Introduction to Wireless and Mobile Systems [Book Review]
IEEE Communications Magazine
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
iTrust: an integrated trust framework for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Reduced complexity intrusion detection in sensor networks using genetic algorithm
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Ant colony based approach for intrusion detection on cluster heads in WSN
Proceedings of the 2011 International Conference on Communication, Computing & Security
A single shot associated memory based classification scheme for WSN
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part III
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Hi-index | 0.00 |
In a constant search for efficient security control and intrusion detection systems (IDS), the ultimate goal in designing protocols remains less resource consumption while possessing broad coverage and wider applicability. Wireless sensors have become an excellent tool for military applications involving intrusion detection, perimeter monitoring, information gathering and smart logistics support in an unknown deployed area. Since sensor networks are resource-constrained devices, their design needs to minimize efforts without compromising the task's integrity. For this purpose, we propose a novel approach for an intrusion detection based on the structure of naturally occurring events. With the acquired knowledge distilled from the self-organized criticality aspect of the deployment region, we apply a hidden Markov model. In other words, we let our sensor network adapt to the norm of the dynamics in its natural surroundings so that any unusual activities can be singled out. Our IDS is simple to employ, requires minimal processing and data storage. Experimental scenarios are presented as verification of its functionality and practicality.