A Novel Composite Intrusion Detection System (CIDS) for Wireless Sensor Network

Modern wireless technology demands the implementation of preset Sensor nodes for a structured wireless network. The network has sensor nodes for surveillance or environmental sensing, which wirelessly transmit data to a collection point. Therefore, data transfer must be protected by preventing exter...

Full description

Saved in:
Bibliographic Details
Published in2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) pp. 112 - 117
Main Authors K, Swaminathan, Ravindran, Vijay, Ponraj, Ram Prakash, Venkatasubramanian, S, Chandrasekaran, K. S, Ragunathan, Satheesh
Format Conference Proceeding
LanguageEnglish
Published IEEE 05.01.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Modern wireless technology demands the implementation of preset Sensor nodes for a structured wireless network. The network has sensor nodes for surveillance or environmental sensing, which wirelessly transmit data to a collection point. Therefore, data transfer must be protected by preventing external intrusion attacks. This will be handled by designing an effective intrusion detection system proposed as a Composite Intrusion detection system (CIDS). It is suitable for a network in heterogeneous network structure with a capable of identifying externals attacks like flooding of data's, sending unwanted data packets and changing the destination node. For routing of data packets between the nodes, minimum power utilization with changeable cluster heading method is used. The activities of sensor nodes will be monitored and a dataset is formed on the basis of the node's activity. It is known as Network Databases (NDB). Using this dataset, the intrusion attacks will be identified by using Artificial Neural Network (ANN). ANN will be trained with a predefined dataset for the effective identification of external attacks. The proposed CIDS methodology shows the high accuracy of identifying the external attacks on the sensor networks when comparing to the previous designed system in all the types of attacks.
DOI:10.1109/IDCIoT56793.2023.10053547