2012
DOI: 10.1007/s10776-012-0179-z
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0
2

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 58 publications
(48 citation statements)
references
References 14 publications
0
46
0
2
Order By: Relevance
“…The possibility to apply Dendritic Cell Algorithm (DCA) in the attack detection in sensor network is investigated in [12]. An Intrusion Detection System (IDS) framework to be applied in the wireless sensor network context is proposed in [13]. However, regardless of model differences, in the case of large scale networks, sufficient sensors are required, which has a negative impact on system scalability.…”
Section: B Sensor Network Based Aismentioning
confidence: 99%
See 1 more Smart Citation
“…The possibility to apply Dendritic Cell Algorithm (DCA) in the attack detection in sensor network is investigated in [12]. An Intrusion Detection System (IDS) framework to be applied in the wireless sensor network context is proposed in [13]. However, regardless of model differences, in the case of large scale networks, sufficient sensors are required, which has a negative impact on system scalability.…”
Section: B Sensor Network Based Aismentioning
confidence: 99%
“…The attempts mainly focus on two parts: the algorithm itself and alternative hardware implementations [1]. In the aspect of hardware implementation, due to the mixed nature of AIS-based computing, traditional and unconventional computing paradigms have been put forward as AIS-based computing substrates [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. Although increasing research has been conducted to investigate better versions of AIS and more suitable computing architectures to accommodate them [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20], few have compared the suitability of different computing approaches for the unique features of AIS when trying to introduce novel computing architectures, and few consider the practicality of their solutions for solving real-world machine learning problems.…”
Section: Introductionmentioning
confidence: 99%
“…Sinkhole attacks (black hole and selective forwarding) can be characterized by degrading the RSSI and increasing packets loss according to [11].…”
Section: Case Studymentioning
confidence: 99%
“…As an effective danger theory algorithm, dendritic cell algorithm [9] that based on the features of dendritic cell has already been used in the intrusion detection in WSN and achieved a higher detection rate [4][5]10]. As stated by Kim et al [4], the properties of danger theory based AIS intrusion detection algorithms, especially DCA can meet the security requirements of sensor networks environment as a distributed, limited power and limited capacity wireless sensor networks.…”
Section: Introductionmentioning
confidence: 99%