2014
DOI: 10.1007/s11276-014-0858-z
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection and foresight response strategy for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…In this section, the performance of our proposed method is evaluated by applying it to synthetic and real data sets, and compared with the method of FCSVDD and LP-FCSVDD in the literature [26]. All experimental evaluations are performed on MATLAB with the data sets and are run on Intel Core i5 CPU, 3.30 GHZ, and the OS is windows 7.…”
Section: Simulation Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the performance of our proposed method is evaluated by applying it to synthetic and real data sets, and compared with the method of FCSVDD and LP-FCSVDD in the literature [26]. All experimental evaluations are performed on MATLAB with the data sets and are run on Intel Core i5 CPU, 3.30 GHZ, and the OS is windows 7.…”
Section: Simulation Scenariomentioning
confidence: 99%
“…Rajasegarar et al [24,25] proposed a distributed approach of one-class quarter-sphere support vector machine (QSSVM) and a centered approach of hyper-ellipsoidal support vector machine (CESVM) for anomaly detection in WSNs; they compared and analyzed the detection accuracy and sensitivity to parameter settings of CESVM and QSSVM. Gol et al [26] proposed a linearprogramming-based fuzzy-constraint SVDD method for anomaly detection in WSNs. In general, data mining and machine learning methods can achieve the desired effect of anomaly detection in WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…The flow of data is disrupted by modifying data packets, creating unwanted routing activities, selectively dropping and turning off the wormhole link periodically, when the attackers utilize a high volume of network traffic during the wormhole. [14,17,20]. In this paper an attempt has been made to propose a fully distributed approach for early warning, when pre-attack activities are detected, using trust mechanisms.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
“…Comprehensive analysis shows that the main hidden dangers of current network security include the design defects of the physical level of network structure, the contradictions existing in the openness characteristics of the network, and the decreasing difficulty of traditional network password decoding. At present, the main intrusion methods of network wireless sensor networks mainly include distributed network intrusion means, target machine attack means, denial of service attack means, and corresponding system attack means [ 6 , 7 ]. In addition to the problems of intrusion detection technology, the current privacy protection technology of wireless sensor networks is also threatened by the energy, calculation, and storage of wireless sensor network nodes.…”
Section: Introductionmentioning
confidence: 99%