2012
DOI: 10.1049/iet-ifs.2010.0245
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of an embedded intrusion detection system for wireless applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Although the majority of the mentioned references give various IDS solutions for the ad hoc networking environment, they do not take into consideration the realisation issues of their thoughts on real platforms, especially embedded systems. Even though, our previous works in [29, 30] study the implementation challenges of inserting an IDS functionality into an embedded platform, the contribution was limited to a cooperative IDS energised by the traditional wire power resources. Our efforts in this paper focus on answering some questions regarding the implementation of a cooperative HIDS into a renewable energy‐dependent embedded system, questions such as: Is it possible to implement such a sophisticated system into a resources limited platform? What do we need to ensure the successful combination of the different security methods, algorithms and techniques with solar energy powered system? What are the assessment of the whole system in terms of its network performance, practicability, power consumption and immunity against the different threats? …”
Section: Literature Reviewmentioning
confidence: 99%
“…Although the majority of the mentioned references give various IDS solutions for the ad hoc networking environment, they do not take into consideration the realisation issues of their thoughts on real platforms, especially embedded systems. Even though, our previous works in [29, 30] study the implementation challenges of inserting an IDS functionality into an embedded platform, the contribution was limited to a cooperative IDS energised by the traditional wire power resources. Our efforts in this paper focus on answering some questions regarding the implementation of a cooperative HIDS into a renewable energy‐dependent embedded system, questions such as: Is it possible to implement such a sophisticated system into a resources limited platform? What do we need to ensure the successful combination of the different security methods, algorithms and techniques with solar energy powered system? What are the assessment of the whole system in terms of its network performance, practicability, power consumption and immunity against the different threats? …”
Section: Literature Reviewmentioning
confidence: 99%
“…These works studies the various methods to achieve secure message and entity authentication and the required methods to obtain flexible, extensible, and efficient VANET verification process. There have been many papers deals with the different issues related to the VANET Intrusion Detection System (IDS) [13]. Some researches studies the possible attacks that may occur in VANET, their origins, the possible victims.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Then, the signature based detection system tries to recognize any suspicious behavior according to these patterns. It is already concluded from research in ad hoc networks that severe memory constraints make intrusion detection systems that need to store attack signatures relatively difficult to build and less likely to be effective [13]. To solve this problem, a signature based IDS was achieved by building a light weight, signature based IDS, based on the famous open source SNORT IDS.…”
Section: ) Signature Based Idsmentioning
confidence: 99%
See 2 more Smart Citations