A study on Scalable and Secure Intrusion Detection in Network Security
Shaik. Arifa1 , E. Kesavulureddy2
Section:Research Paper, Product Type: Journal Paper
Volume-07 ,
Issue-06 , Page no. 170-172, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.170172
Online published on Mar 20, 2019
Copyright © Shaik. Arifa, E. Kesavulureddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Shaik. Arifa, E. Kesavulureddy, “A study on Scalable and Secure Intrusion Detection in Network Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.170-172, 2019.
MLA Style Citation: Shaik. Arifa, E. Kesavulureddy "A study on Scalable and Secure Intrusion Detection in Network Security." International Journal of Computer Sciences and Engineering 07.06 (2019): 170-172.
APA Style Citation: Shaik. Arifa, E. Kesavulureddy, (2019). A study on Scalable and Secure Intrusion Detection in Network Security. International Journal of Computer Sciences and Engineering, 07(06), 170-172.
BibTex Style Citation:
@article{Arifa_2019,
author = {Shaik. Arifa, E. Kesavulureddy},
title = {A study on Scalable and Secure Intrusion Detection in Network Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {170-172},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=893},
doi = {https://doi.org/10.26438/ijcse/v7i6.170172}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.170172}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=893
TI - A study on Scalable and Secure Intrusion Detection in Network Security
T2 - International Journal of Computer Sciences and Engineering
AU - Shaik. Arifa, E. Kesavulureddy
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 170-172
IS - 06
VL - 07
SN - 2347-2693
ER -
Abstract
Wireless Sensor Network (WSN) has a gigantic scope of uses, for example, front line, reconnaissance, crisis protect activity and savvy home innovation and so forth. Aside from its intrinsic requirements, for example, restricted memory and vitality assets, when sent in threatening ecological conditions, the sensor hubs are powerless against physical catch and other security limitations. These limitations put security as a noteworthy test for the analysts in the field of PC organizing. This paper reflects different issues and difficulties identified with security of WSN, its security engineering. The paper likewise gives an exchange on different security instruments conveyed in WSN condition to beat its security dangers.
Key-Words / Index Term
Sensor network, security, Denial of Service (DoS), Intrusion Detection System (IDS), Authentication
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002.
[2] P. Albers and O. Camp. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, 2002.
[3] R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996.
[4] R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997.
[5] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177. Springer-Verlag, 2001.
[6] A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
[7] P. Bose, P. Morin, I. Stojmenovi´c;, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001.
[8] D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless