• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 11 (1), 2012
  3. 40-48
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2012 | Volume: 11 | Issue: 1 | Page No.: 40-48
DOI: 10.3923/itj.2012.40.48

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 102

Authors


Soojin Lee


Yunho Lee


Sang-Guun Yoo


Keywords


  • intrusion detection system
  • low energy adaptive clustering hierarchy protocol
  • misbehavior
  • network performance analysis
  • network simulation
  • security
  • Wireless sensor network
Research Article

A Specification Based Intrusion Detection Mechanism for the LEACH Protocol

Soojin Lee, Yunho Lee and Sang-Guun Yoo
With the improvement of the wireless communication and embedded technology, the application of wireless sensor network has increased to various fields. However, such type of network embeds more vulnerabilities than others because of its resource constrained characteristic. To counteract such problem, traditional security mechanisms such as cryptography and authentication have been used. However, those are not enough to solve all security issues that may happen in the wireless sensor network, especially those attacks executed by a compromised node. This fact creates the need for a complementary security mechanism. This paper proposes a specification-based intrusion detection mechanism for the wireless sensor network, specifically for the popular cluster based Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. It identifies the possible attacks in different phases of such protocol, develop the intrusion detection mechanism and execute simulations to analyze the efficiency of the proposed solution. This paper has also shown how the proposed mechanism offers a high intrusion detection rate while maintaining a low traffic overhead.
PDF Fulltext XML References Citation

How to cite this article

Soojin Lee, Yunho Lee and Sang-Guun Yoo, 2012. A Specification Based Intrusion Detection Mechanism for the LEACH Protocol. Information Technology Journal, 11: 40-48.

DOI: 10.3923/itj.2012.40.48

URL: https://scialert.net/abstract/?doi=itj.2012.40.48

Related Articles

Implementation of IPv6 Network Testbed: Intrusion Detection System on Transition Mechanism
EOATR: Energy Efficient Object Tracking by Auto Adjusting Transmission Range in Wireless Sensor Network
Parking Guidance System Utilizing Wireless Sensor Network and Ultrasonic Sensor
Survey of Geographical Routing in Multimedia Wireless Sensor Networks
A Performance Comparison of Ad Hoc Routing Protocols Based on Ant Mobility Model

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved