Denial of service defence for resource availability in wireless sensor networks
OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …
networking solutions with exciting new applications for the near future. Its deployment has …
Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol
R Fotohi, S Firoozi Bari, M Yusefi - International Journal of …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) have been vastly employed in the collection and
transmission of data via wireless networks. This type of network is nowadays used in many …
transmission of data via wireless networks. This type of network is nowadays used in many …
[图书][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
A multi-level intrusion detection system for wireless sensor networks based on immune theory
VT Alaparthy, SD Morgera - IEEE Access, 2018 - ieeexplore.ieee.org
The human body has been, and will continue to be, a source of inspiration for researchers
across various disciplines owing to its robustness and myriad of functions. While some of …
across various disciplines owing to its robustness and myriad of functions. While some of …
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to
identify such malicious behavior using traditional intrusion detection systems in Wireless …
identify such malicious behavior using traditional intrusion detection systems in Wireless …
Intrusion detection in wireless sensor networks with an improved NSA based on space division
R Zhang, X Xiao - Journal of Sensors, 2019 - Wiley Online Library
Inspired by the biological immune system, many researchers apply artificial immune
principles to intrusion detection in wireless sensor networks, such as negative selection …
principles to intrusion detection in wireless sensor networks, such as negative selection …
A quasi-newton neural network based efficient intrusion detection system for wireless sensor network
G Alagarsamy, J Shanthini… - … Systems Science and …, 2023 - researchportal.hw.ac.uk
Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the
capability of the network to do its normal function. Detecting this misbehaviour is a …
capability of the network to do its normal function. Detecting this misbehaviour is a …
A game theory based multi layered intrusion detection framework for wireless sensor networks
Most of the existing intrusion detection frameworks proposed for wireless sensor networks
(WSNs) are computation and energy intensive, which adversely affect the overall lifetime of …
(WSNs) are computation and energy intensive, which adversely affect the overall lifetime of …
An online ensemble learning model for detecting attacks in wireless sensor networks
In today's modern world, the usage of technology is unavoidable and the rapid advances in
the Internet and communication fields have resulted to expand the Wireless Sensor Network …
the Internet and communication fields have resulted to expand the Wireless Sensor Network …
A new approach of anomaly detection in wireless sensor networks using support vector data description
Z Feng, J Fu, D Du, F Li, S Sun - International Journal of …, 2017 - journals.sagepub.com
Anomaly detection is an important challenge in wireless sensor networks for some
applications, which require efficient, accurate, and timely data analysis to facilitate critical …
applications, which require efficient, accurate, and timely data analysis to facilitate critical …