2015
DOI: 10.1007/978-3-319-12012-6_78
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Intrusion Detection System in Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The mobility of sensors brings many advantages to various applications, especially, real time applications such as traffic monitoring, healthcare monitoring, and social interaction . Furthermore, mobile sensors can be used to trace moving phenomenon like packages, vehicles, and chemical clouds . The mobility in MWSNs has 4 possible categories, which are mobile sensor nodes, mobile relay nodes, mobile base stations, and mobile cluster heads .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The mobility of sensors brings many advantages to various applications, especially, real time applications such as traffic monitoring, healthcare monitoring, and social interaction . Furthermore, mobile sensors can be used to trace moving phenomenon like packages, vehicles, and chemical clouds . The mobility in MWSNs has 4 possible categories, which are mobile sensor nodes, mobile relay nodes, mobile base stations, and mobile cluster heads .…”
Section: Introductionmentioning
confidence: 99%
“…2 Furthermore, mobile sensors can be used to trace moving phenomenon like packages, vehicles, and chemical clouds. 3 The mobility in MWSNs has 4 possible categories, which are mobile sensor nodes, mobile relay nodes, mobile base stations, and mobile cluster heads. 2,4 In addition, the mobility has 3 paradigms, which are controllable movement, predictable movement, and unpredictable movement.…”
Section: Introductionmentioning
confidence: 99%
“…The Authors [21] have proposed an intelligent intrusion detection system in WSNs. In their work, the network is totality closer-based and there is no retransmission mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…To detect intrusion, IDS dynamically monitor the system and the user actions in the system. detect an attack by using deviation from a normal profile [5,14].…”
Section: A Idsmentioning
confidence: 99%