Loading

An Effective Reliable Secure Data Gathering and Intrusion Detection Scheme for WSN
S. Gopinath1, N. A. Natraj2, N. Suresh Kumar3

1Dr. S. Gopinath, Department of Electronics and Communication Engineering, Karpagam Institute of Technology, Coimbatore (Tamil Nadu), India.
2Prof. N. A. Natraj, Department of Electronics and Communication Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai (Tamil Nadu), India.
3Dr. N. Suresh Kumar, Department of Electronics and Communication Engineering, AVS Engineering College, Salem (Tamil Nadu), India.

Manuscript received on 18 December 2018 | Revised Manuscript received on 27 December 2018 | Manuscript published on 30 December 2018 | PP: 13-17 | Volume-8 Issue-2, December 2018 | Retrieval Number: B5509128218/18©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless Sensor Network is a indivisible part of network where it has no infrastructure. In the past, Intrusion detection systems were used to detect intrusions in network effectively. Most of the systems are able to detect intrusions with high false alarm rate. In this paper, we propose a Effective Trust based Intrusion Detection System (ETIDS) for detecting malicious activities and providing authentication as well as data integrity. To achieve this, Cluster based routing is established based on trust vector of neighbor nodes in random topology. Trust based Recommendation and key based authentication protocol is integrated with clock based verification method to identify malicious nodes. Simulation results shows that the ETIDS provides better detection efficiency, packet delivery ratio, low end to end delay, successful certification rate and low overhead than existing schemes.
Keywords: WSN, Intrusion Detection System, Data Gathering, Malicious, Mobility, packet delivery ratio, Detection efficiency and delay.

Scope of the Article: WSN