Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks

Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is requir...

Full description

Bibliographic Details
Main Authors: Joseph Kipongo, Theo G. Swart, Ebenezer Esenogho
Format: Article
Language:English
Published: Polish Academy of Sciences 2023-05-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdf
_version_ 1797815238283755520
author Joseph Kipongo
Theo G. Swart
Ebenezer Esenogho
author_facet Joseph Kipongo
Theo G. Swart
Ebenezer Esenogho
author_sort Joseph Kipongo
collection DOAJ
description Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.
first_indexed 2024-03-13T08:19:41Z
format Article
id doaj.art-712b14d0bf2f4c46b507c069fa553fbf
institution Directory Open Access Journal
issn 2081-8491
2300-1933
language English
last_indexed 2024-03-13T08:19:41Z
publishDate 2023-05-01
publisher Polish Academy of Sciences
record_format Article
series International Journal of Electronics and Telecommunications
spelling doaj.art-712b14d0bf2f4c46b507c069fa553fbf2023-05-31T10:14:03ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332023-05-01vol. 69No 2309318https://doi.org/10.24425/ijet.2023.144366Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor NetworksJoseph Kipongo0Theo G. Swart1Ebenezer Esenogho2Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaCenter for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaCenter for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaWireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdfintrusion detection systemswireless sensor networkscooja simulatorsensor nodesns2
spellingShingle Joseph Kipongo
Theo G. Swart
Ebenezer Esenogho
Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
International Journal of Electronics and Telecommunications
intrusion detection systems
wireless sensor networks
cooja simulator
sensor nodes
ns2
title Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
title_full Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
title_fullStr Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
title_full_unstemmed Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
title_short Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
title_sort design and implementation of intrusion detection systems using rpl and aovd protocols based wireless sensor networks
topic intrusion detection systems
wireless sensor networks
cooja simulator
sensor nodes
ns2
url https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdf
work_keys_str_mv AT josephkipongo designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks
AT theogswart designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks
AT ebenezeresenogho designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks