On the vital areas of intrusion detection systems in wireless sensor networks

A Abduvaliyev, ASK Pathan, J Zhou… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs,
and presents a comprehensive classification of various IDS approaches according to their …

Intrusion detection systems in wireless sensor networks: a review

NA Alrajeh, S Khan, B Shams - International Journal of …, 2013 - journals.sagepub.com
Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect
information about surrounding environment. Their distributed nature, multihop data …

An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks

M Otair, OT Ibrahim, L Abualigah, M Altalhi, P Sumari - Wireless Networks, 2022 - Springer
The intrusion detection system is a method for detection against attacks, making it one of the
essential defense layers. Researchers are trying to find new algorithms to inspect all …

[PDF][PDF] Role of machine learning algorithms intrusion detection in WSNs: a survey

E Baraneetharan - Journal of Information Technology, 2020 - scholar.archive.org
Abstract Machine Learning is capable of providing real-time solutions that maximize the
utilization of resources in the network thereby increasing the lifetime of the network. It is able …

Omni SCADA intrusion detection using deep learning algorithms

J Gao, L Gan, F Buschendorf, L Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In this article, we investigate deep-learning-based omni intrusion detection system (IDS) for
supervisory control and data acquisition (SCADA) networks that are capable of detecting …

A review on security and privacy issues in wireless sensor networks

KN SunilKumar - 2017 2nd IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Wireless network sensors consist of a large number of pocket-sized sensors deployed in
autonomous manner in the area under surveillance. The sensor networks are used in …

Auditing file system permissions using association rule mining

S Parkinson, V Somaraki, R Ward - Expert Systems with Applications, 2016 - Elsevier
Identifying irregular file system permissions in large, multi-user systems is challenging due
to the complexity of gaining structural understanding from large volumes of permission …

Wormhole attack prevention mechanism for RPL based LLN network

FI Khan, T Shon, T Lee, K Kim - 2013 Fifth international …, 2013 - ieeexplore.ieee.org
Smart metering application has received a lot of attention from the research community
lately. Usually, LLN based network runs on RPL protocol which constructs a DAG structure …

[PDF][PDF] A Survey of Anomaly Detection Approaches in Internet of Things.

M Behniafar, A Nowroozi, HR Shahriari - ISeCure, 2018 - sid.ir
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which
are connected to each other and Internet. Security plays an important role in such networks …

A collective anomaly detection approach for multidimensional streams in mobile service security

Y Weng, L Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Anomaly detection in many applications is becoming more and more important, especially
for security and privacy in mobile service computing domains with the development of …