Intrusion detection system using anomaly technique in wireless sensor network
@article{Pandey2016IntrusionDS, title={Intrusion detection system using anomaly technique in wireless sensor network}, author={Sushant Kumar Pandey and Prabhat Kumar and Jyoti Prakash Singh and M. P. Singh}, journal={2016 International Conference on Computing, Communication and Automation (ICCCA)}, year={2016}, pages={611-615} }
In the recent research, it has been observed that finding out the compromised nodes in wireless sensor net-work(WSN) is a very difficult task. In WSN, nodes have limited power and low processing capacity. Moreover, a homogeneous sensor network comprises of nodes having similar behavior. These constraints make it difficult to identify compromised nodes in such a network. Compromised nodes are those nodes whose behavior are dissimilar from normal nodes. Compromised node can be harmful for the… CONTINUE READING
Citations
Publications citing this paper.
SHOWING 1-2 OF 2 CITATIONS
A Security Architecture for Networked Internet of Things Devices
VIEW 11 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED
References
Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES
Kristensen . ” An industrial perspective on wireless sensor networksa survey of requirements , protocols , and challenges
A novel intrusion detection framework for wireless sensor networks.
VIEW 1 EXCERPT