Saied et al., 2016 - Google Patents
A lightweight threat detection system for industrial wireless sensor networksSaied et al., 2016
View PDF- Document ID
- 16217749106883771524
- Author
- Saied Y
- Olivereau A
- Publication year
- Publication venue
- International Journal of Network Security
External Links
Snippet
Wireless Sensor Networks (WSNs) led the way to new forms of communications, which extend today the Internet paradigm to unforeseen boundaries such as eHealth, intelligent building or smart grid, to name a few. The legacy industry, however, is slower to adopt this …
- 238000001514 detection method 0 title abstract description 66
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maleh et al. | A global hybrid intrusion detection system for wireless sensor networks | |
Yu et al. | A framework of machine learning based intrusion detection for wireless sensor networks | |
Han et al. | Management and applications of trust in Wireless Sensor Networks: A survey | |
Wazid et al. | A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks | |
Desai et al. | Node-level trust evaluation in wireless sensor networks | |
Roberts et al. | An improved high performance clustering based routing protocol for wireless sensor networks in IoT | |
Ghosal et al. | A survey on energy efficient intrusion detection in wireless sensor networks | |
Pamarthi et al. | Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms | |
Arul Selvan et al. | Malicious node identification using quantitative intrusion detection techniques in MANET | |
WO2020093907A1 (en) | Trust and noise point detection technology-based intrusion detection method for multi-protocol layer | |
Cheng et al. | A context adaptive intrusion detection system for MANET | |
Jatti et al. | Intrusion detection systems | |
Hussain et al. | A survey of ids techniques in manets using machine-learning | |
Akestoridis et al. | HiveGuard: A network security monitoring architecture for Zigbee networks | |
Poonia | Internet of Things (IoT) security challenges | |
Alshareef et al. | Towards an effective management of IoT by integrating cloud and fog computing | |
Saied et al. | A lightweight threat detection system for industrial wireless sensor networks | |
Midi et al. | A system for response and prevention of security incidents in wireless sensor networks | |
Panos et al. | A novel intrusion detection system for MANETs | |
Khan et al. | A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks | |
Liu et al. | A bayesian rule learning based intrusion detection system for the mqtt communication protocol | |
Kumar et al. | Security concerns over IoT routing using emerging technologies: a review | |
Khardioui et al. | Implementation and evaluation of an intrusion detection system for IoT: against routing attacks | |
Abdel-Fattah et al. | Dynamic intrusion detection technique for dynamic mobile ad hoc network | |
Ambili et al. | TN-IDS for network layer attacks in RPL based IoT systems |