2016
DOI: 10.4218/etrij.16.0115.0795
|View full text |Cite
|
Sign up to set email alerts
|

Rule-Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

Abstract: Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…In more detail, the main goal of WHs is to gather information about the attacks performed on wireless networks and the associated technologies, focusing on the attacks that exploit the wireless technologies' weaknesses, which are mainly due to the use of unguided transmission medium [17]. The main principles of the WHs can be used in several types of networks, including cellular, Local Area Networks (LANs), sensor networks and Unmanned Aerial Vehicles (UAVs)-based networks [18].…”
Section: A Honeypot: a Security Trapmentioning
confidence: 99%
“…In more detail, the main goal of WHs is to gather information about the attacks performed on wireless networks and the associated technologies, focusing on the attacks that exploit the wireless technologies' weaknesses, which are mainly due to the use of unguided transmission medium [17]. The main principles of the WHs can be used in several types of networks, including cellular, Local Area Networks (LANs), sensor networks and Unmanned Aerial Vehicles (UAVs)-based networks [18].…”
Section: A Honeypot: a Security Trapmentioning
confidence: 99%