Neural recognition of human pointing gestures in real images
Neural Processing Letters
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Hybrid intelligent systems for network security
Proceedings of the 44th annual Southeast regional conference
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Improved spiking neural networks for EEG classification and epilepsy and seizure detection
Integrated Computer-Aided Engineering
Morphological neural networks and vision based simultaneous localization and mapping
Integrated Computer-Aided Engineering - Artificial Neural Networks
A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
Linear-Time Computation of Similarity Measures for Sequential Data
The Journal of Machine Learning Research
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Secure routing in sensor networks: security problem analysis and countermeasures
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Detecting unknown attacks in wireless sensor networks using clustering techniques
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
Self-Organizing maps versus growing neural gas in detecting data outliers for security applications
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Intelligent supervisory control system for home devices using a cyber physical approach
Integrated Computer-Aided Engineering - Anniversary Volume: Celebrating 20 Years of Excellence
A model for mining material properties for radiation shielding
Integrated Computer-Aided Engineering
Network management framework and lifetime evaluation method for wireless sensor networks
Integrated Computer-Aided Engineering
Maximum likelihood motion compensation for distributed video coding
Integrated Computer-Aided Engineering
Information dependability in distributed systems: The dependable distributed storage system
Integrated Computer-Aided Engineering
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. The first line of defense, i.e. encryption and authentication, is useless if an attacker has entered the system, and it is also vulnerable to side-channel attacks. Thus, a second line of defense, known as Intrusion Detection, must be added in order to detect and eliminate attacks. In the recent past, various solutions for detecting intrusions have been proposed. Most of them are able to detect only a limited number of attacks. Further, the solutions that deploy machine learning techniques exhibit higher level of flexibility and adaptability. Yet, these techniques consume significant power and computational resources. In this work we propose a distributed intrusion detection system organized as a reputation system where the reputation of each node is assigned by self-organizing maps (SOM) trained for detecting intrusions. The response of the system consists in assigning low reputation values to the compromised nodes rendering them isolated from the rest of the network. Further, we propose the implementation of SOM algorithm using the energy-efficient SORU (Stream Oriented Reconfigurable Unit) co-processor developed by our research group. Our solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability and energy efficiency. The testing results demonstrate its high potential.