2022
DOI: 10.1109/jiot.2021.3114270
|View full text |Cite
|
Sign up to set email alerts
|

Centralized and Distributed Intrusion Detection for Resource-Constrained Wireless SDN Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 31 publications
0
20
0
Order By: Relevance
“…Challenges also arise to securing the sensing layer itself and rendering it resilient to denial of service and man-in-the-middle attacks. Aspects related to distributed anomaly detection in software defined wireless sensor networks [20] have demonstrated that it is possible in large scale IoT networks to monitor hardware behaviour (memory usage, power consumption, Tx/Rx times, etc.) to identify compromised or faulty sensors.…”
Section: Trustworthy and Resilient 6g And The Role Of The Physical Layermentioning
confidence: 99%
“…Challenges also arise to securing the sensing layer itself and rendering it resilient to denial of service and man-in-the-middle attacks. Aspects related to distributed anomaly detection in software defined wireless sensor networks [20] have demonstrated that it is possible in large scale IoT networks to monitor hardware behaviour (memory usage, power consumption, Tx/Rx times, etc.) to identify compromised or faulty sensors.…”
Section: Trustworthy and Resilient 6g And The Role Of The Physical Layermentioning
confidence: 99%
“…Challenges also arise to securing the sensing layer itself and rendering it resilient to denial of service and man-in-the-middle attacks. Aspects related to distributed anomaly detection in software defined wireless sensor networks [11] have demonstrated that it is possible in large scale IoT networks to monitor hardware behaviour (memory usage, power consumption, Tx/Rx times, etc.) to identify compromised or faulty sensors.…”
Section: Trustworthy and Resilient 6g And The Role Of The Physical Layermentioning
confidence: 99%
“…The problem formulation exploits recent results [16], [17] on non-parametric real-time CP detection. We adapted the hybrid offline-online proposal to an entirely online detector [18].…”
Section: A Change Point Detectionmentioning
confidence: 99%