2017 24th International Conference on Telecommunications (ICT) 2017
DOI: 10.1109/ict.2017.7998271
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(28 citation statements)
references
References 12 publications
0
28
0
Order By: Relevance
“…For the current work we aim to evaluate BLR as a detection technique for Selective Forward and Blackhole routing layer attacks as these are described in previous works [3]- [5]. Selective Forward and Blackhole attacks aim in exploiting routing vulnerabilities and reroute traffic to the compromised node.…”
Section: A Network Routing Layer Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…For the current work we aim to evaluate BLR as a detection technique for Selective Forward and Blackhole routing layer attacks as these are described in previous works [3]- [5]. Selective Forward and Blackhole attacks aim in exploiting routing vulnerabilities and reroute traffic to the compromised node.…”
Section: A Network Routing Layer Attacksmentioning
confidence: 99%
“…The training phase determines whether the method can be used to identify malicious activity and which independent variables are the most significant. The end result of the training phase is a regression model to be used in the evaluation phase [5]. The evaluation phase tests the model at real-time.…”
Section: Mids Detection Modulesmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, customization of the hardware, software, and firmware to suit the targeted application of this domain were the prime focus of this research. With the evolving advancement and cost reduction in the constituent of the WSN including 1) cost of sensors 2) sensor nodes 3) bandwidth as well as 4) communication protocols, the application of WSN has moved to various fields such as 1) structural health monitoring (SHM), 2) intrusion detection system (IDS), 3) critical climate change monitoring system (CCCM), 4) environmental monitoring, 5) habitat monitoring and many more pervasive and ubiquitous based applications in the field of healthcare, industry, monitoring of micro-grid station and today smart applications using WSN as sub-system of IoT [2][3][4][5][6][7][8][9]. These applications are quite useful for the population exploring the world to meet the vision of industry 4.0 [10], but at the same time, the scalability and the popularity of WSN make it vulnerable, poses its kind of security threats, risk, and challenges.…”
Section: Introductionmentioning
confidence: 99%