor node, it may not reflect the exact amount of energy consumed by each node. In order to overcome these issues, in this paper, we propose to design an intrusion detection system to detect and mitigate the attacks using energy monitoring technique. In this technique, the malicious attacks are detected by monitoring the node's energy. The monitoring nodes predicts the energy using hidden Markov model HMM and compares it with the actual energy detected through an energy query technique. The detected attacks are classified based on the energy threshold levels. The attacks are then mitigated by establishing the attack-free route between source and destination, respectively. By simulation results, we show that the proposed technique increases the efficiency, reduces overhead and energy consumption.
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.