Implementation of a Hierarchical Hybrid Intrusion Detection Mechanism in Wireless Sensors Network

  • Moulad L
  • Belhadaoui H
  • Rifi M
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

During the last years, Wireless Sensor Networks (WSNs) have attracted considerable attention within the scientific community. The applications based on Wireless Sensor Networks, whose areas include, agriculture, military, hospitality management, etc. are growing swiftly. Yet, they are vulnerable to various security threats, like Denial Of Service (DOS) attacks. Such issues can affect and absolutely degrade the performances and cause a dysfunction of the network and its components. However, key management, authentication and secure routing protocols aren't able to offer the required security for WSNs. In fact, all they can offer is a first line of defense especially against outside attacks. Therefore, the implementation of a second line of defense, which is the Intrusion Detection System (IDS), is deemed necessary as part of an integrated approach, to secure the network against malicious and abnormal behaviors of intruders, hence the goal of this paper. This allows improving security and protecting all resources related to a WSN. Recently, different detection methods have been proposed to develop an effective intrusion detection system for WSNs. In this regard, we proposed an integral mechanism which is an hybrid Intrusion Detection approach based on anomaly, detection using support vector machine (SVM), specifications based technique, signature and clustering algorithm to decrease the consumption of resources, by reducing the amount of information forwarded. So, our aim is to protect WSN, without disturbing networks performances through a good management of their resources, especially the energy.

Cite

CITATION STYLE

APA

Moulad, L., Belhadaoui, H., & Rifi, M. (2017). Implementation of a Hierarchical Hybrid Intrusion Detection Mechanism in Wireless Sensors Network. International Journal of Advanced Computer Science and Applications, 8(10). https://doi.org/10.14569/ijacsa.2017.081035

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free