2013
DOI: 10.1002/sec.687
|View full text |Cite
|
Sign up to set email alerts
|

An efficient intrusion detection framework in cluster‐based wireless sensor networks

Abstract: In the last few years, the technological evolution in the field of wireless sensor networks was impressive, which made them extremely useful in various applications (military, commercial, etc.). In such applications, it is essential to protect the network from malicious attacks. This presents a demand for providing security mechanisms in these vulnerable networks. In this paper, we design a new framework for intrusion detection in cluster‐based wireless sensor networks. Our detection framework is composed of d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
36
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 39 publications
(36 citation statements)
references
References 25 publications
0
36
0
Order By: Relevance
“…Intrusion detection is the most reliable approach to protect vehicular networks against threats as it has the ability to detect insider and external attacks with a high accuracy [2]. Some research has been done in the area of IDS / IPS for Mobile Ad-hoc Networks (MANETs) and VANETs in [1], [24]- [30].…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection is the most reliable approach to protect vehicular networks against threats as it has the ability to detect insider and external attacks with a high accuracy [2]. Some research has been done in the area of IDS / IPS for Mobile Ad-hoc Networks (MANETs) and VANETs in [1], [24]- [30].…”
Section: Related Workmentioning
confidence: 99%
“…The IDS technique is very effective in protecting the network against malicious nodes [4]. However, the current IDS frameworks conceived for HetVNet and/or VANET [5][6]- [9][10][11] take a final decision (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…and in the other hand form a specific network with particular characteristics (frequent fragmentation, dynamic topology, no centralized authority, etc.). Intrusion detection system (IDS) is a security mechanism that has the ability to detect a malicious behavior that targets the network and raises an alarm when the intruder is detected [4]. It acts as second wall of defense when cryptography is broken and already proved its effectiveness against both external and internal intruders.…”
Section: Introductionmentioning
confidence: 99%
“…There are different kinds of attacks on WSNs . For instance, attacks such as hello flood, black hole, and wormhole are detected using intrusion detection systems . However, in this work, we are interested in attacks that threaten the application level and occurred when data aggregation is involved .…”
Section: Introductionmentioning
confidence: 99%