2014
DOI: 10.1186/1687-417x-2014-3
|View full text |Cite
|
Sign up to set email alerts
|

ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks

Abstract: Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises, and as such, they require security mechanisms to defend against them. An intrusion detection system (IDS) is one such solution to the problem. While several signature-based and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…The design factors of the modelling considered the components of Stackelberg games. It can be seen in the study of [18] that same author has carried out an alternative simulation to detect the anomaly of respective events.…”
Section: Techniques For Optimized Security Modelsmentioning
confidence: 99%
“…The design factors of the modelling considered the components of Stackelberg games. It can be seen in the study of [18] that same author has carried out an alternative simulation to detect the anomaly of respective events.…”
Section: Techniques For Optimized Security Modelsmentioning
confidence: 99%
“…However, the UWB ranging mechanism is not error-free. At the same time, it is vulnerable to ranging attacks (Karapistoli & Economides, 2014). Therefore, in order to fully assess the efficacy of the underlying detection algorithm, we devised a rigorous analytic framework that computes a node's probability of ranging at least two other nodes located in the same area.…”
Section: Introductionmentioning
confidence: 99%
“…The attack environment was modeling using Bayesian Stackelberg games where the outcome was studied on probability and utility factor. The same authors have presented a different work in the same year [38] for performing anomaly detection. Kumar et al [39] have jointly used the neural network and game theory to formulate a novel defense mechanism in WSN.…”
Section: Optimization-based Techniquesmentioning
confidence: 99%