A global hybrid intrusion detection system for wireless sensor networks

Y Maleh, A Ezzati, Y Qasmaoui, M Mbida - Procedia Computer Science, 2015 - Elsevier
Many researchers are currently focusing on the security of wireless sensor networks
(WSNs). This type of network is associated with vulnerable characteristics such as open-air …

IDSEP: a novel intrusion detection scheme based on energy prediction in cluster‐based wireless sensor networks

G Han, J Jiang, W Shen, L Shu… - IET Information …, 2013 - Wiley Online Library
Owing to wireless communication's broadcast nature, wireless sensor networks (WSNs) are
vulnerable to denial‐of‐service (DoS) attacks. It is of great importance to design an efficient …

A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks

S Rajasoundaran, SA Sivakumar… - Security and …, 2024 - Wiley Online Library
The role of firewalls and security principles in resource‐limited wireless networks and
Wireless Sensor Networks (WSN) is more expected than in any dedicated network …

[PDF][PDF] Lightweight Intrusion Detection Scheme for Wireless Sensor Networks.

Y Maleh, A Ezzati - IAENG International Journal of Computer Science, 2015 - iaeng.org
Wireless sensor networks are increasingly used in a wide range of potential applications,
including security and surveillance, control, actuation and maintenance of complex systems …

Wireless smart home sensor networks: mobile agent based anomaly detection

M Usman, V Muthukkumarasamy… - … and Computing and …, 2012 - ieeexplore.ieee.org
Pervasive computing is changing the life style of human being in the 21st century. Smart
home is one of the emerging examples for pervasive computing applications. In a smart …

[PDF][PDF] Mobile agent based hierarchical intrusion detection system in wireless sensor networks

S Khanum, M Usman, A Alwabel - International Journal of Computer …, 2012 - Citeseer
Security mechanism is a fundamental requirement of wireless networks in general and
Wireless Sensor Networks (WSN) in particular. Therefore, it is necessary that this security …

[图书][B] Security for Multihop Wireless Networks

S Khan, JL Mauri, S Adibi - 2014 - api.taylorfrancis.com
First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving
us full support in the timely completion of this book. We also thank all the authors for their …

A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks

W Shen, G Han, L Shu, JJPC Rodrigues… - … and Networking: First …, 2012 - Springer
Abstract Wireless Sensor Networks (WSNs) require an efficient intrusion detection scheme
to identify malicious attackers. Traditional detection schemes are not well suited for WSNs …

Securing wireless ad hoc networks: State of the art and challenges

V Pomponiu - Cyber Security Standards, Practices and Industrial …, 2012 - igi-global.com
The wireless technologies are bringing significant changes to data networking and
telecommunication services, making integrated networks a reality. By removing the wires …

Specification and validation of enhanced mobile agent-enabled anomaly detection and verification in resource constrained networks

M Usman, V Muthukkumarasamy… - Journal of Networks, 2015 - search.proquest.com
Existing mobile agent-enabled anomaly detection schemes have not considered temporal
behavior for their correct functioning and detection of temporal anomalies. This study …