Skip to main content
Top

2019 | OriginalPaper | Chapter

Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN

Authors : B. Srinivasa Rao, P. Premchand

Published in: Innovations in Computer Science and Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The aim of the present research work is to design and implement a hacker detection scheme (HDS) as a network security measure in wireless sensor networks (WSN). The designed HDS is intended to detect and prevent the existence intruders in WSN. The designed HDS has been implemented for both homogeneous and heterogeneous WSN models considering multiple detectors. The HDS has been designed, modeled, and simulated successfully.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference D.P. Agrawal and Q.-A. Zeng, “Intrusion Detection in Wireless Ad-Hoc Networks”, “ Introduction to wireless and mobile systems, Ed.4, pp 28, 2014 D.P. Agrawal and Q.-A. Zeng, “Intrusion Detection in Wireless Ad-Hoc Networks”, “ Introduction to wireless and mobile systems, Ed.4, pp 28, 2014
4.
go back to reference A.N. Rindhe and S.V.Dhopte, “WSN: Various attacks & IDP in WSN”, IJSR Vol.3, 2, pp 88, 2014 A.N. Rindhe and S.V.Dhopte, “WSN: Various attacks & IDP in WSN”, IJSR Vol.3, 2, pp 88, 2014
5.
go back to reference W. Stallings, “Cryptography and Network Security-Principles and Practices” ed.4, Pearson Education 2006 W. Stallings, “Cryptography and Network Security-Principles and Practices” ed.4, Pearson Education 2006
6.
go back to reference N. A. Alrajeh, S. Khan, and B. Shams, “A Review -Intrusion Detection Systems in Wireless Sensor Networks”, IJDSN 2013 N. A. Alrajeh, S. Khan, and B. Shams, “A Review -Intrusion Detection Systems in Wireless Sensor Networks”, IJDSN 2013
7.
go back to reference Wireless Sensor Networks: A Networking perspective, Eds. J.Zheng and A. Jamalipour, Jhon Wiley, 2009 (and the references therein) Wireless Sensor Networks: A Networking perspective, Eds. J.Zheng and A. Jamalipour, Jhon Wiley, 2009 (and the references therein)
9.
go back to reference I. Butun, S.D. Morgera and Ravishankar, “ A survey of intrusion detection system in wireless sensor networks”, IEEE Communications Surveys & Tutorials, 16(1), 2014 I. Butun, S.D. Morgera and Ravishankar, “ A survey of intrusion detection system in wireless sensor networks”, IEEE Communications Surveys & Tutorials, 16(1), 2014
10.
go back to reference J. R. Simenthy and K. Vijayan, “Advanced Intrusion detection System for Wireless sensor Networks”, IJAREEIE, 3(3), 2014 J. R. Simenthy and K. Vijayan, “Advanced Intrusion detection System for Wireless sensor Networks”, IJAREEIE, 3(3), 2014
11.
go back to reference G. Amita and H. Subir, “A survey on energy efficient intrusion detection in wireless sensor networks”, JAISE, 9(2), pp 239–261, 2017 G. Amita and H. Subir, “A survey on energy efficient intrusion detection in wireless sensor networks”, JAISE, 9(2), pp 239–261, 2017
12.
go back to reference R. Mitchel and I. R. Chen,” A survey on intrusion detection in wireless sensor network applications”, Computer Communications, 42, pp 1–23 2014 R. Mitchel and I. R. Chen,” A survey on intrusion detection in wireless sensor network applications”, Computer Communications, 42, pp 1–23 2014
13.
go back to reference J. Singh and V. Thaper, “ intrusion detection system in wireless sensor networks”, IJCSCE,1(2), 2012 J. Singh and V. Thaper, “ intrusion detection system in wireless sensor networks”, IJCSCE,1(2), 2012
14.
go back to reference A. Kamaev, A. G. Finogeev, A.A. Finogeev and D.S. Parygin, J. Phys. Conference series, 803(1) 2017 A. Kamaev, A. G. Finogeev, A.A. Finogeev and D.S. Parygin, J. Phys. Conference series, 803(1) 2017
16.
go back to reference Y. Wang, W. Fu, and D.P. Agrawal, “Intrusion Detection in Gaussian Distributed Wireless Sensor Networks,” Proc. Sixth IEEE Int’l Conf. Mobile Ad Hoc and Sensor Systems, 2009; Y. Wang, W. Fu, and D. P. Agrawal, “Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, 2013 Y. Wang, W. Fu, and D.P. Agrawal, “Intrusion Detection in Gaussian Distributed Wireless Sensor Networks,” Proc. Sixth IEEE Int’l Conf. Mobile Ad Hoc and Sensor Systems, 2009; Y. Wang, W. Fu, and D. P. Agrawal, “Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, 2013
Metadata
Title
Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN
Authors
B. Srinivasa Rao
P. Premchand
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8201-6_56