Loading

Intrusion Detection System in Wireless Sensor Network
Divyashree G1, Durgabhavani A2, Kavya M3, Anushree Gudoor4, Madhukar B Shetty5
1Divyashree G, Department of, Computer Science and Engineering (B.E), BMS Institute of Technology, Bangalore, India.
2Mrs. Durgabhavani A, Assistant Professor BMS Institute of Technology, Bangalore, India.
3Kavya M, Department of, Computer Science and Engineering (B.E), BMS Institute of Technology Bangalore, India.
4Anushree Gudoor, Department of, Computer Science and Engineering (B.E), BMS Institute of Technology, Bangalore, India.
5Madhukar B Shetty, Department of, Computer Science and Engineering (B.E), BMS Institute of Technology, Bangalore, India

Manuscript received on 02 April 2019 | Revised Manuscript received on 07 May 2019 | Manuscript published on 30 May 2019 | PP: 2047-2051 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1842058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The constant growth in network industry has put forward some queries regarding vulnerability and security of a computer network. Intrusion detection is the mechanism of identifying the unauthorized packets that enter an organization’s network. It acts as a shield and informs the system administrator when some unwanted traffic is seen to flow inside. The intrusion detection system has a lot of challenges; it must look up the event log and try to classify the packets that are malicious. A wireless sensor network (WSN) is one which consists of manylow-costnodes, whose position are not fixed in a network and are subjected to change.The main aim of this paper is to simulate intrusion in a WSN and perform a comparative analysis between a network without intruder, with intruder and an enhancement of the later in following parameter: throughput, average delay in transmission, packet drop ratio and overhead.
Keywords: Intrusion Detection System (IDS), Wireless Sensor Network (WSN), Probe Attacks, Network Simulation Tool (NS2), Dos (Denial of Service) Attacks, Network Security.

Scope of the Article: Wireless ad hoc & Sensor Networks