IDS Range of Attack in WSN and Prevention Using PSO Fitness Measures

Authors

  • Annavaram Kiran Kumar,R. Praveen Sa, K. Madhavi

Keywords:

IDS, DREAM protocol, PSO, IDS range.

Abstract

The concept of Euclidean space is used in sensor ad-hoc network routing techniques. This system's methodologies will derive the position of sensor nodes from previously used distances that measure static and dynamic sensor node placement. When the position of a node is known ahead of time, the number of security vulnerabilities increases. To put it another way, our strategy is to use PSO to detect security breaches and create an effective Intrusion Detection System. The simulation demonstrates the effectiveness of the DREAM protocol in thwarting an Intrusion Detection System attack aimed at duplicating sensor IDs within boundary areas. It's assumed that the sensor boundary maintains records of sensor nodes and their neighboring nodes, along with the distances between them, as dictated by the routing protocols. We assume that the sensor border maintains information about the sensor node and its neighboring nodes, along with the distances between them as dictated by the routing protocol. By employing PSO, we achieve a fitness value that tends to position the sensor node's neighbors within the border, thereby enhancing the secure zone for ad-hoc transmission.

Downloads

Download data is not yet available.

References

Otoum, Safa, Burak Kantarci, and Hussein T. Mouftah. "On the feasibility of deep learning in sensor network intrusion detection." IEEE Networking Letters 1.2 (2019): 68-71.

Borkar, Gautam M., et al. "A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept." Sustainable Computing: Informatics and Systems 23 (2019): 120-135.

Kaushik, Ila, Nikhil Sharma, and Nanhay Singh. "Intrusion detection and security system for blackhole attack." 2019 2nd International Conference on Signal Processing and Communication (ICSPC). IEEE, 2019.

Sherubha, P., P. Amudhavalli, and S. P. Sasirekha. "Clone attack detection using random forest and multi objective cuckoo search classification." 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2019.

Kfoury, Elie, et al. "A self organizing map intrusion detection system for rpl protocol attacks." International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11.1 (2019): 30-43.

Mohapatra, Hitesh, et al. "Handling of man-in-the- middle attack in wsn through intrusion detection system." International journal 8.5 (2020): 1503-1510.

Dharini, N., N. Duraipandian, and Jeevaa Katiravan. "A novel IDS to detect multiple DoS attacks with network lifetime estimation based on learning-based energy prediction algorithm for hierarchical WSN." International Conference on Intelligent Computing and Applications. Springer, Singapore, 2019.

Yahyaoui, Aymen, Takoua Abdellatif, and Rabah Attia. "Hierarchical anomaly based intrusion detection and localization in IoT." 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2019.

Bhushan, Bharat, and G. Sahoo. "A Hybrid Secure and Energy Efficient Cluster Based Intrusion Detection system for Wireless Sensing Environment." 2019 2nd International Conference on Signal Processing and Communication (ICSPC). IEEE, 2019.

Subburaj, V., K. Chitra, and S. Venkateswaran. "Secure Topology updates using PSO in MANET for Reducing Mobility Delay for Tactical Networks using TORA." i-Manager's Journal on Communication Engineering and Systems 3.2 (2014): 27.

Mohseni, Shima, et al. "Comparative review study of reactive and proactive routing protocols in MANETs." 4th IEEE International Conference on Digital Ecosystems and Technologies. IEEE, 2010.

Downloads

Published

20.06.2024

How to Cite

Annavaram Kiran Kumar. (2024). IDS Range of Attack in WSN and Prevention Using PSO Fitness Measures. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 618–623. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6266

Issue

Section

Research Article