Intrusion detection systems in wireless sensor networks: a review

NA Alrajeh, S Khan, B Shams - International Journal of …, 2013 - journals.sagepub.com
Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect
information about surrounding environment. Their distributed nature, multihop data …

Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach

H Bostani, M Sheikhan - Computer Communications, 2017 - Elsevier
Abstract Internet of Things (IoT) is a novel paradigm in computer networks in which resource-
constrained objects connect to unreliable Internet by using a wide range of technologies …

A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology

H Sedjelmaci, SM Senouci… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
In the Internet of Things (IoT), resources' constrained tiny sensors and devices could be
connected to unreliable and untrusted networks. Nevertheless, securing IoT technology is …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

An accurate security game for low-resource IoT devices

H Sedjelmaci, SM Senouci… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) technology incorporates a large number of heterogeneous
devices connected to untrusted networks. Nevertheless, securing IoT devices is a …

A global hybrid intrusion detection system for wireless sensor networks

Y Maleh, A Ezzati, Y Qasmaoui, M Mbida - Procedia Computer Science, 2015 - Elsevier
Many researchers are currently focusing on the security of wireless sensor networks
(WSNs). This type of network is associated with vulnerable characteristics such as open-air …

An intrusion detection system on ping of death attacks in IoT networks

A Abdollahi, M Fathi - Wireless Personal Communications, 2020 - Springer
Internet of things (IoT) is almost vulnerable to cyber security attacks due to the limited
computational resources of conventional IoT devices. In this paper, ping of death as a cyber …

Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach

R Rani, S Kumar, U Dohare - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …

Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks

R Singh, J Singh, R Singh - Wireless Communications and …, 2017 - Wiley Online Library
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically
detects the WSNs attacks is proposed. AHIDS makes use of cluster‐based architecture with …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …