2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies 2015
DOI: 10.1109/ngmast.2015.29
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Intrusion Detection System for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The output of the anomaly and misuse modules are integrated with a decision-making module to identify the presence of an attack before subsequently classifying into different attack type. In [14], a distributed two-layer and threelayer IDS scheme was proposed for WSN to detect intrusion using 10% of the data to learn during the training phase. A complexity reduction process was introduced to select the features to minimize the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…The output of the anomaly and misuse modules are integrated with a decision-making module to identify the presence of an attack before subsequently classifying into different attack type. In [14], a distributed two-layer and threelayer IDS scheme was proposed for WSN to detect intrusion using 10% of the data to learn during the training phase. A complexity reduction process was introduced to select the features to minimize the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…A Wireless Sensor Network consists of a large number of sensor nodes that communicate wirelessly. Healthcare, sports training, workplace safety, consumer electronics, secure authentication, and protection of uniformed personnel are just a few of the applications of WSN, meaning it is ubiquitous and has broad market potential 1 . In a wireless sensor network, data aggregation reduces packet transmissions and enhances network duration, as sensor data is collected and delivered to the base station by aggregation nodes.…”
Section: Introductionmentioning
confidence: 99%