Abduvaliyev, Abror and Pathan, Al-Sakib Khan and Zhou, Jianying and Roman, Rodrigo and Wong, Wai-Choong (2013) Intrusion detection and prevention in wireless sensor networks. In: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, New York, USA, pp. 487-510. ISBN 9781466506060 (Hardback)
PDF (Intrusion detection and prevention in wireless sensor networks)
- Published Version
Restricted to Registered users only Download (481kB) | Request a copy |
Abstract
Due to the inherent features and weaknesses of Wireless Sensor Networks (WSNs) and the specific threats that target them, there have been many specially designed security protocols and mechanisms, such as Intrusion Detection Systems (IDSs), where correctness and energy efficiency are of vital importance. This chapter surveys recently proposed works on Intrusion Detection Systems in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this chapter are anomaly detection, misuse detection, and specification-based detection protocols. We give a description of existing security attacks in WSNs and the corresponding proposed IDS protocols to tackle those attacks. We analyze the works with respect to network architecture and highlight certain critical shortcomings that IDSs have. In addition, we define future research tracks for IDSs in wireless sensor networks. Though a few restricted survey works on this topic have already been done, we feel that there is a great need of performing a detailed and comprehensive study on the various facets so that the IDS in WSN could be analyzed from all the ‘need-to-know’ angles, thereby benefiting both generalists and specialists.
Item Type: | Book Chapter |
---|---|
Additional Information: | 6481/23843 |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Dr. Al-Sakib Khan Pathan |
Date Deposited: | 28 Dec 2012 10:31 |
Last Modified: | 04 Jul 2014 10:48 |
URI: | http://irep.iium.edu.my/id/eprint/23843 |
Actions (login required)
View Item |