2015
DOI: 10.1016/j.procs.2015.08.331
|View full text |Cite
|
Sign up to set email alerts
|

Neighbor Node Trust based Intrusion Detection System for WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(18 citation statements)
references
References 24 publications
0
18
0
Order By: Relevance
“…A number of prior works [28] have studied different intrusion detection systems with quite some advances. For example, [29] proposed a behavior-rule specification-based technique for intrusion detection.…”
Section: Collaborative Ids Based On Cloudlet Meshmentioning
confidence: 99%
“…A number of prior works [28] have studied different intrusion detection systems with quite some advances. For example, [29] proposed a behavior-rule specification-based technique for intrusion detection.…”
Section: Collaborative Ids Based On Cloudlet Meshmentioning
confidence: 99%
“…In this way, even larger damage can be done to the network and its nodes. (iii) Jamming (see Bao et al [30]; Sajjad et al [31] [36]; Da Silva et al [35]): the attacker uses two or more malicious nodes which are linked by a nonlegitimate connection, a so-called tunnel, faking a route that is shorter than the original one within the network. Packets passing the tunnel can then be used for other kinds of attack.…”
Section: Responses On Attacksmentioning
confidence: 99%
“…Sajjad et al developed an IDS for WSNs based on the trust level of the neighboring nodes. They investigated the network statistics and malicious node behaviors and reported the successful detection of selective forwarding, Hello flooding, and jamming attacks by their IDS.…”
Section: Literature Reviewmentioning
confidence: 99%