2020
DOI: 10.3390/s20051375
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks

Abstract: Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which make them attractive to security attackers. The increasing risks and system vulnerabilities of WSNs have encouraged researchers and developers to propose many security solutions including software-based Intrusion Detection Systems (IDSs). The main drawbacks of curren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 52 publications
0
10
0
Order By: Relevance
“…As the field of IoT improves and spreads every day, the challenges related to its security and privacy have also evolved and increased [ 30 , 31 , 32 , 33 , 34 , 35 ]. Furthermore, the security threats exposing IoT devices have different impacts according to the domain that they operate in it, where each device may suffer from unique vulnerabilities accompanying the characteristics, procedures, and needs of that domain, including smart grids, industrial applications, smart homes, healthcare, and smart cities.…”
Section: Related Workmentioning
confidence: 99%
“…As the field of IoT improves and spreads every day, the challenges related to its security and privacy have also evolved and increased [ 30 , 31 , 32 , 33 , 34 , 35 ]. Furthermore, the security threats exposing IoT devices have different impacts according to the domain that they operate in it, where each device may suffer from unique vulnerabilities accompanying the characteristics, procedures, and needs of that domain, including smart grids, industrial applications, smart homes, healthcare, and smart cities.…”
Section: Related Workmentioning
confidence: 99%
“…At the other hand, software engineering methods have been combined with these approaches to increase the reliability of the generated security keys to resist the dominated attacks over numerous applications. One of these methods is the fault tolerance technique that is based on self-checking process to detect the happened faults [3][4][5][6][7][8]. The solution for the detected fault can be addressed throughout different ways depending on the utilized application.…”
Section: Introductionmentioning
confidence: 99%
“…The same approach was adopted by authors of the research work of [10][11][12][13][14][15][16][17] that were focused on the deep learning techniques. The authors of [18][19][20][21][22][23] tackled the problem of applying the software engineering technology in cooperation with the deep learning technology. Most of the previous work consider the Glopal Positioning System (GPS) and web applications to finalize the outcome productions, particularly in allocation terms [24][25][26].…”
Section: Introductionmentioning
confidence: 99%