Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.

Existing System:

In single-sensing detection, At a time only one intruder detected by the wsn. Our Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network. It is because individual sensors can only sense a portion of the intruder.

Proposed System:

In Heterogeneous wireless sensor ,Intruder detected anywhere in the network. We are detecting the intruder in multiple sensor heterogeneous wireless sensor network. Intrusion detection in heterogeneous WSNs by characterizing intrusion detection with respect to the network parameters. Two detection models are:

  • Single-sensing detection
  • Multiple-sensing detection models
We are detecting the intruder both single sensor and multiple sensor heterogeneous wireless sensor network.

Module Description:

  • Constructing Sensor Network:

  • In this module, we are going to connect the network .Each node is connected the neighboring node and it is independently deployed in network area. And also deploy the each port no is authorized in a node.
  • Packet Creation:

  • In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector.
  • Find authorized and un authorized port:

  • The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this module check whether the path is authorized or unauthorized. If path is authorized the packet is send to valid destination. Otherwise the packet will be deleted. According port no only we are going to find the path is authorized or Unauthorized.
  • Constructing Inter-Domain Packet Filters:

  • If the packet is received from other than the port no it will be filtered and discarded. This filter only removes the unauthorized packets and authorized packets send to destination.
  • Receiving the valid packet:

  • In this module, after filtering the invalid packets all the valid Packets will reach the destination.