The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: The main aim of this paper is security by applying Intelligent Intrusion detection System to detect one of the critical attack know as sinkhole attack in Wireless Sensor network. Methods/Analysis: The major problem occurs while transmitting the data is security. The malicious node attracts the packets from the other normal sensor nodes and drops the sensitive packets which may leads to selective forwarding attack and black hole attack. Findings: In the existing system, Leader based intrusion detection system is used to monitor the surrounding node. Here the leader can monitor the nodes only region wise and does not have any clustering technique. By using the clustering technique we can monitor the surrounding nodes in efficient manner and better solution. In the proposed system, an Intelligent Intrusion Detection System (IIDS) mechanism to detect the intruder in the network, which uses a Hybrid Approach to detect and prevent sinkhole attack, with two approaches such as Zone-Based Leader Election Method and Leader Based Monitoring. In Zone-Based Leader Election method, a set of nodes is located in different regions and a Cluster Based Zone Leader (CBZL) is allocated to every region in the network. In the Leader Based Monitoring Approach, when a node gets detected as a compromised node, it communicates the status of that node to the other leader within the WSN. Application/Improvement: This technique can identify the intruder node and improve the efficiency of the network. As a simulation results, we are implementing in Network Simulator. In environment monitoring and military applications the proposed approach can be deployed.

Keywords

Cluster Zone-based Leader, Leader based Monitoring Approach, Sinkhole Node, Wireless Sensor Network
User