International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 276
An Energy Saving Routing Mechanism for Intrusion Prevention in
Wireless Sensor Networks
Swati Kasar
1
, Dr D.G. Khairnar
2
, Dr. Manish Sharma
3
1
PG Student, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India
2
HOD, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India
3
PG Coordinator, E&TC Department, Dr. D.Y. Patil College of Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The security attacks are common in WSNs
because of less availability of the resources and harsh
environment. Intrusion detection and prevention of
these attacks are necessary. Aim is to achieve an
intrusion detection system which is energy efficient. The
objective is to detect and prevent security attacks, to
reduce the communication overhead and consumption
of energy in wireless sensor network. The Network
layers attacks are wormhole attack, Sybil attack and
selective forwarding attack. These attacks are
overcome by symmetric key encryption where security
is achieved in the sensor networks. The proposed
method is an energy efficient routing method in an
environment where detection and prevention intrusion
schemes are used in wireless sensor network. The result
shows the efficient consumption of energy. The
simulation results are shown in NS-2 which shows the
comparison with AODV routing protocol by considering
parameters like energy and communication overhead.
Key Words: WSN wireless sensor network, IDS
intrusion detection system, BS Base Station
1. INTRODUCTION
WSN are autonomous sensors distributed in space to
monitor physical or environmental conditions like
temperature, sound, pressure, etc. and to together pass
their data through the network to a main location. The
more modern networks are bi-directional used to control
sensor activity. The development of wireless sensor
networks was inspired by military applications such as
battlefield surveillance. Today such networks are used in
many industrial and consumer applications.
The WSN is made up of nodes which are from a few to
several hundreds or even thousands. Each node is
connected to one or sometimes several sensors. Each
sensor network node has several parts namely- a radio
transceiver with an internal antenna or an external
antenna, a microcontroller, an electronic circuit for the
purpose of interfacing with the sensors and an energy
source, usually a battery or an embedded form of energy
harvesting. A sensor node is variable in size from that of a
shoebox down to the size of a grain of dust. The cost of
sensor nodes is similarly variable, which depends on the
complexity of the individual sensor nodes. Size and cost
constraints on sensor nodes result in corresponds to the
constraints on resources such as energy, memory,
computational speed and communications bandwidth. The
topology of the WSNs can also vary from a simple star
network to an advanced multi-hop wireless mesh
network. The propagation technique between the hops of
the network can be routing or flooding.
Security is very important in Wireless sensor
networks. It can be Authentication, integrity, privacy, no
repudiation, and anti-playback. For secure transmission of
various types of information over networks can be in the
form of cryptography, steganography and other
techniques. Encryption-decryption techniques meant for
the traditional wired networks are not capable in Wireless
networks with sensors. Wireless sensor networks consist
of tiny sensors which really suffer from the lack of
processing, memory and battery power. Applying any
encryption scheme requires transmission of extra bits
with consumption of extra energy. Hence techniques like
Steganography, cryptography are used in WSN for secure
transmission of data. Cryptography aims at hiding the
main content of a message, steganography aims at hiding
the present existence of the message. Steganography is the
art of covert communication by embedding a message into
the multimedia data (image, sound, video, etc.).
There are numerous security threats in Wireless
Sensor Networks. Most are similar to those of wired
nature while some are severe with the inclusion of
wireless connectivity. Wireless networks are usually more
prone to various security threats as unguided
transmission medium is more vulnerable to security
attacks than those of the guided transmission medium.
Attacks against wireless sensor networks could be broadly
classified in two different levels of views: The attack
against the security mechanisms and against the basic
mechanisms like routing mechanisms. The various attacks