2008 4th IEEE/IFIP International Conference on Central Asia on Internet 2008
DOI: 10.1109/canet.2008.4655308
|View full text |Cite
|
Sign up to set email alerts
|

A base-station oriented anomaly detection for wireless sensor networks

Abstract: In this paper, an anomalous intrusion detection system is developed to detect malicious nodes in sensor networks.The proposed system has more reliability in comparison of its analogues and consumes the resources more efficiently. Here the base-station was known to be a trusted source and this helps the system can moderate the network more efficiently. In addition a node doesn't block a compromised node when detects it and only send an alert to the base-station. Then the base-station will check transmission buf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…With the rapid development of Internet and communication technology in public mobile communications network, GSM system becomes one of the most popular digital cellular telecommunications systems in the whole world. When intelligent terminal selects a new Public Land Mobile Network (PLMN) in the cellular mobile communication system, it tries to reside in a cell which decoding downlink reliably and communicating uplink effectively [1]. According to it, the intelligent terminal receives the paging information from PLMN and establishes a call.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of Internet and communication technology in public mobile communications network, GSM system becomes one of the most popular digital cellular telecommunications systems in the whole world. When intelligent terminal selects a new Public Land Mobile Network (PLMN) in the cellular mobile communication system, it tries to reside in a cell which decoding downlink reliably and communicating uplink effectively [1]. According to it, the intelligent terminal receives the paging information from PLMN and establishes a call.…”
Section: Introductionmentioning
confidence: 99%
“…In the existing intrusion detection schemes of WSNs [5][6][7][8][9][10][11][12][13][14][15], two approaches have been used: signature-based detection and anomaly detection. Signature-based detection [7][8][9][10][11][12] lies in the monitoring of system activity and the identification of behaviors which are similar to pattern signatures of known attacks or intrusions stored in a signature database.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, anomaly detection systems [6,[13][14][15]] detect attacks by observing deviations from a preestablished normal system or user behavior. This approach makes detecting new or unknown attacks, if these attacks imply an abnormal use of the system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation