SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
A Formal Analysis of Syverson's Rational Exchange Protocol
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy and quality aware query processing in wireless sensor database systems
Information Sciences: an International Journal
Scalability and performance evaluation of hierarchical hybrid wireless networks
IEEE/ACM Transactions on Networking (TON)
Information Sciences: an International Journal
Distributed routing in wireless sensor networks using energy welfare metric
Information Sciences: an International Journal
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Information Sciences: an International Journal
Editorial: Guest editorial: Special issue on data mining for information security
Information Sciences: an International Journal
Engineering Applications of Artificial Intelligence
Information Sciences: an International Journal
Hi-index | 0.07 |
Wireless sensor nodes are congenitally limited by insufficient hardware resources, such as memory size and battery life. These factors influence the lifespan of wireless sensor networks and pose numerous challenges regarding the addition of security mechanisms to protect sensor nodes. As the number of applications using wireless sensor networks increases, protecting sensor nodes from malicious attacks becomes ever more important. In this paper, we propose a new intrusion detection system called the Markovian IDS, to protect sensor nodes from malicious attacks. The Markovian IDS incorporates game theory with anomaly and misuse detection to determine the best defense strategies. It also employs Markov decision processes with an attack-pattern-mining algorithm to predict future attack patterns and implement appropriate measures. Experimental results show that the proposed Markovian IDS has a higher defense success rate than game theory or Markov decision processes alone.