Open Access   Article Go Back

A study on Scalable and Secure Intrusion Detection in Network Security

Shaik. Arifa1 , E. Kesavulureddy2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 170-172, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.170172

Online published on Mar 20, 2019

Copyright © Shaik. Arifa, E. Kesavulureddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shaik. Arifa, E. Kesavulureddy, “A study on Scalable and Secure Intrusion Detection in Network Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.170-172, 2019.

MLA Style Citation: Shaik. Arifa, E. Kesavulureddy "A study on Scalable and Secure Intrusion Detection in Network Security." International Journal of Computer Sciences and Engineering 07.06 (2019): 170-172.

APA Style Citation: Shaik. Arifa, E. Kesavulureddy, (2019). A study on Scalable and Secure Intrusion Detection in Network Security. International Journal of Computer Sciences and Engineering, 07(06), 170-172.

BibTex Style Citation:
@article{Arifa_2019,
author = {Shaik. Arifa, E. Kesavulureddy},
title = {A study on Scalable and Secure Intrusion Detection in Network Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {170-172},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=893},
doi = {https://doi.org/10.26438/ijcse/v7i6.170172}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.170172}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=893
TI - A study on Scalable and Secure Intrusion Detection in Network Security
T2 - International Journal of Computer Sciences and Engineering
AU - Shaik. Arifa, E. Kesavulureddy
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 170-172
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Wireless Sensor Network (WSN) has a gigantic scope of uses, for example, front line, reconnaissance, crisis protect activity and savvy home innovation and so forth. Aside from its intrinsic requirements, for example, restricted memory and vitality assets, when sent in threatening ecological conditions, the sensor hubs are powerless against physical catch and other security limitations. These limitations put security as a noteworthy test for the analysts in the field of PC organizing. This paper reflects different issues and difficulties identified with security of WSN, its security engineering. The paper likewise gives an exchange on different security instruments conveyed in WSN condition to beat its security dangers.

Key-Words / Index Term

Sensor network, security, Denial of Service (DoS), Intrusion Detection System (IDS), Authentication

References

[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002.
[2] P. Albers and O. Camp. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, 2002.
[3] R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996.
[4] R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997.
[5] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177. Springer-Verlag, 2001.
[6] A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
[7] P. Bose, P. Morin, I. Stojmenovi´c;, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001.
[8] D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless