Please use this identifier to cite or link to this item:
Title: On the vital areas of intrusion detection systems in wireless sensor networks
Authors: Abduvaliyev, A.
Pathan, A.-S.K.
Zhou, J.
Roman, R.
Wong, W.-C. 
Keywords: anomaly
Intrusion detection
wireless sensor networks
Issue Date: 2013
Source: Abduvaliyev, A., Pathan, A.-S.K., Zhou, J., Roman, R., Wong, W.-C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials 15 (3) : 1223-1237. ScholarBank@NUS Repository.
Abstract: This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this paper are anomaly detection, misuse detection, and specification-based detection protocols. We give a description of existing security attacks in WSNs and the corresponding proposed IDS protocols to tackle those attacks. We analyze the works with respect to the network structure of WSNs. In addition, we highlight various critical shortcomings that IDSs currently have and define future research tracks for IDSs in wireless sensor networks. Though a few restricted survey works on this topic have already been done, we feel that there is a great need of performing a detailed and comprehensive study on the vital aspects so that the IDS in WSN could be analyzed from all the 'need-to-know' angles. Thus, the paper's main aim is to include the most recent advancements in this area as well as to predict the future course of research so that the general as well as expert readers could be greatly benefited. © 2013 IEEE.
Source Title: IEEE Communications Surveys and Tutorials
ISSN: 1553877X
DOI: 10.1109/SURV.2012.121912.00006
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on Mar 8, 2018


checked on Feb 6, 2018

Page view(s)

checked on Mar 11, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.