Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 3
Page No. 393 - 405

Light Weight Prediction Algorithm Based IDS for Wireless Sensor Networks

Authors : S.M. Udhayasankar, V. Vijaya Chamundeeswari and N. Dharini

References

Abduvaliyev, A., A.S.K. Pathan, J. Zhou, R. Roman and W.C. Wong, 2013. On the vital areas of intrusion detection systems in wireless sensor networks. Commun. Surv. Tutorials IEEE., 15: 1223-1237.
CrossRef  |  Direct Link  |  

Chen, R.C., C.F. Hsieh and Y.F. Huang, 2009. A new method for intrusion detection on hierarchical wireless sensor networks. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, January 15-16, 2009, ACM, New York, USA., ISBN: 978-1-60558-405-8, pp: 238-245.

Han, G., J. Jiang, W. Shen, L. Shu and J. Rodrigues, 2013. IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Inf. Secur. IET., 7: 97-105.
CrossRef  |  Direct Link  |  

Heinzelman, W.R., A. Chandrakasan and H. Balakrishnan, 2000. Energy-efficient communication protocol for wireless micro sensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, HI., USA., pp: 3005-3014.

Khalil, I., S. Bagchi, C.N. Rotaru and N.B. Shroff, 2010. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Networks, 8: 148-164.
CrossRef  |  Direct Link  |  

Meena, T., M. Nishanthy and E. Kamalanaban, 2014. Cluster-based mechanism for multiple spoofing attackers in WSN. Proceedings of the 2014 International Conference on Information Communication and Embedded Systems (ICICES), February 27-28, 2014, IEEE, Chennai, India, ISBN: 978-1-4799-3835-3, pp: 1-5.

Roman, R., J. Zhou and J. Lopez, 2006. Applying intrusion detection systems to wireless sensor networks. Consum. Commun. Networking Conf., 1: 640-644.
Direct Link  |  

Shen, Z.W., Y.H. Zhu, X.Z. Tian and Y.P. Tang, 2008. An ant colony system based energy prediction routing algorithms for wireless sensor networks. Proceddings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM'08, October 12-14, 2008, IEEE, Dalian, China, pp: 1-4.

Son, J.H., H. Luo and S.W. Seo, 2010. Denial of service attack-resistant flooding authentication in wireless sensor networks. Comput. Commun., 33: 1531-1542.
CrossRef  |  Direct Link  |  

Strikos, A.A., 2007. A full approach for intrusion detection in wireless sensor networks. School of Information and Communication Technology, Stockholm, Sweden, https://people.kth.se/~maguire/courses/IK2555/ExamplePapers/Andreas_Strikos-paper-20070301.pdf

Su, C.C., K.M. Chang, Y.H. Kuo and M.F. Horng, 2005. The new intrusion prevention and detection approaches for clustering-based sensor networks (wireless sensor networks). Proceedings of the 2005 IEEE Conference on Wireless Communications and Networking, March 13-17, 2005, IEEE, USA., ISBN: 0-7803-8966-2, pp: 1927-1932.

Tiwari, M., K.V. Arya, R. Choudhari and K.S. Choudhary, 2009. Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT'09, November 24-26, 2009, IEEE, Seoul, South Korea, ISBN: 978-1-4244-5244-6, pp: 824-828.

Wood, A.D. and J.A. Stankovic, 2002. Denial of service in sensor networks. IEEE Comput. Mag., 35: 54-62.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved