2013
DOI: 10.1007/978-3-642-36169-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 53 publications
0
8
0
Order By: Relevance
“…If the node found to be malicious, then it is simply removed from network. Based on this methodology, so many authors tried to develop an efficient intrusion detection mechanism to prevent the network from several attacks [12].…”
Section: Literature Surveymentioning
confidence: 99%
“…If the node found to be malicious, then it is simply removed from network. Based on this methodology, so many authors tried to develop an efficient intrusion detection mechanism to prevent the network from several attacks [12].…”
Section: Literature Surveymentioning
confidence: 99%
“…4) A console is used for many following functions where it provides connection between users and administrators to check the updated data of the system monitored, collect alert messages, inspect events and constitute the system. Figure .1 Basic IDS block diagram [1] Intrusion Detection Systems Ashwini V. Jatti, V. J. K. Kishor Sonti Based on six criteria IDS techniques are classified as follows:…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…Nowadays wireless sensors network (WSN) [1] is a standout amongst the most rising and quickly developing fields in the world [2][3]. At first, it was designed to accelerate and facilitate military operations but later its application has been extended to health, traffic, industrial areas and threat detection [4].…”
Section: Introductionmentioning
confidence: 99%