Abstract
Wireless sensor network (WSN) comprises of sensor nodes such as magnetic, thermal, infra red, and the radar is setup in a particular geographical area. These nodes are used to transmit data or packet from one node to another i.e., from sender to receiver. The capabilities of WSN include manipulating and controlling the physical and environmental entities such as – humidity, temperature, sound, pressure, light etc. Wireless Sensor Networks have various applications such as Military applications, Healthcare applications etc. and also the security of the wireless sensor network is becoming a major concern. There are various types of attacks that are performed on wireless sensor networks. So due to this it is necessary to prevent WSN against these types of attacks. The size of the sensor node is small. The sensor nodes are energy constraints. The sensor nodes can easily be operated on low power. Basically, this paper presents a system which is used to prevent WSN from various types of attacks. By using the concept of artificial intelligence, we can easily detect the malicious nodes so that we can easily prevent our secret information from malicious nodes and also on expert system is developed using C language to prevent WSN from various types of attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abidin, S., Izhar, M.: Attacks on WSN and its limitations. Int. J. Comput. Sci. Eng. 5(11), 157–160 (2017)
Akyildiz, I.F., Su, W., Sankarasubramanium, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. Manag. 11(6), 38–43 (2004)
Hu, F., Sharma, N.K.: Security consideration in ad hoc sensor networks. Ad Hoc Netw. 3(1), 69–89 (2005)
Zhou, Y., Fang, Y., Zhang, Y.: Security wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 10(3), 6–28 (2008)
Bulbenkiene, V., Jakovlev, S., Mumgaudis, G., Pridotkes, G.: Energy loss model in wireless sensor networks. In: Second International Conference on IEEE Digital Information Processing and Communication (ICDIPC), pp. 36–38, 10–12 July 2012
Dening, D.: An intrusion detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)
Zhang, Y., Lee, W.: Instrusion detection in wireless ad-hoc network. In: Proceeding of the 6th Annual International Conference on Mobile Computing, MobiCom 2000, pp. 275–283. ACM, New York (2000). http://doi.acm.org/10.1145/345910.345958
Deng, J., et al.: A performance evaluation of intrusion-tolerant routing in wireless sensor network. In: Zhao, F., Guibas, L. (eds.) Information Processing in Sensor Network, vol. 2634, pp. 349–364. LNCS. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36978-3_23
Chou, F., Tan, J.: A majority voting scheme in wireless sensor network for detecting suspicious node. In: Second International symposium on Electronic commerce and Security, ISECS 2009, vol. 2, pp. 495–498, May 2009
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasure. In: Proceeding of the First IEEE International Workshop on Sensor Network Protocol and Application, pp. 113–127, May 2003
Weingartner, E., et al.: A performance comparison of recent network simulators. In: IEEE International Conference on Communications, ICC 2009, June 2009
Abidin, S., Ahuja, M., Izhar, M.: Minimizing risks in wireless sensor network. In: IEEE International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing – EECCMC 2018. IEEE XPLORE (Part No. CFP18O37-ART), 28–29 January 2018. ISBN 978-1-5386-4304-4 and 978-1-5386-4303-7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Abidin, S. (2019). Enhancing Security in WSN by Artificial Intelligence. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_93
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_93
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)