Skip to main content

Abstract

Wireless sensor network (WSN) comprises of sensor nodes such as magnetic, thermal, infra red, and the radar is setup in a particular geographical area. These nodes are used to transmit data or packet from one node to another i.e., from sender to receiver. The capabilities of WSN include manipulating and controlling the physical and environmental entities such as – humidity, temperature, sound, pressure, light etc. Wireless Sensor Networks have various applications such as Military applications, Healthcare applications etc. and also the security of the wireless sensor network is becoming a major concern. There are various types of attacks that are performed on wireless sensor networks. So due to this it is necessary to prevent WSN against these types of attacks. The size of the sensor node is small. The sensor nodes are energy constraints. The sensor nodes can easily be operated on low power. Basically, this paper presents a system which is used to prevent WSN from various types of attacks. By using the concept of artificial intelligence, we can easily detect the malicious nodes so that we can easily prevent our secret information from malicious nodes and also on expert system is developed using C language to prevent WSN from various types of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abidin, S., Izhar, M.: Attacks on WSN and its limitations. Int. J. Comput. Sci. Eng. 5(11), 157–160 (2017)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramanium, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. Manag. 11(6), 38–43 (2004)

    Article  Google Scholar 

  4. Hu, F., Sharma, N.K.: Security consideration in ad hoc sensor networks. Ad Hoc Netw. 3(1), 69–89 (2005)

    Article  Google Scholar 

  5. Zhou, Y., Fang, Y., Zhang, Y.: Security wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 10(3), 6–28 (2008)

    Article  Google Scholar 

  6. Bulbenkiene, V., Jakovlev, S., Mumgaudis, G., Pridotkes, G.: Energy loss model in wireless sensor networks. In: Second International Conference on IEEE Digital Information Processing and Communication (ICDIPC), pp. 36–38, 10–12 July 2012

    Google Scholar 

  7. Dening, D.: An intrusion detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)

    Article  Google Scholar 

  8. Zhang, Y., Lee, W.: Instrusion detection in wireless ad-hoc network. In: Proceeding of the 6th Annual International Conference on Mobile Computing, MobiCom 2000, pp. 275–283. ACM, New York (2000). http://doi.acm.org/10.1145/345910.345958

  9. Deng, J., et al.: A performance evaluation of intrusion-tolerant routing in wireless sensor network. In: Zhao, F., Guibas, L. (eds.) Information Processing in Sensor Network, vol. 2634, pp. 349–364. LNCS. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36978-3_23

    Chapter  Google Scholar 

  10. Chou, F., Tan, J.: A majority voting scheme in wireless sensor network for detecting suspicious node. In: Second International symposium on Electronic commerce and Security, ISECS 2009, vol. 2, pp. 495–498, May 2009

    Google Scholar 

  11. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasure. In: Proceeding of the First IEEE International Workshop on Sensor Network Protocol and Application, pp. 113–127, May 2003

    Google Scholar 

  12. Weingartner, E., et al.: A performance comparison of recent network simulators. In: IEEE International Conference on Communications, ICC 2009, June 2009

    Google Scholar 

  13. Abidin, S., Ahuja, M., Izhar, M.: Minimizing risks in wireless sensor network. In: IEEE International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing – EECCMC 2018. IEEE XPLORE (Part No. CFP18O37-ART), 28–29 January 2018. ISBN 978-1-5386-4304-4 and 978-1-5386-4303-7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiqul Abidin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abidin, S. (2019). Enhancing Security in WSN by Artificial Intelligence. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_93

Download citation

Publish with us

Policies and ethics