Open Access Open Access  Restricted Access Subscription or Fee Access

Wireless Sensor Network –A Study

L. Sheeba, Dr.V.S. Meenakshi


The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments.such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Wireless Sensor Networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Wireless Sensor Networks (WSNs) are the collection of self – organizing sensor nodes deployed in various physical environments statically or dynamically depend upon the application.WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Our intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radiotransceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hopwireless mesh network. The propagation technique between the hops of the network can be routing or flooding

Full Text:



Chris Karlof *, David Wagner, Secure routingin wireless sensor networks: attacks and countermeasures, Elsevier - Ad Hoc Networks 1 (2003) 293–315.

HanZhijie, Ruchuang, Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model, Elsevier -2012 International Conference on Solid State Devices and Materials Science, Physics Procedia 25 ( 2012 ) 2072 – 2080.

H.H. Soliman a, Noha A. Hikal b, Nehal A. Sakr b,*, A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egyptian Informatics Journal (2012) 13, 225–238.

Sumit More, Mary Matthews, Anupam Joshi, Tim Finin , A Knowledge-Based Approach To Intrusion Detection Modeling, IEEE Symposium on Security and Privacy Workshops 2012, 75 -81.

Karen A. Garc´ıa, Ra´ul Monroy, Luis A. Trejo, Carlos Mex-Perera, and Eduardo Aguirre, Analyzing Log Files for Postmortem Intrusion Detection, IEEE transactions on systems, man, and cybernetics—Part C: Applications and Reviews, Vol. 42, No. 6, November 2012, 1690-1704.

Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, Third Quarter 2013, 1223-1237.

Salvatore Pontarelli, Giuseppe Bianchi, and Simone Teofili, Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System, IEEE Transactions On Computers, Vol. 62, No. 11, November 2013 , 2322- 2334.

Robert Mitchell and Ing-Ray Chen, Member, IEEE, Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications, IEEE Transactions On Smart Grid, Vol. 4, No. 3, September 2013, 1254- 1263.

Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE, EAACK—A Secure Intrusion-Detection System for Manets, IEEE Transactions On Industrial Electronics, VOL. 60, NO. 3, MARCH 2013, 1089- 1098.

Emad Felemban, Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology, Int. J. Communications, Network and System Sciences, 2013, 6, 251-259.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.