2009
DOI: 10.1002/wcm.785
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight intrusion detection framework for wireless sensor networks

Abstract: In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful applications for both civil and military tasks. However, sensor networks are susceptible to multiple types of attacks because they are randomly deployed in open and unprotected environments. It is necessary to utilize effective mechanisms to protect sensor networks against multiple types of attacks on routing protocols. In this paper, we propose a lightweight intrusion detection framework integrated for clustered sensor networks. Fur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(48 citation statements)
references
References 28 publications
0
48
0
Order By: Relevance
“…Yu et al [7] tried to secure clustering mechanism against wormhole attack in ad-hoc networks (communication between CHs) but after forming clusters, not during the election procedure of CHs. Hai et al [21] propose a lightweight intrusion detection framework integrated for clustered sensor networks by using an over-hearing mechanism to reduce the sending alert packets. Elhdhili et al [6] propose a reputation based clustering algorithm (RECA) that aims to elect trustworthy, stable and high energy cluster heads but during the election procedure, not after forming clusters.…”
Section: Related Workmentioning
confidence: 99%
“…Yu et al [7] tried to secure clustering mechanism against wormhole attack in ad-hoc networks (communication between CHs) but after forming clusters, not during the election procedure of CHs. Hai et al [21] propose a lightweight intrusion detection framework integrated for clustered sensor networks by using an over-hearing mechanism to reduce the sending alert packets. Elhdhili et al [6] propose a reputation based clustering algorithm (RECA) that aims to elect trustworthy, stable and high energy cluster heads but during the election procedure, not after forming clusters.…”
Section: Related Workmentioning
confidence: 99%
“…They studied multiple types of attacks on routing protocols in detail and the effects on common routing protocols in WSNs. The assumption is that there are two types of attacks, outer attacks and inner attacks [1,2]. Other researchers have used a decentralized approach to monitor network nodes with fault detections through the coordination of neighboring nodes [44] or the use of watchdogs to detect misbehavior in neighbors [30,31,45,46].…”
Section: Security In Wsnsmentioning
confidence: 99%
“…In the following section, we review the most common network layer attacks on WSNs we selected and we highlight the characteristics of these attacks [1,2,43,48].…”
Section: Security In Wsnsmentioning
confidence: 99%
See 2 more Smart Citations