Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

UIDS: a unified intrusion detection system for IoT environment

V Kumar, AK Das, D Sinha - Evolutionary intelligence, 2021 - Springer
Intrusion detection system (IDS) using machine learning approach is getting popularity as it
has an advantage of getting updated by itself to defend against any new type of attack …

Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol

MN Napiah, MYIB Idris, R Ramli, I Ahmedy - IEEE Access, 2018 - ieeexplore.ieee.org
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various
malicious activities. However, these IDS methods only detect specific attack but fails when …

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

A Arshad, ZM Hanapi, S Subramaniam… - PeerJ Computer …, 2021 - peerj.com
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …

An Efficient Clustered M-path Sinkhole Attack Detection (MSAD) Algorithm for Wireless Sensor Networks.

P Shanmugaraja, M Bhardwaj… - Adhoc & Sensor …, 2023 - search.ebscohost.com
Wireless sensor networks (WSNs) are made up of low-energy tiny sensor nodes that can
monitor specific environment and transfer data among themselves without the use of a …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Sinkhole attacks in wireless sensor networks: A survey

A Rehman, SU Rehman, H Raheem - Wireless Personal Communications, 2019 - Springer
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating
sensor readings to the base stations through other nodes. Due to their energy limitations …

Weighted hyperbolic DV-hop positioning node localization algorithm in WSNs

J Mass-Sanchez, E Ruiz-Ibarra… - Wireless Personal …, 2017 - Springer
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks
(WSAN) identifying geographically where an event occurred, which facilitates timely …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …

A hybrid trust based intrusion detection system for wireless sensor networks

MM Ozcelik, E Irmak, S Ozdemir - … International symposium on …, 2017 - ieeexplore.ieee.org
In Wireless Sensor Networks (WSNs), detecting malicious nodes and discarding their
sensed data have a significant importance to carry out the mission critical tasks. Traditional …