Filters








8,230 Hits in 6.6 sec

Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey

Jeelani ., Manoj Rana, Aasim Zafar
2018 IJARCCE  
In this article, our focal point of consideration is on Intrusion Detection Architecture for Wireless Sensor Networks.  ...  The Intrusion Detection Architecture (IDA) in Wireless Sensor Network is used to detect various attacks occurring on sensor nodes of WSNs that are placed in various hostile environments.  ...  , anomaly based detection system, hybrid based detection system, etc) in Wireless Sensor Networks.  ... 
doi:10.17148/ijarcce.2018.71024 fatcat:3qezkgmkyjbtjms6ecmnqeyp5q

Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

S. Khan, Jaime Lloret, Jonathan Loo
2014 International Journal of Distributed Sensor Networks  
In the paper "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, " a critical study on genetic algorithm, artificial immune, and artificial neural network  ...  (ANN) based IDSs techniques used in wireless sensor network (WSN) is presented.  ...  The authors of the paper "Intrusion detection systems in wireless sensor networks: a review" present a review of IDSs in WSN such as the following.  ... 
doi:10.1155/2014/747483 fatcat:vjdr7bpajzbjbmrea2zkirgbty

Toward Intelligent Intrusion Prediction for Wireless Sensor Networks Using Three-Layer Brain-Like Learning

Jun Wu, Song Liu, Zhenyu Zhou, Ming Zhan
2012 International Journal of Distributed Sensor Networks  
The intrusion prediction for wireless sensor networks (WSNs) is an unresolved problem.  ...  Hence, the current intrusion detection schemes cannot provide enough security for WSNs, which poses a number of security challenges in WSNs.  ...  A wireless sensor network is consisted of a large number of wireless-capable sensor devices working collaboratively to achieve a common objective.  ... 
doi:10.1155/2012/243841 fatcat:drmmhgmmx5a37pbblle4chjrua

Intrusion Detection Technology for Wireless Sensor Networks Based on Autoregressive Moving Average

Ju-zhen Yu, Qiangyi Li
2022 Advances in Multimedia  
intrusion detection technology based on traffic prediction is proposed.  ...  In wireless sensor networks (WSNs), aiming at the problems that internal attacks such as network congestion and high energy consumption seriously threaten the network security and normal operation, an  ...  Related Works Wireless sensor network is composed of a group of sensor nodes and gateway nodes.  ... 
doi:10.1155/2022/2155748 fatcat:bwplvcxcwfebzbxtz2bk5ahofu

A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network

Yassine Maleh, Abdellah Ezzati
2013 International Journal of Wireless & Mobile Networks  
In this paper we present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent Intrusion Detection schemes in WSNs.  ...  Wireless sensor networks are currently the greatest innovation in the field of telecommunications.  ...  The first approach usesamodel-based on authentication, and the second scheme is called Energy-Saving.IN [21] a hybrid intrusion detection system (HIDS) model has been anticipated for wireless sensor  ... 
doi:10.5121/ijwmn.2013.5606 fatcat:z3uwveashnh4xgf75tt666yc2q

A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks [article]

Y. Maleh, A. Ezzati
2014 arXiv   pre-print
In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.  ...  Security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor nodes.  ...  IN [21] a hybrid intrusion detection system (HIDS) model has been anticipated for wireless sensor networks. This paper does not promote a solution.  ... 
arXiv:1401.1982v1 fatcat:kqqiwyocjrhuvlchyde5oxwuce

DETECTING MULTIPLE INTRUSION ATTACKS USING PERMANENT GIRTH CLUSTERING MODEL IN WIRELESS SENSOR NETWORK

Jayamurugan
2014 Journal of Computer Science  
In order to approximate intrusion detection scheme, extensive sensor network simulator producing routing attacks in wireless sensor networks is designed.  ...  Of the different types of security threats in wireless sensor network, particularly dangerous attack is the replica node attack, in which the opponent takes the secret keying materials from a compromised  ...  In summary, our contributions are: • To approximate intrusion detection scheme to attain high detection accuracy with a low false positive rate in wireless sensor networks • Focuses on constructing an  ... 
doi:10.3844/jcssp.2014.1473.1479 fatcat:cu7seqcvzvd7pn5c7rozfzpoey

