Chi et al., 2006 - Google Patents
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networksChi et al., 2006
- Document ID
- 5523391827324280576
- Author
- Chi S
- Cho T
- Publication year
- Publication venue
- International Conference on Fuzzy Systems and Knowledge Discovery
External Links
Snippet
The wireless sensor network is rapidly emerging as an important tool for various applications. In this network, where a large subset of the network applications monitors and protects critical infrastructures, security is a particularly important issue. However, ensuring …
- 238000001514 detection method 0 title abstract description 77
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wazid et al. | Design of sinkhole node detection mechanism for hierarchical wireless sensor networks | |
| Magotra et al. | Detection of HELLO flood attack on LEACH protocol | |
| Farjamnia et al. | Review of the techniques against the wormhole attacks on wireless sensor networks | |
| Lin et al. | Energy efficiency routing with node compromised resistance in wireless sensor networks | |
| Eswari et al. | A novel rule based intrusion detection framework for wireless sensor networks | |
| Rassam et al. | A sinkhole attack detection scheme in mintroute wireless sensor networks | |
| Jatti et al. | Intrusion detection systems | |
| Abhilash et al. | Secure routing protocol for MANET: A survey | |
| Saha et al. | Two-level secure re-routing (TSR) in mobile ad hoc networks | |
| Prasad | Secure intrusion detection system routing protocol for mobile ad‐hoc network | |
| Al-Nasser et al. | A comprehensive survey on routing and security in mobile wireless sensor networks | |
| Singh et al. | An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes | |
| Hassoubah et al. | Intrusion detection of hello flood attack in wsns using location verification scheme | |
| Chi et al. | Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks | |
| Huh et al. | Lightweight intrusion detection for wireless sensor networks | |
| Latha et al. | Secure routing through trusted nodes in wireless sensor networks a survey | |
| Nordin et al. | Cross-layer based intrusion detection system for wireless sensor networks: challenges, solutions, and future directions | |
| Sadeghizadeh et al. | A lightweight intrusion detection system based on specifications to improve security in wireless sensor networks | |
| Zhou et al. | Hiding contextual information for defending a global attacker | |
| Katiravan | A two level detection of routing layer attacks in hierarchical wireless sensor networks using learning based energy prediction | |
| Tandon | Sinkhole Attacks in Wireless Sen | |
| Tyagi et al. | Detecting malicious node in network using packet delivery ratio | |
| Nakul | A survey on malicious node detection in wireless sensor networks | |
| Vishwakarma et al. | An Efficient Attack Detection System for Mobile Ad-hoc Network | |
| Karuppiah et al. | False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN |