Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7869
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, Shashank-
dc.contributor.authorNitin [Guided by]-
dc.date.accessioned2022-10-17T05:52:17Z-
dc.date.available2022-10-17T05:52:17Z-
dc.date.issued2014-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7869-
dc.description.abstractWireless sensor networks (WSNs) are vulnerable to different types of security threats that can degrade the performance of the whole network; that might result in fatal problems like denial of service (DoS) attacks, routing attacks, Sybil attack etc. Key management protocols, authentication protocols and secure routing cannot provide security to WSNs for these types of attacks. Intrusion detection system (IDS) is a solution to this problem. It analyzes the network by collecting sufficient amount of data and detects abnormal behavior of sensor node(s). IDS based security mechanisms proposed for other network paradigms such as ad hoc networks, cannot directly be used in WSNs. Researchers have proposed various intrusion detection systems for wireless sensor networks during the last few years. We classify these approaches into three categories i.e. purely distributed, purely centralized and distributed-centralized. In this report, I present a survey of these mechanisms. These schemes are further differentiated in the way they perform intrusion detection.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectIntrusionen_US
dc.subjectWireless Sensor Networksen_US
dc.titleIntrusion Detection System in WSNen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Intrusion Detection System in WSN.pdf1.85 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.