2008
DOI: 10.1016/j.comcom.2008.06.020
|View full text |Cite
|
Sign up to set email alerts
|

Group-based intrusion detection system in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 74 publications
(36 citation statements)
references
References 20 publications
0
36
0
Order By: Relevance
“…The base station is secure and able to detect all compromised nodes. Detection of compromised nodes can be actually achieved by means of an Intrusion Detection System (IDS) such as [27][28][29][30]. The BS maintains a blacklist containing the identity of compromised nodes.…”
Section: Network Modelmentioning
confidence: 99%
“…The base station is secure and able to detect all compromised nodes. Detection of compromised nodes can be actually achieved by means of an Intrusion Detection System (IDS) such as [27][28][29][30]. The BS maintains a blacklist containing the identity of compromised nodes.…”
Section: Network Modelmentioning
confidence: 99%
“…In [12], nodes are evaluated in terms of packet dropping rate, packet sending rate, forwarding delay time, and node readings. In [9], the attacks are detected by monitoring packet sending rate, packet dropping rate, packet mismatch rate, packet receiving rate, and received signal strength. As stated in [13], the works of [9,12] suffer from two major criticisms: (1) the circumstances, under which the assumption of multivariate normal distribution holds, are not explained, and (2) the network features such as packet sending, packet dropping, and packet receiving rates do not follow the normal distribution for tree-based routing protocol.…”
Section: Multifeature Profilementioning
confidence: 99%
“…In the one-feature profile, we use a single feature to describe and detect anomalous behavior. To detect the network malicious behavior, a node can measure the following features, as shown in Table 1 [9]. The disadvantage of this profile structure is that there is a need to assign one feature for each known attack.…”
Section: Introductionmentioning
confidence: 99%
“…The nodes in each cluster elect a leader node (cluster head) to serve as the IDS for the entire cluster. This approach aims to reduce the overall resource consumption of IDSs in the network (Li et al, 2008). The rest of this study is organized as follows: Section 2 presents the detailed leader based intrusion detection mechanism, sinkhole attack and its remedies, its routing algorithm.…”
Section: Introductionmentioning
confidence: 99%