2019 Second International Conference on Latest Trends in Electrical Engineering and Computing Technologies (INTELLECT) 2019
DOI: 10.1109/intellect47034.2019.8954984
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System in Wireless Sensor Networks - A Comprehensive Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Moreover, some of the most popular attacks that may degrade the performance of WSNs are also discussed in this work, which includes eavesdropping, packet analysis, replay, impersonation, and DoS. Farooq, et al [26] presented a comprehensive survey to investigate the different types of security breaches in WSNs. Here, some of the recent data mining techniques such as NB, LR, DT, SVM, RF and etc have been discussed for developing an IDS.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, some of the most popular attacks that may degrade the performance of WSNs are also discussed in this work, which includes eavesdropping, packet analysis, replay, impersonation, and DoS. Farooq, et al [26] presented a comprehensive survey to investigate the different types of security breaches in WSNs. Here, some of the recent data mining techniques such as NB, LR, DT, SVM, RF and etc have been discussed for developing an IDS.…”
Section: Related Workmentioning
confidence: 99%
“…The wired IDS is not suitable for analyzing WN because most of the ad hoc network device is using a wireless connection point and connected with a WN. To further argue on that some of the problems of detecting intrusions in wireless network are Inconsistency of the strength of signal, difficulty in detecting unofficial user, interference of Radio Frequency, numerous channels, various type of protocols and location of sensors [52].…”
Section: Mobile Agents For Idsmentioning
confidence: 99%
“…So, security is a primary issue in WSN for keeping the network safe from breaches. 20 Sensor nodes are prone to malware injection by attackers, and nodes never prevent such fake data due to energy and memory constraints. Detection of fake data in WSN needs efficient methods and algorithms to block the injection of data in nodes.…”
Section: Related Workmentioning
confidence: 99%