Loading

An Efficient Modular Approach of Intrusion Prevention in Wireless Sensor Networks
Varsha Nigam1, Saurabh Jain2

1Varsha Nigam, Research Scholar, Department of CSE, OCT, Bhopal (M.P), India.
2Saurabh Jain, Department of CSE, OCT, Bhopal (M.P), India.

Manuscript received on 21 November 2013 | Revised Manuscript received on 28 November 2013 | Manuscript published on 30 November 2013 | PP: 11-14 | Volume-2 Issue-5, November 2013 | Retrieval Number: E0837112513/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security of wireless sensor network becomes crucial issue in the latest research with the fast deployment of wireless sensor network.The latency between an attack detection and corrective action taken by the administrator is usually high and therefore ,at the time the administrator notices an attack and take some suitable action the damage was done by the attacker. Depandig on this requirement the need for Intrusion Prevention System which can not only detect attacks but also able to actively respond in malacious activities.Intrusion prevention is a preemptive approach in a system security which is used to identify malacious activities and respond quickly to mitigate anamolous behaviour. In this research paper we actively proposed a new modular approach in intrusion prevention by analyzing past approaches.A wireless IPS can also aid among the prevention of a variety of attacks.. We have a tendency to define the basics of intrusion detection in wireless network, describing the varieties of attacks and state the motivation for intrusion detection in wireless network. In this paper, we firstly indicate the developing history of WIDS, and then summarize the related work on WIPS.On these work, we propose a algorithm for wireless intrusion prevention framework.
Keywords: WSN, IDS,  Attacks, WIPS

Scope of the Article: WSN