International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 4
October-December 2025
Indexing Partners
A Comparison study of various Wireless Intrusion Detection Systems
| Author(s) | Prof. Dr. B . Devanathan, Ms. E . Ammu |
|---|---|
| Country | India |
| Abstract | The growing sophistication of cyberattacks is making it harder to detect breaches accurately. Failure to prevent intrusions can damage the reputation of the security services. A. Data accessibility, confidentiality, integrity. To address computer security risks in wireless sensor networks (WSN), a range of intrusion detection approaches have been presented in the literature, which can be classified into two general categories: anomaly-based intrusion detection systems (AIDS) and signature-based intrusion detection systems (SIDS). This survey study presents an overview of the datasets commonly used for evaluation, the taxonomy of existing IDS, and a detailed review of significant recent research. The evasion strategies used by attackers to avoid detection in WSN are also described, along with the challenges that need to be addressed in future research to oppose these strategies and improve the security of computer systems. |
| Keywords | WDS- wireless Sensor Network, IDS-Intrusion Detection System, SIDS,- Signature- based IDS,AIDS- Anomaly-based IDS,NBIDS-Network Based IDS,HBIDS-Host Based IDS. |
| Field | Engineering |
| Published In | Volume 16, Issue 4, October-December 2025 |
| Published On | 2025-11-19 |
| DOI | https://doi.org/10.71097/IJSAT.v16.i4.9500 |
| Short DOI | https://doi.org/hbb8gp |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.