2011
DOI: 10.4236/ijcns.2011.48064
|View full text |Cite
|
Sign up to set email alerts
|

Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable

Abstract: Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose; but, the proposed design in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…• A hardware or software or combinational system, with defensive-aggressive approach to protect information, systems and networks [3,8,17]; • Usable on host, network [2,11] and application levels;…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
See 3 more Smart Citations
“…• A hardware or software or combinational system, with defensive-aggressive approach to protect information, systems and networks [3,8,17]; • Usable on host, network [2,11] and application levels;…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…• It analyzes the system or network traffic or controls the incoming connections to different ports, and then it detects the occurring sabotage/vandalism; • It can detects known attacks, unusual traffic, harmful data, misuse and unauthorized access to the systems and networks by internal users or external intruders [2,7]; • It inferences by using deterministic methods (based on patterns of known attacks) or nondeterministic methods (to detecting new attacks and anomalies); • It can determine the intruder's identity and tracking him/her/it; • It informs and notifies to the security manager by different types of warnings or notifications; sometimes, it disconnects the suspicious connections or blocks malicious traffic [2,3]; In general, three main functionalities of IDSs are including monitoring (evaluation), analyzing (detection) and responding (reporting) to the occurring attacks on computer systems and networks [3,8]. There are two stages to configure IDS, consisting of attack's signs and management arbitrary events [8].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
See 2 more Smart Citations
“…the Sink deployment location), which have more powerful resources and capabilities than usual sensor nodes. As shown in Figure1, cluster-heads (CHs) collect information from their nearby sensor nodes, aggregate and forward them to the base station (Sink) to process gathered data [1,3,4]. Factors such as wireless, unsafe, unprotected and shared nature of communication channel, untrusted and broadcast transmission media, deployment in hostile and open environments, automated and unattended nature and limited resources, make WSNs vulnerable and susceptible to many types of criteria; therefore, in attending to the WSNs' constraints in energy resources and radio transceiver power, clustering is a vital and complex requirement for these networks.…”
Section: Introductionmentioning
confidence: 99%