2010 6th International Conference on Wireless and Mobile Communications 2010
DOI: 10.1109/icwmc.2010.61
|View full text |Cite
|
Sign up to set email alerts
|

Neighbor-Based Intrusion Detection for Wireless Sensor Networks

Abstract: The neighbor-based detection technique explores the principle that sensor nodes situated spatially close to each other tend to have a similar behavior. A node is considered malicious if its behavior significantly differs from its neighbors. This detection technique is localized, unsupervised and adapts to changing network dynamics. Although the technique is promising, it has not been deeply researched in the context of wireless sensor networks yet. In this paper, we present symptoms which can be used in the ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
18
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(20 citation statements)
references
References 10 publications
1
18
0
1
Order By: Relevance
“…Neighbour-based IDS [24] the false positive is low but the false negative is high with signal strength increased as shown in Table 1 compares our results with other produced results in other solution. …”
Section: // Location Verification To Filter Nodes That Are Malicioussupporting
confidence: 78%
See 1 more Smart Citation
“…Neighbour-based IDS [24] the false positive is low but the false negative is high with signal strength increased as shown in Table 1 compares our results with other produced results in other solution. …”
Section: // Location Verification To Filter Nodes That Are Malicioussupporting
confidence: 78%
“…Another Neighbour-based IDS for WSN is implemented in [24]. This algorithm is based on signals that are sent between nodes to detect hello flood attacks.…”
Section: International Journal Of Computer and Communication Engineeringmentioning
confidence: 99%
“…In [9], the attacks are detected by monitoring packet sending rate, packet dropping rate, packet mismatch rate, packet receiving rate, and received signal strength. As stated in [13], the works of [9,12] suffer from two major criticisms: (1) the circumstances, under which the assumption of multivariate normal distribution holds, are not explained, and (2) the network features such as packet sending, packet dropping, and packet receiving rates do not follow the normal distribution for tree-based routing protocol.…”
Section: Multifeature Profilementioning
confidence: 99%
“…In [8], a collaborative intrusion detection architecture based on neighbors monitoring was proposed. The neighbor nodes communicate with each other in order to detect Selective Forwarding, Hello Flood and Jamming attacks.…”
Section: Related Workmentioning
confidence: 99%