State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Impossibility of distributed consensus with one faulty process
Journal of the ACM (JACM)
Unreliable failure detectors for reliable distributed systems
Journal of the ACM (JACM)
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
System architecture directions for networked sensors
ACM SIGPLAN Notices
Password authentication with insecure communication
Communications of the ACM
SPINS: security protocols for sensor networks
Wireless Networks
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
SRDS '05 Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks
IEEE Transactions on Computers
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Integrated Computer-Aided Engineering
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Detecting unknown attacks in wireless sensor networks using clustering techniques
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
Exploiting routing tree construction in CTP
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Self-Organizing maps versus growing neural gas in detecting data outliers for security applications
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
People-centric sensing in assistive healthcare: Privacy challenges and directions
Security and Communication Networks
A hidden Markov model based intrusion detection system for wireless sensor networks
International Journal of Critical Computer-Based Systems
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
A novel intrusion detection framework for wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed to achieve a more autonomic and complete defense mechanism, even against attacks that have not been anticipated in advance. In this paper, we present a lightweight intrusion detection system, called LIDeA, designed for wireless sensor networks. LIDeA is based on a distributed architecture, in which nodes overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We show how such a system can be implemented in TinyOS, which components and interfaces are needed, and what is the resulting overhead imposed.