2020
DOI: 10.4018/978-1-7998-5068-7.ch009
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Intrusion Detection System (IDS) for Security Enhancement in Wireless Sensor Networks

Abstract: Rapidly expanding application areas of wireless sensor networks (WSNs) that include critical civilian and military applications intensify the security concerns especially in hostile unattended environments. In order to ensure the dependability and security of continued WSN services, there is a need of alternate defense line called intrusion detection system (IDS). WSNs are comprised of a huge number of energy-constrained nodes whose battery replacement or recharging is a challenging task after their deployment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 34 publications
0
0
0
Order By: Relevance
“…Most of the literature reviewed is focused on degradation techniques, and inside them, in two main directions: the first one is the characterization of electronic attacks against WiFi networks; for example, in [222,562] the authors propose a classification of DoS attacks in wireless infrastructures, based on the network layer in which the attack is performed, from the physical layer to the application one. As stated before, this kind of techniques is outside of the scope of this paper because they are closer to EA than to CNA.…”
Section: Approaches and Limitationsmentioning
confidence: 99%
“…Most of the literature reviewed is focused on degradation techniques, and inside them, in two main directions: the first one is the characterization of electronic attacks against WiFi networks; for example, in [222,562] the authors propose a classification of DoS attacks in wireless infrastructures, based on the network layer in which the attack is performed, from the physical layer to the application one. As stated before, this kind of techniques is outside of the scope of this paper because they are closer to EA than to CNA.…”
Section: Approaches and Limitationsmentioning
confidence: 99%