Huh et al., 2011 - Google Patents
Lightweight intrusion detection for wireless sensor networksHuh et al., 2011
View PDF- Document ID
- 354200923426390088
- Author
- Huh E
- Hai T
- Publication year
- Publication venue
- Intrusion Detection Systems
External Links
Snippet
Wireless Sensor Networks (WSNs) have grown to become one of the most promising and interesting fields over the past few years. WSNs are wireless networks consisting of distributed sensor nodes which cooperatively monitor physical or environmental conditions …
- 238000001514 detection method 0 title description 102
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hai et al. | A lightweight intrusion detection framework for wireless sensor networks | |
Nadeem et al. | A survey of MANET intrusion detection & prevention approaches for network layer attacks | |
Anantvalee et al. | A survey on intrusion detection in mobile ad hoc networks | |
Ehsan et al. | Malicious AODV: implementation and analysis of routing attacks in MANETs | |
Islam et al. | Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches | |
Sen et al. | Security threats in mobile ad hoc networks | |
Hidoussi et al. | Centralized IDS based on misuse detection for cluster-based wireless sensors networks | |
Yamini et al. | Improving routing disruption attack detection in MANETs using efficient trust establishment | |
Sinha | Impact of DoS attack in IoT system and identifying the attacker location for interference attacks | |
Huh et al. | Lightweight intrusion detection for wireless sensor networks | |
Mechtri et al. | An optimized intrusion response system for MANET: An attack-severity aware approach | |
Narayanan et al. | Secure AODV to combat black hole attack in MANET | |
Jain et al. | Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol | |
Latha et al. | Secure routing through trusted nodes in wireless sensor networks a survey | |
Boora et al. | A survey on security issues in mobile ad-hoc networks | |
Shin et al. | Detection of malicious packet dropping attacks in RPL-based internet of things | |
Sana et al. | Flooding Attack on AODV in WSN | |
Soms et al. | Evolution of Intrusion Detection System in MANETs–A Survey | |
Katiravan | A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction | |
Pathak et al. | Efficient and trust based black hole attack detection and prevention in WSN | |
Hai et al. | Optimal selection and activation of intrusion detection agents for wireless sensor networks | |
Deb et al. | CORIDS: a cluster‐oriented reward‐based intrusion detection system for wireless mesh networks | |
Reddy et al. | An effective analysis on intrusion detection systems in wireless mesh networks | |
Dutta et al. | Intrusion detection system for power-aware OLSR | |
Roy et al. | MCBHIDS: Modified layered cluster based algorithm for black hole IDS |