2007 IEEE International Conference on Electro/Information Technology 2007
DOI: 10.1109/eit.2007.4374444
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of an intrusion detection system for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Anomaly-based detection is used, for example, in [13; 14]. The IDS presented in [13] aims to detect Denial-of-Service (DoS) attacks. A baseline level of network traffic is established to which all future network traffic is compared.…”
Section: Misbehavior-based Detectionmentioning
confidence: 99%
“…Anomaly-based detection is used, for example, in [13; 14]. The IDS presented in [13] aims to detect Denial-of-Service (DoS) attacks. A baseline level of network traffic is established to which all future network traffic is compared.…”
Section: Misbehavior-based Detectionmentioning
confidence: 99%
“…A centralized IDS is purposed by [2] to detect the DoS, which use the anomaly detection pattern for detecting potential DoS attacks. It has designed and implemented an agent-based ID on a limited set of wireless sensor nodes as a preliminary implementation.…”
Section: Centralized Approachmentioning
confidence: 99%
“…Some of these mechanisms are also used in WSNs, especially Watchdog has been often proposed to use in WSNs. IDS in WSNs have been investigated in [57,199,165,175,2,85,11,171]. Lee et al propose an alternate path routing scheme that is also able to detect and exclude sensor nodes performing a selective forwarding attack [145].…”
Section: Related Workmentioning
confidence: 99%