Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7869
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Shashank | - |
dc.contributor.author | Nitin [Guided by] | - |
dc.date.accessioned | 2022-10-17T05:52:17Z | - |
dc.date.available | 2022-10-17T05:52:17Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7869 | - |
dc.description.abstract | Wireless sensor networks (WSNs) are vulnerable to different types of security threats that can degrade the performance of the whole network; that might result in fatal problems like denial of service (DoS) attacks, routing attacks, Sybil attack etc. Key management protocols, authentication protocols and secure routing cannot provide security to WSNs for these types of attacks. Intrusion detection system (IDS) is a solution to this problem. It analyzes the network by collecting sufficient amount of data and detects abnormal behavior of sensor node(s). IDS based security mechanisms proposed for other network paradigms such as ad hoc networks, cannot directly be used in WSNs. Researchers have proposed various intrusion detection systems for wireless sensor networks during the last few years. We classify these approaches into three categories i.e. purely distributed, purely centralized and distributed-centralized. In this report, I present a survey of these mechanisms. These schemes are further differentiated in the way they perform intrusion detection. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Intrusion | en_US |
dc.subject | Wireless Sensor Networks | en_US |
dc.title | Intrusion Detection System in WSN | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Intrusion Detection System in WSN.pdf | 1.85 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.