IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 6, June 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Access Control And Intrusion Detection For Security In Wireless Sensor Network

[Full Text]

 

AUTHOR(S)

Sushma J. Gaurkar, Piyush K.Ingole

 

KEYWORDS

Keywords: Access control, wireless sensor network, attribute mutability, Authentication, intrusion detection.

 

ABSTRACT

Abstract: In wireless sensor networks (WSN), security access is one of the key component. Nodes in a wireless sensor network may be lost due to power exhaustion or malicious attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. WSN must be able to authorize and grant users the right to access to the network. On the other hand, WSN must organize data collected by sensors in such a way that an unauthorized entity cannot make arbitrary queries. The secure authentication protocol of traditional access control scheme do not provide concept of attribute mutability and can not perform continuous access decisions. The proposed work provide a new framework for low level intrusion detection at sensor with access control. This UCON scheme can perform access control with attribute mutability and decision continuity which provide more security. For the simulation purpose, . net framework is used.

 

REFERENCES

[1]. “Reputation based intrusion detection system for wireless sensor network” by Gerrigagoitia, Keldor; Uribeetxeberria, Roberto; Zurutuza, Urko; Arenaza, Ignacio 2012 IEEE conference.

[2]. “A Novel Intrusion Detection Algorithm for Wireless Sensor networks” IEEE 2011 by Chun- ming Rong 1, Skjalg Eggen 2, Hong-bing Cheng.

[3]. “HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree” IEEE2010 BY Jie Yang1, Xin Chen1, Xudong Xiang1, Jianxiong Wan2.

[4]. “J. Wu and S. Shimamot, “Usage Control based Security Access Scheme for Wireless Sensor Networks,” in the proc. IEEE International Conference on Communications(ICC 2010), May 2010.

[5]. R. Khanna, H. Liu and H. Chen, “Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm,” in the proc. IEEE International Conference on Communications (ICC 2009), May 2009.

[6]. J. Harbin, P. Mitchell, D. Pearce, “Wireless Sensor Network Wormhole Avoidance Using Disturbance-Based Routing Schemes,” in the proc. IEEE International Symposium on Wireless Communication Systems(ISWCS 2009), Sept. 2009. pp. 76-80.

[7]. “A Trust-based Approach for Secure Packet Transfer in Wireless Sensor Networks” by Yenumula B. Reddy , Rastko R. Selmic International Journal on Advances in Security, vol 4 no 3 & 4, year 2011.

[8]. F. Pu, D. Sun, Q. Cao, H. Cai, F. Yang, “Pervasive Computing Context Access Control Based on UCONABC Model,” in Proc. 2nd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 06), Pasadena, California, USA, Dec. 2006, pp. 689– 692.

[9]. Y. Zhou, Y. Zhang, and Y. Fang, “Access control in wireless sensor, networks,” Ad Hoc Networks, vol. 5, no. 1, Jan. 2007, pp. 3-13.

[10]. C. Krauß, M. Schneider, C. Eckert, “On handling insider attacks in wireless sensor networks,” Information Security Technical Report (ELSEVIER), vol. 13, no. 3, Aug. 2008, pp. 165-172.

[11]. X. Zhang, F. P. Presicce, and R. Sandhu, “Formal Model and Policy Specification of Usage Control,” ACM Transactions on Information and System Security, vol. 8, no. 4, Nov. 2005, pp. 351–387.

[12]. Security frameworks for open systems: Access control framework, ISO/IEC Standard 10181-3, 1996.

[13]. Varsha Sahni ,Jaspreet Kaur, Sonia Sharma “Security issues and solution in wireless sensor network ” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3295-3304