TY - JOUR N2 - Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system. L1 - http://journals.pan.pl/Content/127376/PDF/15-3977-Kipongo-sk.pdf L2 - http://journals.pan.pl/Content/127376 PY - 2023 IS - No 2 EP - 318 DO - 10.24425/ijet.2023.144366 KW - Intrusion Detection Systems KW - wireless sensor networks KW - Cooja simulator KW - sensor nodes KW - NS2 A1 - Kipongo, Joseph A1 - Swart, Theo G. A1 - Esenogho, Ebenezer PB - Polish Academy of Sciences Committee of Electronics and Telecommunications VL - vol. 69 DA - 2023.05.31 T1 - Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks SP - 309 UR - http://journals.pan.pl/dlibra/publication/edition/127376 T2 - International Journal of Electronics and Telecommunications ER -