2019
DOI: 10.14569/ijacsa.2019.0100578
|View full text |Cite
|
Sign up to set email alerts
|

Intruder Attacks on Wireless Sensor Networks: A Soft Decision and Prevention Mechanism

Abstract: Because of the wide-ranging of applications in a variety of fields, such as medicine, environmental studies, robotics, warfare and security, and so forth, the research on wireless sensor networks (WSNs) has attracted much attention recently. WSNs offer economical, flexible, scalable and pragmatic solutions in many situations. Sensor nodes are tiny and have a limited, non-rechargeable battery source, small memory/computational abilities and low transmitter power. Energy resources are vital as once the battery i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…In other words, resource exhaustion attacks require establishing routing loops and extending the route during packet transfers to deplete the energy of the nodes. 80 Hussain et al, 2019 81 developed an IDS to recognize many forms of intruder assaults on WSN MAC protocols. A soft decision method has been built to identify Exhaustion and intrusions assaults.…”
Section: Wsn Attack Typesmentioning
confidence: 99%
“…In other words, resource exhaustion attacks require establishing routing loops and extending the route during packet transfers to deplete the energy of the nodes. 80 Hussain et al, 2019 81 developed an IDS to recognize many forms of intruder assaults on WSN MAC protocols. A soft decision method has been built to identify Exhaustion and intrusions assaults.…”
Section: Wsn Attack Typesmentioning
confidence: 99%
“…Methodology to ensure information security in a distributed architecture for a public organization of Ecuador [2], Hyperledger technology in public organizations in Ecuador [3], Study of the evolution of information security in Colombia: 2000-2018 [4], Information security methods to protect rest web services communication and data in http requests using json web token and keycloak red hat single sign on [5], El rol de la seguridad informática en el ámbito académico y los sistemas de información asociados [6], Security of networks and information systems in the European Union: A comprehensive approach? [7], WSN security applied to smart metering systems based on cryptography techniques [8], The reduction of number of parliamentary members and the modification of remuneration schemes for deputies in autonomous community [9], A new data protection law [10], From «computing freedom» towards the constitutionalization of new digital rights [11], Securing the human: Broadening diversity in cybersecurity [12], Intruder attacks on wireless sensor networks: A soft decision and prevention mechanism [13], Transposition of EU network and information security directive into national law [14] and An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador [15].…”
Section: Introductionmentioning
confidence: 99%