A tutorial on hidden Markov models and selected applications in speech recognition
Readings in speech recognition
Queueing Networks and Markov Chains
Queueing Networks and Markov Chains
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
China's National Research Project on Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Cooperative Intrusion Detection in Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
Critical Information Infrastructure Security
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
IEEE Wireless Communications
Hi-index | 0.00 |
Wireless sensor network (WSN) technology is being increasingly used for data collection in critical infrastructures (CIs). This paper presents an intrusion detection system (IDS), which is able to protect a CI from attacks directed to its WSN-based parts. By providing accurate and timely detection of malicious activities, the proposed IDS solution ultimately results in a dramatic improvement in terms of protection, since opportunities are given for performing proper remediation/reconfiguration actions, which counter the attack and/or allow the system to tolerate it. The proposed solution has the important advantage of exploiting the high accuracy of hidden Markov models as an effective means of detecting malicious activities. We present the basic ideas, discuss the main implementation issues, and perform a preliminary experimental campaign, with respect to sinkhole attacks, one of the most serious attacks to WSNs.