Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
149 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Policy based intrusion detection and response system in hierarchical WSN architecture (1209.1678v1)

Published 8 Sep 2012 in cs.CR

Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose a policy based IDS for hierarchical architecture that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed IDS architecture we followed clustering mechanism to build four level hierarchical network which enhance network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection that concentrates on power saving of sensor nodes by distributing the responsibility of intrusion detection among different layers. We also introduce a policy based intrusion response system for hierarchical architecture.

Citations (14)

Summary

We haven't generated a summary for this paper yet.