Please use this identifier to cite or link to this item:
https://doi.org/10.1109/SURV.2012.121912.00006
DC Field | Value | |
---|---|---|
dc.title | On the vital areas of intrusion detection systems in wireless sensor networks | |
dc.contributor.author | Abduvaliyev, A. | |
dc.contributor.author | Pathan, A.-S.K. | |
dc.contributor.author | Zhou, J. | |
dc.contributor.author | Roman, R. | |
dc.contributor.author | Wong, W.-C. | |
dc.date.accessioned | 2014-06-17T03:00:03Z | |
dc.date.available | 2014-06-17T03:00:03Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Abduvaliyev, A., Pathan, A.-S.K., Zhou, J., Roman, R., Wong, W.-C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials 15 (3) : 1223-1237. ScholarBank@NUS Repository. https://doi.org/10.1109/SURV.2012.121912.00006 | |
dc.identifier.issn | 1553877X | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/56909 | |
dc.description.abstract | This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this paper are anomaly detection, misuse detection, and specification-based detection protocols. We give a description of existing security attacks in WSNs and the corresponding proposed IDS protocols to tackle those attacks. We analyze the works with respect to the network structure of WSNs. In addition, we highlight various critical shortcomings that IDSs currently have and define future research tracks for IDSs in wireless sensor networks. Though a few restricted survey works on this topic have already been done, we feel that there is a great need of performing a detailed and comprehensive study on the vital aspects so that the IDS in WSN could be analyzed from all the 'need-to-know' angles. Thus, the paper's main aim is to include the most recent advancements in this area as well as to predict the future course of research so that the general as well as expert readers could be greatly benefited. © 2013 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SURV.2012.121912.00006 | |
dc.source | Scopus | |
dc.subject | anomaly | |
dc.subject | Intrusion detection | |
dc.subject | misuse | |
dc.subject | specification-based | |
dc.subject | wireless sensor networks | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL & COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/SURV.2012.121912.00006 | |
dc.description.sourcetitle | IEEE Communications Surveys and Tutorials | |
dc.description.volume | 15 | |
dc.description.issue | 3 | |
dc.description.page | 1223-1237 | |
dc.identifier.isiut | 000322728300014 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.