{"title":"无线传感器网络中各种入侵检测技术的研究与分析","authors":"Srividya Putty, N. Lavadya, N. A","doi":"10.1109/ICMNWC52512.2021.9688522","DOIUrl":null,"url":null,"abstract":"Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks\",\"authors\":\"Srividya Putty, N. Lavadya, N. A\",\"doi\":\"10.1109/ICMNWC52512.2021.9688522\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.\",\"PeriodicalId\":186283,\"journal\":{\"name\":\"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMNWC52512.2021.9688522\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMNWC52512.2021.9688522","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks
Over the past years, Wireless Sensor Networks has gained significance in real world applications such as Traffic Surveillance, Health care, military and Environmental Phenomena such as Wildlife, pollution, Water Quality Evaluation etc. Even though the WSNs have more prominent features, due to the lack of a centralized monitoring system, the node of WSN is exposed to various security attacks. Hence to run the WSN in a secure manner, there is necessity to detect any kind of intruder through which the network or information can get affected. In this paper, a detailed survey is about the earlier developed Intrusion Detection Approaches in WSNs. Initially, a brief overview about the working mechanism and the possible Intrusion Detection models (Rule based and Anomaly based) are presented. Secondly, a brief overview is given about various security attacks and the possible countermeasures. Thirdly, a detailed survey is presented about the earlier proposed Intrusion detection approaches followed by a comparison of each method. Finally, the possible future directions are suggested towards which the research can be extended.