An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Hi-index | 0.00 |
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing two algorithms to optimal select and activate the intrusion detection agents for sensor networks.