IEEE Transactions on Software Engineering - Special issue on computer security and privacy
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Distributed deviation detection in sensor networks
ACM SIGMOD Record
Towards Survivable Intrusion Detection System
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A Survey of Outlier Detection Methodologies
Artificial Intelligence Review
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
Online outlier detection in sensor data using non-parametric models
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Guest Editorial: From intrusion detection to self-protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
ICNS '07 Proceedings of the Third International Conference on Networking and Services
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Compromised Sensor Nodes Detection: A Quantitative Approach
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Inside Attacker Detection in Hierarchical Wireless Sensor Network
ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
Automatic feature selection for anomaly detection
Proceedings of the 1st ACM workshop on Workshop on AISec
Group-based intrusion detection system in wireless sensor networks
Computer Communications
Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
ACM Computing Surveys (CSUR)
Review: Survey of multipath routing protocols for mobile ad hoc networks
Journal of Network and Computer Applications
New approaches to fuzzy-rough feature selection
IEEE Transactions on Fuzzy Systems
ICCIT '09 Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology
Reduced complexity intrusion detection in sensor networks using genetic algorithm
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Anomaly detection in wireless sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
Journal of Parallel and Distributed Computing
A novel intrusion detection framework for wireless sensor networks
Personal and Ubiquitous Computing
Data summarization for network traffic monitoring
Journal of Network and Computer Applications
Hi-index | 0.00 |
Since security threats to WSNs are increasingly being diversified and deliberate, prevention-based techniques alone can no longer provide WSNs with adequate security. However, detection-based techniques might be effective in collaboration with prevention-based techniques for securing WSNs. As a significant branch of detection-based techniques, the research of anomaly detection in wired networks and wireless ad hoc networks is already quite mature, but such solutions can be rarely applied to WSNs without any change, because WSNs are characterized by constrained resources, such as limited energy, weak computation capability, poor memory, short communication range, etc. The development of anomaly detection techniques suitable for WSNs is therefore regarded as an essential research area, which will enable WSNs to be much more secure and reliable. In this survey paper, a few of the key design principles relating to the development of anomaly detection techniques in WSNs are discussed in particular. Then, the state-of-the-art techniques of anomaly detection in WSNs are systematically introduced, according to WSNs' architectures (Hierarchical/Flat) and detection technique categories (statistical techniques, rule based, data mining, computational intelligence, game theory, graph based, and hybrid, etc.). The analyses and comparisons of the approaches that belong to a similar technique category are represented technically, followed by a brief discussion towards the potential research areas in the near future and conclusion.