International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 123 | Views: 198

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 10, October 2015

Intrusion Detection System to Enhance the Performance in Multipath Routing for Heterogeneous Wireless Sensor Network

Tripti Manoj Shukla | Pankaj Salunkhe

Abstract: In this paper we propose security of nodes by using Intrusion Detection System in heterogeneous wireless sensor networks (HWSNs) where we are utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes which causes packet loss in the network. The research problem we are addressing in this paper is to tolerate intrusions which are responsible for packet loss and jamming attack and security of each node. The main goal and objective of the paper is to enhance the performance in multipath routing to tolerate and detect intrusions & provide security to each node during transmission of data in the presence of intruders. The key concept of our redundancy management is to achieve the balance between energy consumption and gain in reliability, timeliness along with the security to maximize the system useful lifetime. In our work we have considered redundancy management of multipath routes which are based on trust and energy values and it is used for intrusion detection as well as to maximize the system lifetime of a HWSN in the presence of unreliable and malicious nodes. In this paper we are providing security at each node during the routing of data from source to sink, which is done by using RSA Algorithm which introduces cipher text as an encryption (AES) at each node. If intruder attacks any of the nodes, its code cannot be decrypted at the destination thus producing secured transmission of data.

Keywords: Intrusion Detection System, Heterogeneous Wireless Sensor Networks, Multipath Routing, AES, Security, Encryption, Intrusion Tolerance

Edition: Volume 4 Issue 10, October 2015,

Pages: 894 - 901

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait