Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is requir...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2023-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdf |
_version_ | 1797815238283755520 |
---|---|
author | Joseph Kipongo Theo G. Swart Ebenezer Esenogho |
author_facet | Joseph Kipongo Theo G. Swart Ebenezer Esenogho |
author_sort | Joseph Kipongo |
collection | DOAJ |
description | Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system. |
first_indexed | 2024-03-13T08:19:41Z |
format | Article |
id | doaj.art-712b14d0bf2f4c46b507c069fa553fbf |
institution | Directory Open Access Journal |
issn | 2081-8491 2300-1933 |
language | English |
last_indexed | 2024-03-13T08:19:41Z |
publishDate | 2023-05-01 |
publisher | Polish Academy of Sciences |
record_format | Article |
series | International Journal of Electronics and Telecommunications |
spelling | doaj.art-712b14d0bf2f4c46b507c069fa553fbf2023-05-31T10:14:03ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332023-05-01vol. 69No 2309318https://doi.org/10.24425/ijet.2023.144366Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor NetworksJoseph Kipongo0Theo G. Swart1Ebenezer Esenogho2Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaCenter for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaCenter for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South AfricaWireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdfintrusion detection systemswireless sensor networkscooja simulatorsensor nodesns2 |
spellingShingle | Joseph Kipongo Theo G. Swart Ebenezer Esenogho Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks International Journal of Electronics and Telecommunications intrusion detection systems wireless sensor networks cooja simulator sensor nodes ns2 |
title | Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks |
title_full | Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks |
title_fullStr | Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks |
title_full_unstemmed | Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks |
title_short | Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks |
title_sort | design and implementation of intrusion detection systems using rpl and aovd protocols based wireless sensor networks |
topic | intrusion detection systems wireless sensor networks cooja simulator sensor nodes ns2 |
url | https://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdf |
work_keys_str_mv | AT josephkipongo designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks AT theogswart designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks AT ebenezeresenogho designandimplementationofintrusiondetectionsystemsusingrplandaovdprotocolsbasedwirelesssensornetworks |