Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) 2012
DOI: 10.1109/cybersec.2012.6246085
|View full text |Cite
|
Sign up to set email alerts
|

Energy-efficient intrusion detection in Wireless Sensor Network

Abstract: The use of Wireless Sensor Networks (WSNs) has developed rapidly in the last decade. Deploying tiny sensors with limited battery power in open and unprotected environment and dynamic topology in WSNs raises security issues in this kind of networks. Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The principle tasks of IDS are prevention and detection of attacks, situational awareness, evidence collection, and administration of connection topologies [33,34]. The strategies for attacks and detection system for WSNs is different from other wireless or wired networks due to their structure and limited battery life.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The principle tasks of IDS are prevention and detection of attacks, situational awareness, evidence collection, and administration of connection topologies [33,34]. The strategies for attacks and detection system for WSNs is different from other wireless or wired networks due to their structure and limited battery life.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The strategies for attacks and detection system for WSNs is different from other wireless or wired networks due to their structure and limited battery life. Intrusion detection approaches for WSN are classified as follows [33][34][35].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…In flat-based routing, all sensors share the same set of tasks in the network. Sensor selection for querying is difficult due to lack of global ID along with random extensions of nodes [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This approach is application specific and it is manually defined by an administrator. Hybrid approach can be a combination of anomaly and misuse detection approaches for accurate results [84][85][86][87][88].…”
Section: Hybrid Detectionmentioning
confidence: 99%
“…To detect the above-mentioned anomalies, different types of approaches are applied [86]. These anomaly detection approaches can be classified as game theoretic, statistical, machine learning, artificial immune system and data mining based approach [85][86][87][88].…”
mentioning
confidence: 99%