2006
DOI: 10.1109/lcomm.2006.1576557
|View full text |Cite
|
Sign up to set email alerts
|

Wireless sensor networks for intrusion detection: packet traffic modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0
1

Year Published

2007
2007
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(24 citation statements)
references
References 3 publications
1
22
0
1
Order By: Relevance
“…In [13] it is suggested that WSN applications can be categorized as event-driven or periodic data generation. For periodic data generation scenarios, constant bit rate (CBR) can be used to model the data traffic arrival process when the bit rate is constant [14].…”
Section: Packet Traffic Arrival Processmentioning
confidence: 99%
“…In [13] it is suggested that WSN applications can be categorized as event-driven or periodic data generation. For periodic data generation scenarios, constant bit rate (CBR) can be used to model the data traffic arrival process when the bit rate is constant [14].…”
Section: Packet Traffic Arrival Processmentioning
confidence: 99%
“…In [30], I. Demirkol, et al devised a new packet traffic model for sensor networks whose task is intrusion detection. The model deal with the scene of single target detection and considered such system design parameters as the number of sensor nodes deployed, surveillance area, sensing range, target velocity and sampling interval.…”
Section: ) Special Applications In Wsnmentioning
confidence: 99%
“…Many of the traditional approaches to intrusion detection consist of a two-step approach: In the first step, a profile is created to characterize intruder behavior. In the second phase, while the network is operating, the observed behavior is compared with what has been catalogued and flagged if it matches catalogued abnormal behavior [2], [3], [4] or if it deviates from catalogued normal behavior [5], [6]. Overall, the literature in sensor network intrusion detection can be divided according to what they protect.…”
Section: B Related Workmentioning
confidence: 99%
“…The resources typically targeted and protected include: data packets that can be maliciously dropped or changed [4], communication paths that can be intercepted and broken [3], communication signals that can be interfered with [7], normal behavior that can be diverted by intrusion nodes [5], and data routing paths [8]. These approaches tend to be demanding in terms of storage and computation, the patterns that they catalog tend to be generic and not very effective in the very specialized, application specific context of sensor networks [2]. The issue of performance has been partially addressed by distributing the work among nodes and optimizing the code required to identify intruders [9], [10], [11], [12].…”
Section: B Related Workmentioning
confidence: 99%