2013
DOI: 10.1049/iet-ifs.2012.0052
|View full text |Cite
|
Sign up to set email alerts
|

IDSEP: a novel intrusion detection scheme based on energy prediction in cluster‐based wireless sensor networks

Abstract: Owing to wireless communication's broadcast nature, wireless sensor networks (WSNs) are vulnerable to denial-ofservice (DoS) attacks. It is of great importance to design an efficient intrusion detection scheme (IDS) for WSNs. In this study, the authors propose a novel IDS based on energy prediction (IDSEP) in cluster-based WSNs. The main idea of IDSEP is to detect malicious nodes based on energy consumption of sensor nodes. Sensor nodes with abnormal energy consumption are identified as malicious ones. Further… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(24 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…In WRSN, most of the energy is consumed during the sending and receiving process. In this work, we adopt a simple energy model to obtain the energy consumption of a normal node . When sending or receiving a message with l bits, the energy consumption is shown in (1).E=Enormaltxfalse(l,dfalse)+Enormalrxfalse(lfalse)=2×Enormalelec×l+εnormalamp×dij2where E elec indicates the energy consumption for sending or receiving each bit; d ij denotes the distance between the sender; and receiver; ɛ amp is the energy consumption for transmitting amplifier.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In WRSN, most of the energy is consumed during the sending and receiving process. In this work, we adopt a simple energy model to obtain the energy consumption of a normal node . When sending or receiving a message with l bits, the energy consumption is shown in (1).E=Enormaltxfalse(l,dfalse)+Enormalrxfalse(lfalse)=2×Enormalelec×l+εnormalamp×dij2where E elec indicates the energy consumption for sending or receiving each bit; d ij denotes the distance between the sender; and receiver; ɛ amp is the energy consumption for transmitting amplifier.…”
Section: System Modelmentioning
confidence: 99%
“…In WRSN, most of the energy is consumed during the sending and receiving process. In this work, we adopt a simple energy model to obtain the energy consumption of a normal node [29]. When sending or receiving a message with l bits, the energy consumption is shown in (1).…”
Section: Energy Consumption Modelmentioning
confidence: 99%
“…Han et al propose IDSEP [11], which is an intrusion detection scheme based on energy prediction. Their energy consumption prediction model is based on Markov chains, similar to the Markov chain model in [18], but using five states instead of four.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Zhou et al [9] designed a new multimedia traffic classification and analysis method for handling the heterogeneity of diverse applications. Li et al [10] proposed an efficient intrusion detection protocol based on energy prediction in cluster-based WSNs. The aim of this protocol is to resist denial-of-service attacks due to the broadcast nature of wireless communication.…”
Section: Related Workmentioning
confidence: 99%