Proceedings of the 1st ACM International Workshop on Quality of Service &Amp; Security in Wireless and Mobile Networks 2005
DOI: 10.1145/1089761.1089765
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized intrusion detection in wireless sensor networks

Abstract: Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of attacks since they are deployed in open and unprotected environments and are constituted of cheap small devices. Preventive mechanisms can be applied to protect WSNs against some types of attacks. However, there are some attacks for which there is no known prevention methods. For these cases, it is necessary to use some mechanism of in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
200
0
7

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 317 publications
(207 citation statements)
references
References 26 publications
0
200
0
7
Order By: Relevance
“…As illustrated in Figure 1, these topics include fault detection Luo et al, 2006), event detection (Krishnamachari and Iyengar, 2004;Martincic and Schwiebert, 2006;Ding et al, 2005) and intrusion detection (Silva et al, 2005;Bhuse and Gupta, 2006 …”
Section: Motivation Of Outlier Detection In Wsnsmentioning
confidence: 99%
“…As illustrated in Figure 1, these topics include fault detection Luo et al, 2006), event detection (Krishnamachari and Iyengar, 2004;Martincic and Schwiebert, 2006;Ding et al, 2005) and intrusion detection (Silva et al, 2005;Bhuse and Gupta, 2006 …”
Section: Motivation Of Outlier Detection In Wsnsmentioning
confidence: 99%
“…Intrusion Detection for Embedded Devices: IDS have been developed for a variety of embedded platforms and applications. da Silva et al [9] deploy an IDS on monitoring nodes in static wireless sensor networks, in order to detect both network-based attacks (packet replay, drop, etc.) as well as attacks on the routing structure and physical wireless channel.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Forwarding rules are then installed between the source and destination (lines [8][9][10][11]. If the destination's last position is known, a route is installed in the OpenFlow switches on the path between each device.…”
Section: A Mobility and Routingmentioning
confidence: 99%
“…Basically, Sensor nodes are application dependent. Examples of applications of wireless sensor networks that includes automation of a home, tracking of a vehicle [1,2], monitoring of an environment, and detection of a target [3,4].…”
Section: Introductionmentioning
confidence: 99%