2009
DOI: 10.1007/978-3-642-00224-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Intrusion Detection in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
2

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 70 publications
(49 citation statements)
references
References 8 publications
0
47
0
2
Order By: Relevance
“…Signaturebased IDSs are well work with for known intrusions; however they cannot detect new security attacks or those attacks having no predefined rules. In [5], a rule-based IDS for WSNs is presented. It is host based in which every node has IDS.…”
Section: Signature-based Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Signaturebased IDSs are well work with for known intrusions; however they cannot detect new security attacks or those attacks having no predefined rules. In [5], a rule-based IDS for WSNs is presented. It is host based in which every node has IDS.…”
Section: Signature-based Intrusion Detection Systemsmentioning
confidence: 99%
“…The proposed IDS are hosted on each sensor node and requires TinyOS with the combination of Mint Route routing protocol. It is an advanced version of [5] with narrow approach; that is, the former can trace many packet-dropping and misdirecting attacks while the latter is only designed for detection of sink-hole attacks. A decentralized rule-based IDS is proposed in [7].…”
Section: Signature-based Intrusion Detection Systemsmentioning
confidence: 99%
“…al., retrieve the cryptography secrets on a sensor node of MICA2 type by removing its inner memory via the JTAG interface. This attack is further explored in [17], where Becher et. al., displays how to retrieve many components of node hardware like external memory, and the boot-strap loader or the JTAG-interface.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation. A cooperative IDS engine is then employed for detecting more attacks, based on neighbor information [13,38].…”
Section: State Of the Artmentioning
confidence: 99%