International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 04 | July-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 276 An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks Swati Kasar 1 , Dr D.G. Khairnar 2 , Dr. Manish Sharma 3 1 PG Student, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India 2 HOD, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India 3 PG Coordinator, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The security attacks are common in WSNs because of less availability of the resources and harsh environment. Intrusion detection and prevention of these attacks are necessary. Aim is to achieve an intrusion detection system which is energy efficient. The objective is to detect and prevent security attacks, to reduce the communication overhead and consumption of energy in wireless sensor network. The Network layers attacks are wormhole attack, Sybil attack and selective forwarding attack. These attacks are overcome by symmetric key encryption where security is achieved in the sensor networks. The proposed method is an energy efficient routing method in an environment where detection and prevention intrusion schemes are used in wireless sensor network. The result shows the efficient consumption of energy. The simulation results are shown in NS-2 which shows the comparison with AODV routing protocol by considering parameters like energy and communication overhead. Key Words: WSN wireless sensor network, IDS intrusion detection system, BS Base Station 1. INTRODUCTION WSN are autonomous sensors distributed in space to monitor physical or environmental conditions like temperature, sound, pressure, etc. and to together pass their data through the network to a main location. The more modern networks are bi-directional used to control sensor activity. The development of wireless sensor networks was inspired by military applications such as battlefield surveillance. Today such networks are used in many industrial and consumer applications. The WSN is made up of nodes which are from a few to several hundreds or even thousands. Each node is connected to one or sometimes several sensors. Each sensor network node has several parts namely- a radio transceiver with an internal antenna or an external antenna, a microcontroller, an electronic circuit for the purpose of interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node is variable in size from that of a shoebox down to the size of a grain of dust. The cost of sensor nodes is similarly variable, which depends on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponds to the constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can also vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. Security is very important in Wireless sensor networks. It can be Authentication, integrity, privacy, no repudiation, and anti-playback. For secure transmission of various types of information over networks can be in the form of cryptography, steganography and other techniques. Encryption-decryption techniques meant for the traditional wired networks are not capable in Wireless networks with sensors. Wireless sensor networks consist of tiny sensors which really suffer from the lack of processing, memory and battery power. Applying any encryption scheme requires transmission of extra bits with consumption of extra energy. Hence techniques like Steganography, cryptography are used in WSN for secure transmission of data. Cryptography aims at hiding the main content of a message, steganography aims at hiding the present existence of the message. Steganography is the art of covert communication by embedding a message into the multimedia data (image, sound, video, etc.). There are numerous security threats in Wireless Sensor Networks. Most are similar to those of wired nature while some are severe with the inclusion of wireless connectivity. Wireless networks are usually more prone to various security threats as unguided transmission medium is more vulnerable to security attacks than those of the guided transmission medium. Attacks against wireless sensor networks could be broadly classified in two different levels of views: The attack against the security mechanisms and against the basic mechanisms like routing mechanisms. The various attacks