The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.1016/j.comcom.2014.01.012
|View full text |Cite
|
Sign up to set email alerts
|

A survey of intrusion detection in wireless network applications

Abstract: Information systems are becoming more integrated into our lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network intrusion detection research, we survey the literature of this area. Our approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
95
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 179 publications
(96 citation statements)
references
References 111 publications
(220 reference statements)
0
95
0
1
Order By: Relevance
“…After studying many intrusion detection systems specially designed for wireless sensor networks [5], we can conclude that the detection logic deployment issue is rarely mentioned. Indeed, although these studies use selected sensors for implementing totally or partially an intrusion detection logic, there is no indication how these sensors are selected.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…After studying many intrusion detection systems specially designed for wireless sensor networks [5], we can conclude that the detection logic deployment issue is rarely mentioned. Indeed, although these studies use selected sensors for implementing totally or partially an intrusion detection logic, there is no indication how these sensors are selected.…”
Section: Related Workmentioning
confidence: 99%
“…We must note that as in classical WSN, clustering techniques are widely used for providing routing features and data aggregation, IDS-agents are generally implemented in the cluster head [5]. Nevertheless, this placement method is not efficient especially in WISN.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed model contains specification based technique, signatures based technique using some fixed rules representing most dangerous attacks in WSN, and anomaly detection based on SVM [5], to confirm the malicious behavior of a target identified by behavior detection technique, and analyze data for classification. …”
Section: Proposed Hybrid Idsmentioning
confidence: 99%
“…Hai et al [23], [4] proposed a hybrid, lightweight intrusion detection system for sensor networks (SN), using the scheme of Roman et al [5]. Intrusion detection scheme profit from advantage of cluster-based protocol to form a hierarchical network (HN) to give an intrusion framework based on anomaly and misuse techniques.…”
Section: Related Workmentioning
confidence: 99%