Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bh 2021
DOI: 10.4108/eai.7-6-2021.2308629
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection In Wsn Using Modified AODV Algorithm

Abstract: Wireless sensor network plays a major role in recent scientific developments for transmission of information. It comprises of many sensor nodes which are connected virtually to transmit and receive data. But security is the main challenge experienced in the WSN to have a proper data transmission. Hence detection and separation of the attacks created in the sensor network is necessary. In this paper, a scheme for intrusion detection in wireless sensor network is introduced. It is done by using a modified AdhocO… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The use of machine learning to improve these identifications has been extensively discussed in the literature, thus making it a subject of great relevance and scope in science [ 17 ]. Authors have already proposed solutions to the problem using Gaussian processes [ 18 ], coverage probability in a mobile sensor network [ 19 ], low-power sensors inside the region of interest [ 20 ] and on-demand distance vector routing [ 21 ]. However, until the present moment, the interpretability of these sensors during identification has not been specified.…”
Section: K Barriers For Intrusion Detection In Wireless Sensor Networ...mentioning
confidence: 99%
“…The use of machine learning to improve these identifications has been extensively discussed in the literature, thus making it a subject of great relevance and scope in science [ 17 ]. Authors have already proposed solutions to the problem using Gaussian processes [ 18 ], coverage probability in a mobile sensor network [ 19 ], low-power sensors inside the region of interest [ 20 ] and on-demand distance vector routing [ 21 ]. However, until the present moment, the interpretability of these sensors during identification has not been specified.…”
Section: K Barriers For Intrusion Detection In Wireless Sensor Networ...mentioning
confidence: 99%