An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

F Gara, LB Saad, RB Ayed - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
… This paper focuses on detecting selective forwarding … propose solutions to detect selective
forwarding attack in static … and proposes a novel intrusion detection system that combines …

Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information

M Tiwari, KV Arya, R Choudhari… - … on Computer Sciences …, 2009 - ieeexplore.ieee.org
… to detect malicious behavior. Even though nodes don’t have global view but they can still
detect an intrusion … This paper introduces a specification based Intrusion Detection System for …

Suspicious flow forwarding for multiple intrusion detection systems on software-defined networks

T Ha, S Yoon, AC Risdianto, JW Kim, H Lim - IEEE Network, 2016 - ieeexplore.ieee.org
… -based attacks, intrusion detection systems (IDSs) are widely used. An IDS is a device that
protects networks from various types of malicious attacks. This system monitors network traffic …

An intrusion detection system for wireless sensor networks

C Ioannou, V Vassiliou… - 2017 24th International …, 2017 - ieeexplore.ieee.org
… the Forwarding Ratio attack is set to 50%. The Block Node sensor-based Selective Forward
attack, … to drop its packets at predefined time intervals, to make it more difficult to be detected. …

Detecting selective forwarding attacks in wireless sensor networks using support vector machines

S Kaplantzis, A Shilton, N Mani… - 2007 3rd International …, 2007 - ieeexplore.ieee.org
forwarding attack and our implemented routing protocol. In section 3 we present related work
in the area of intrusion detectionIntrusion detection systems are considered a second line …

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

M Ezhilarasi, L Gnanaprasanambikai, A Kousalya… - Soft Computing, 2023 - Springer
… have evolved so far to detect common network attacks. But it is … attacks like selective forwarding
attack, black hole attack, Sybil … intrusion detection system is introduced to detect routing …

Neighbor node trust based intrusion detection system for WSN

SM Sajjad, SH Bouk, M Yousaf - Procedia Computer Science, 2015 - Elsevier
… an intrusion detectionforwarding engine for packet forwarding purposes. The proposed
scheme successfully detects Hello flood attack, jamming attack and selective forwarding attack

A survey of intrusion detection systems in wireless sensor networks

O Can, OK Sahingoz - 2015 6th international conference on …, 2015 - ieeexplore.ieee.org
attack types of WSNs intrusion detection approaches being against to this attack types. …
Selective Forwarding Attack is one of the network layer attack described in Fig. 1. In this …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
… and selective-forwarding attacks. Our approach is, however, extensible and can be used to
detect other attacks as we … In the rest of this section we present our intrusion detection system. …

Intrusion detection systems in the Internet of things: A comprehensive investigation

S Hajiheidari, K Wakil, M Badri, NJ Navimipour - Computer Networks, 2019 - Elsevier
… according to attacks that they can detect. These … service attack, Sybil attack, replay attack,
selective forwarding attack, wormhole attack, black hole attack, sinkhole attack, jamming attack, …