DOI: 10.31274/etd-180810-4096
|View full text |Cite
|
Sign up to set email alerts
|

Synoptic analysis techniques for intrusion detection in wireless networks

Abstract: I would like to dedicate this dissertation to my husband Kenneth. Without his love, sacrice, and support this accomplishment would not have been possible. I also dedicate this dissertation to my children Melanie, Douglas, Thomas, Amanda, and daughter-in-law Samantha for their unwavering emotional support-they are my biggest fans. I must include my granddaughter, Jadyn, for providing fun and recreation during my rst year at Iowa State University by taking me to all of the playgrounds in Ames, Iowa and schooling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 120 publications
(140 reference statements)
0
2
0
Order By: Relevance
“…UWSNs are vulnerable to various security attacks, such as node capture, sinkhole, and wormhole attacks, which can compromise the network's security. For instance, node capture attacks can lead to the theft of cryptographic keys, while sinkhole attacks can redirect the communication flow to an attacker's node, making it difficult to establish a secure communication channel [21]. Mezrag et al [22] proposed an identity-based cryptographic scheme for secure communication with ECC based key distribution model to resist all known common attacks.…”
Section: Challenges In Uwsn Key Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…UWSNs are vulnerable to various security attacks, such as node capture, sinkhole, and wormhole attacks, which can compromise the network's security. For instance, node capture attacks can lead to the theft of cryptographic keys, while sinkhole attacks can redirect the communication flow to an attacker's node, making it difficult to establish a secure communication channel [21]. Mezrag et al [22] proposed an identity-based cryptographic scheme for secure communication with ECC based key distribution model to resist all known common attacks.…”
Section: Challenges In Uwsn Key Managementmentioning
confidence: 99%
“…Symmetry 2023, 15, x FOR PEER REVIEW 5 of 16 can lead to the theft of cryptographic keys, while sinkhole attacks can redirect the communication flow to an attacker's node, making it difficult to establish a secure communication channel [21]. Mezrag et al [22] proposed an identity-based cryptographic scheme for secure communication with ECC based key distribution model to resist all known common attacks.…”
Section: Challenges In Uwsn Key Managementmentioning
confidence: 99%