Data-Mining Techniques for Routing Attacks in Wireless Sensor Networks

Asha R N, Venkatesan S
2019 Zenodo  
In this work, a technique is proposed to detect anomaly nodes in WSN using association with rules and applying clustering algorithm to improve routing in wireless sensor networks.  ...  The detection scheme proposed works with no priori knowledge and is efficient to identify routing attacks in various different wireless sensor networks.  ...  In this work, using data mining a method is proposed to detect anomaly in wireless sensor networks with individual attacks on sensors for efficient security.  ... 
doi:10.5281/zenodo.3340570 fatcat:nmx2qvp2rvae7aphtpv6kx6sfi

Wireless Sensor Network based: Design Principles & measuring performance of IDS

Kamaljit Kaur, Bhupinder Singh
2010 International Journal of Computer Applications  
In this paper different Intrusion detection systems are analyzed basis on design and performance in real time wireless sensor network environment.  ...  It has designed and implemented an agent-based ID on a limited set of wireless sensor nodes as a preliminary implementation.  ...  This scheme presents a model for a type of group based deployment of sensor nodes [5] .  ... 
doi:10.5120/597-148 fatcat:77e3uevny5ehfhiq32kvj6mp4i

A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks [chapter]

Wen Shen, Guangjie Han, Lei Shu, Joel J. P. C. Rodrigues, Naveen Chilamkurti
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this paper, we propose a novel intrusion detection scheme based on the energy prediction in cluster-based WSNs (EPIDS).  ...  Wireless Sensor Networks (WSNs) require an efficient intrusion detection scheme to identify malicious attackers.  ...  The group-based intrusion detection system first divides the sensor nodes into a number of groups using δ-grouping algorithm such that the nodes in a group are physically close to each other.  ... 
doi:10.1007/978-3-642-33368-2_1 fatcat:wex4pfbntncuxgd57qf5l6b5dm

Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks

Rakesh Sharma, Vijay Anant Athavale
2019 International journal of advanced networking and applications  
., sensor nodes) and/or information destination (i.e., data sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected. some or all of the following information  ...  Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  Guorui Li et al. (2008) propose a distributed group-based intrusion detection scheme that meets all the requirements by partitioning the sensor networks into many groups in which the sensors in each  ... 
doi:10.35444/ijana.2019.10044 fatcat:ik64rdfnczhupc56x3qqadqgju

An Effective Hierarchical IDS for Wireless Sensor Networks

Amar Saraswat, Vishal Bharti
2013 International Journal of Computer Applications  
and enhancing the security in wireless sensor Network.  ...  This paper emphasizes on safeguarding the hierarchical structure in wireless sensor network by presenting an Intrusion Detection Technique, which is very useful, simple and works effectively in improving  ...  NUMEROUS IDS SCHEMES FOR WIRELESS SENSOR NETWORK 3.1 Energy Proficient Hybrid Intrusion Detection System Su et al. proposed eHIPenergy efficient hybrid intrusion prohibition system [9] to improve this  ... 
doi:10.5120/13453-1080 fatcat:gfa25wn32vb7nmymjyn6uvix7i

Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control

Lipi Chhaya, Paawan Sharma, Govind Bhagwatikar, Adesh Kumar
2017 Electronics  
Security of wireless sensor based communication network is a major concern for researchers and developers.  ...  The limited processing capabilities of wireless sensor networks make them more vulnerable to cyber-attacks.  ...  Misuse Detection Misuse detection is a signature based intrusion detection system to discover recognized attacks.  ... 
doi:10.3390/electronics6010005 fatcat:mb45iq5jubfqto33ccraxn5ary

A novel intrusion detection framework for wireless sensor networks

Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee
2012 Personal and Ubiquitous Computing  
In this paper, a novel intrusion detection framework is proposed for securing wireless sensor networks from routing attacks.  ...  Wireless sensor networks are a soft target for intruders or adversaries to launch lethal attacks in its present configuration.  ...  We also briefly explained different intrusion-based detection schemes for wireless sensor networks.  ... 
doi:10.1007/s00779-012-0529-y fatcat:ytebussgibfmxbkutos6ksjqhy

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

Dong Chen
2012 KSII Transactions on Internet and Information Systems  
First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed  ...  Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively.  ...  In [30] , the authors propose a distributed IDS for WSNs based on groups.  ... 
doi:10.3837/tiis.2012.01.002 fatcat:ycyufngdtrdobmu33j3wqizydy
« Previous Showing results 1 — 15 out of 8,230 results