IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. V (Mar-Apr. 2016), PP 60-63 www.iosrjournals.org DOI: 10.9790/0661-1802056063 www.iosrjournals.org 60 | Page Evaluation of Intrusion Detection Schemes in Wireless Sensor Network Ishu Gupta 1 , Kishu Gupta 2 1 (Computer Application, National Institute of Technology (Kurukshetra), India, 2 (Computer Application, Kurukshetra University (Kurukshetra), India, Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environment and the sensors nodes are fully distributed in nature. In order to communicate with each other a multi hop communication should be used. Moreover, WSNs have limitations in terms of computations, memory, bandwidth, and energy. The distributed nature, multi hop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. IDS is capable to detect an intrusion and raise an alarm for appropriate responses. The aim of this paper is to provide a detailed review about current IDS schemes for WSN. Finally we focus on comparison of recent Intrusion Detection Schemes in WSNs. Keywords: Anomaly-based IDS, Cluster-based IDS, Intrusion Detection System, sensor node, Signature-based IDS, Wireless Sensor Network I. Introduction A Wireless Sensor Networks (WSN) consists of large number of low-power, low-cost sensor node that communicate wirelessly. These sensors are self-organized and deployed automatically in highly distributed and homogenous network environment. Also, it does not require any predefined infrastructure. The aim of using such sensors is to collect and process information about the surrounding environment. The packets will be transmitted from one node to another via multi-hope communication. The computation and energy resources are restricted in WSN. Fig 1: Wireless Sensor Network [1] As the sensor nodes are deployed in open wireless medium, multi-hop data forwarding and the distributed nature, thus WSN becomes highly venerated towards security attacks. It can be attacked either by passive or active attacks. In passive attacks, attacker attempts to acquire imperative information by listening the stream of data sent via the communication channel while in active attacks, attacker has the ability to modify or delete the data in the network. The prevention-based techniques such as cryptography, key management, and authentication have been implemented to secure and protect the network from malicious activities. Yet, these techniques will not be able to secure the network from internal attack that leads to extract some sensitive information [2] [3] [4] [5]. Detection-based techniques are introduced to overcome the limitation of the prevention-based technique. IDS are capable to detect an intrusion. This technique will be placed as second layer of defense to detect the internal as well the external attacks and keep the network secure from any malicious activities. The aim of this paper is to provide a detailed review about the current IDS for WSN. Furthermore, we classified the IDS based on the detection techniques. Finally we discussed and concluded work.