Centralized IDS based on misuse detection for cluster-based wireless sensors networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - Springer
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

An efficient intrusion detection framework in cluster‐based wireless sensor networks

H Sedjelmaci, SM Senouci… - Security and …, 2013 - Wiley Online Library
In the last few years, the technological evolution in the field of wireless sensor networks was
impressive, which made them extremely useful in various applications (military, commercial …

A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks

FA Khan, AH Farooqi, A Derhab - The Journal of Supercomputing, 2019 - Springer
Wireless sensor networks (WSNs) will play a major role in future technologies in the
development of the cyber-physical society. Studies show that WSNs are vulnerable to …

Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks

H Sedjelmaci, SM Senouci - Global Information Infrastructure …, 2013 - ieeexplore.ieee.org
In this paper, we design and implement an Efficient and Lightweight Intrusion Detection
(ELID) framework based on a new detection technique. This later relies on the fact that …

Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs

S Athmani, DE Boubiche… - 2013 World Congress on …, 2013 - ieeexplore.ieee.org
Due to their particular characteristics, wireless sensor networks (WSN) are severely
vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target …

Detecting selective forwarding attacks in wireless sensor networks using support vector machines

S Kaplantzis, A Shilton, N Mani… - 2007 3rd International …, 2007 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly
in the near future due to their data acquisition and data processing abilities. Security for …

A lightweight intrusion detection framework for wireless sensor networks

TH Hai, EN Huh, M Jo - Wireless Communications and mobile …, 2010 - Wiley Online Library
Abstract In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful
applications for both civil and military tasks. However, sensor networks are susceptible to …

[PDF][PDF] Secure routing optimization in hierarchical cluster-based wireless sensor networks

S Sahraoui, S Bouam - International Journal of Communication …, 2013 - academia.edu
Popularity of wireless sensor networks (WSNs) is increasing continuously in different
domains of daily life, as they provide efficient method of collecting valuable data from the …

[PDF][PDF] A realistic modelling of the sinkhole and the black hole attacks in cluster-based WSNs

I Abasikeleş-Turgut, MN Aydin… - International Journal of …, 2016 - researchgate.net
Due to the positioning in hostile environment, wireless sensor networks (WSNs) are prone to
various attacks. Hence, security is one of the most important issues in these networks …

Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

N Dharini, R Balakrishnan… - … Conference on Smart …, 2015 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) when sorted out as groups (clusters) increases
throughput, energy savings and decreases delay. These types of WSN rely on cluster heads …