Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/165984
Title: | Design and Analysis of Intrusion Detection Protocols for Hierarchical Wireless Sensor Networks |
Researcher: | Mohammad Wazid |
Guide(s): | Ashok Kumar Das |
Keywords: | blackhole attack hybrid anomaly intrusion detection and prevention security simulation sinkhole attack Wireless sensor networks |
University: | International Institute of Information Technology, Hyderabad |
Completed Date: | 06/07/2017 |
Abstract: | In most of the applications, wireless sensor networks are deployed in an unattended environment. Thus, sensor nodes can be physically captured by the adversaries, and the adversaries can then extract the stored information in those nodes using the power analysis attacks. Using the extracted information they can manufacture new sensor nodes. These newly manufactured sensor nodes can also have additional functionalities, which can be used to launch different attacks. After that these new sensor nodes can be deployed by the adversaries in the network. These nodes can launch different attacks in the network, which can cause information loss along with high energy expenditure. Furthermore, WSN is prone to various attacks, such as blackhole attack, wormhole attack, sinkhole attack, etc. In this thesis, we propose several intrusion detection and prevention schemes in hierarchical wireless sensor networks (HWSNs). The first contribution is on designing a new efficient group-based scheme for the detection and prevention of multiple blackhole attacker nodes in HWSNs. In our scheme, the entire WSN is divided into several clusters, and each cluster has a resource-rich cluster head node. Each $CH$ is responsible for the detection and prevention of blackhole attack in the network. Furthermore, our scheme is efficient, and thus, it is very appropriate for practical applications in HWSNs. In the second contribution, we propose a new detection scheme for the detection of different types of sinkhole nodes in HWSNs. In the last contribution, we propose a new intrusion detection technique for hybrid anomaly in HWSNs, which uses the existing data mining algorithm, called K-means clustering. The proposed technique has the ability to detect two types of malicious nodes: blackhole and misdirection attacker nodes. The proposed scheme is useful, especially for those scenarios where the chances of occurrence of hybrid attacks are high and attack specific detection mechanisms fail. It can automatically detect the hybrid anomaly. |
Pagination: | xvi,176 |
URI: | http://hdl.handle.net/10603/165984 |
Appears in Departments: | Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 127.09 kB | Adobe PDF | View/Open |
02_certificates.pdf | 18.69 kB | Adobe PDF | View/Open | |
03_acknowledgments.pdf | 18.83 kB | Adobe PDF | View/Open | |
04_contents.pdf | 38.53 kB | Adobe PDF | View/Open | |
05_preface.pdf | 29.97 kB | Adobe PDF | View/Open | |
06_listoftablesfigures.pdf | 34.29 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 855.58 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 183.76 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 175.22 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 423.92 kB | Adobe PDF | View/Open | |
11_chapter5.pdf | 406.85 kB | Adobe PDF | View/Open | |
12_chapter6.pdf | 636.86 kB | Adobe PDF | View/Open | |
13_chapter7.pdf | 33.73 kB | Adobe PDF | View/Open | |
14_references.pdf | 95.41 kB | Adobe PDF | View/Open | |
15_publications.pdf | 40.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: