2014
DOI: 10.1155/2014/348606
|View full text |Cite
|
Sign up to set email alerts
|

Web Spider Defense Technique in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…The foremost proposal following IDS is that it can discover any imposters to avoid upcoming influences. However, it will be complicated to determine when a malicious assault is occurring and what the exact possessions of the imposter are [11]. The major disadvantage of a mobile mediator oriented method is that it uses additional energy and occupies an elevated computational expenditure.…”
Section: Problem Identificationmentioning
confidence: 99%
See 4 more Smart Citations
“…The foremost proposal following IDS is that it can discover any imposters to avoid upcoming influences. However, it will be complicated to determine when a malicious assault is occurring and what the exact possessions of the imposter are [11]. The major disadvantage of a mobile mediator oriented method is that it uses additional energy and occupies an elevated computational expenditure.…”
Section: Problem Identificationmentioning
confidence: 99%
“…In some other prediction-based approaches, prediction frameworks rely on the current behavior of the attacker to predict the future behavior (that is, the monitored data are not correlated). In a Web spider oriented protection method [11], the administrator employs an obtainable IDS procedure to classify the apprehensive nodes, which is not depicted in the work. Furthermore, if the position or discovery of a Web spider is exposed by imposters, the spider may evade them.…”
Section: Problem Identificationmentioning
confidence: 99%
See 3 more Smart Citations