[PDF][PDF] Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks

M Wazid - 2017 - web2py.iiit.ac.in
In most of the applications, wireless sensor networks (WSNs) are deployed in an unattended
environment. Thus, sensor nodes can be physically captured by the adversaries, and the …

A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks

M Wazid, AK Das - Wireless Personal Communications, 2017 - Springer
Rapid development of the wireless communication technology and low cost of sensing
devices has accelerated the development of wireless sensor networks (WSNs). These types …

An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks

AB Karuppiah, J Dalfiah, K Yuvashri… - International confernce …, 2015 - ieeexplore.ieee.org
Due to the specific characteristics, Wireless Sensor Networks (WSN) are severely unsafe
and are open to malicious attacks. One of the most malicious threats to WSN is in the form of …

[PDF][PDF] An energy preserving detection mechanism for blackhole attack in wireless sensor networks

C Lal, A Shrivastava - International Journal of Computer Applications, 2015 - academia.edu
Wireless sensor networks (WSNs) are currently used in many application areas such as
military applications, control and tracking applications, habitat monitoring applications where …

Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions

N Nordin, MS Mohd Pozi - International Conference on Computing and …, 2023 - Springer
Abstract Wireless Sensor Networks (WSNs) consist of numerous affordable, energy-efficient,
compact wireless sensors. These sensors are designed to collect, process, and …

An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks

ECH Ngai, J Liu, MR Lyu - Computer Communications, 2007 - Elsevier
In a wireless sensor network, multiple nodes would send sensor readings to a base station
for further processing. It is known that such a many-to-one communication is highly …

[PDF][PDF] Towards intrusion detection in wireless sensor networks

I Krontiris, T Dimitriou, FC Freiling - Proceedings of the 13th …, 2007 - ioanniskrontiris.de
Detection is sensor networks and we propose a lightweight scheme that can be applied to
such networks. Its basic characteristic is that nodes monitor their neighborhood and …

Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs

S Athmani, DE Boubiche… - 2013 World Congress on …, 2013 - ieeexplore.ieee.org
Due to their particular characteristics, wireless sensor networks (WSN) are severely
vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target …

[PDF][PDF] Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks

R Kumar, A Shanmugam - Journal of Network Security Computer …, 2017 - researchgate.net
Wireless sensor network (WSN) have numerous field of application, however, it is
abundantly susceptible to the protection threats. This work proposes a light-weight, fast …

Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks

RK Sundararajan, U Arumugam - Journal of Sensors, 2015 - Wiley Online Library
In wireless sensor network (WSN), the sensors are deployed and placed uniformly to
transmit the sensed data to a centralized station periodically. So, the major threat of the WSN …