2016 2nd International Conference on Next Generation Computing Technologies (NGCT) 2016
DOI: 10.1109/ngct.2016.7877454
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Modern systems for attack detection IDS (Intrusion Detection System) collect information from network, save the information and based on detailed data analysis detect the attacker in the network (Shanthi et al, 2016). These systems contain procedures and mechanisms for detection, prevention and reaction in case of attack.…”
Section: • Victimmentioning
confidence: 99%
“…Modern systems for attack detection IDS (Intrusion Detection System) collect information from network, save the information and based on detailed data analysis detect the attacker in the network (Shanthi et al, 2016). These systems contain procedures and mechanisms for detection, prevention and reaction in case of attack.…”
Section: • Victimmentioning
confidence: 99%
“…Auditing information is used to analyze the behavior of the system in case of failure [5]. Jamming Attack: Jamming Attack is caused by hampering the radio frequency of attacker nodes with the other nodes.…”
Section: Security Requarements In Wsnsmentioning
confidence: 99%
“…Thus, it only employed for detecting the attacks. We can classify the common components of the IDS as: "Monitoring Component" that evaluate the traffic and maintain the track of the traffic; "Analysis and Detection" which attempts to notice the strange behaviours appear in the network; and "Alarm Component "-that raises a flag or alarm when any intimidation is detected [5]. See …”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The provided system incorporates a diversity of determining the attacker technologies, thus the system is able to efficiently notice and establish the compound, synchronized, and complex attacks. While, in [5] the authors discussed the intrusion detections and the common attacks in Wireless Sensor Networks (WSN). They presented the main problems of security techniques in WSN, the attempting of attackers to make risks in security and they also discussed the mainly capable systems of Intrusion Detection with providing a wish that will help the investigators to perform additional investigations.…”
Section: Related Workmentioning
confidence: 99%