IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
Interactive wormhole detection and evaluation
Information Visualization
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Multiphase intrusion detection and revocation system for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Cooperative Intrusion Detection in Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
XLSEC: a distributed cross-layer framework for security in wireless sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Malicious node detection system in wireless sensor networks: a decentralised approach
International Journal of Internet Technology and Secured Transactions
Distributed data-theft detection in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling the lion attack in cognitive radio networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Security in wireless sensor networks: key intrusion detection module in SOOAWSN
Proceedings of the 14th Communications and Networking Symposium
Anomaly-Based intrusion detection algorithms for wireless networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
On intrusion detection in opportunistic networks
Proceedings of the 17th Panhellenic Conference on Informatics
Detecting intrusive activities from insiders in a wireless sensor network using game theory
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
Journal of High Speed Networks
Hi-index | 0.00 |
We propose lightweight methods to detect anomaly intrusions in wireless sensor networks (WSNs). The main idea is to reuse the already available system information that is generated at various layers of a network stack. To the best of our knowledge, this is the first such approach for anomaly intrusion detection in WSNs.