Matches in SemOpenAlex for { <https://semopenalex.org/work/W34543149> ?p ?o ?g. }
- W34543149 abstract "Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy resources and also restricted by the ad-hoc network operational environment. They pose unique challenges, due to limited power supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the main focus of this dissertation. In general, the following processes may be involved in securing WSNs: Intrusion Prevention, Intrusion Detection, and Intrusion Mitigation. This dissertation presents solutions (algorithms and schemes) to the first two lines of defenses of the security provisioning plan, namely, Intrusion Prevention and Intrusion Detection. As a first line of defense in securing WSNs, this dissertation presents our proposed algorithm (Two-Level User Authentication scheme) as an Intrusion Prevention System (IPS) for WSNs. The algorithm uses two-level authentication between a sensor node and a user. It is designed for heterogeneous WSNs, meaning that the network consists of two components: regular nodes and more powerful cluster heads. The proposed scheme is evaluated both analytically and also in a simulation environment, by comparing it to the current state-of-the-art schemes in the literature. A comprehensive and systematic survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for Mobile Ad-Hoc Networks (MANETs) and WSNs is presented. Firstly, detailed information about IDSs is provided. This is followed by the analysis and comparison of each scheme along with their advantages and disadvantages from the perspective of security. Finally, guidelines on IDSs that are potentially applicable to WSNs are provided. Overall, this work would be very helpful to the researchers in developing their own IDSs for their WSNs. Clustering (of the nodes) is very important for WSNs not only in data aggregation, but also in increasing the overall performance of the network, especially in terms of total life-time. Besides, with the help of clustering, complex intrusion prevention and detection algorithms can be implemented. Therefore, background on the clustering algorithms is provided and then a clustering algorithm for WSNs is proposed, that is both power and connectivity aware. The proposed algorithm provides higher energy efficiency and increases the life-time of the network. In evaluating the proposed clustering algorithm (in a simulation environment by comparing its' performance to the previously proposed algorithm, namely Kachirski et al.'s algorithm), it is demonstrated that the proposed algorithm improves energy efficiency in WSNs. Finally, an IDS framework based on multi-level clustering for hierarchical WSNs is proposed. It is based upon (the nodes use our proposed clustering algorithm while forming their clusters) the clustering algorithm that is proposed in this dissertation. The framework provides two types of intrusion detection approaches, namely Downwards-IDS (D-IDS) to detect the abnormal behavior (intrusion) of the subordinate (member) nodes and Upwards-IDS (U-IDS) to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. (Abstract shortened by UMI.)" @default.
- W34543149 created "2016-06-24" @default.
- W34543149 creator A5059073882 @default.
- W34543149 creator A5060274685 @default.
- W34543149 date "2013-01-01" @default.
- W34543149 modified "2023-09-27" @default.
- W34543149 title "Prevention and detection of intrusions in wireless sensor networks" @default.
- W34543149 cites W131464887 @default.
- W34543149 cites W1489073918 @default.
- W34543149 cites W150105584 @default.
- W34543149 cites W1520571120 @default.
- W34543149 cites W1520914943 @default.
- W34543149 cites W1525180324 @default.
- W34543149 cites W1534489247 @default.
- W34543149 cites W1536792846 @default.
- W34543149 cites W1545343755 @default.
- W34543149 cites W1556738076 @default.
- W34543149 cites W1567573409 @default.
- W34543149 cites W1579298160 @default.
- W34543149 cites W1583345160 @default.
- W34543149 cites W1590603829 @default.
- W34543149 cites W1590910518 @default.
- W34543149 cites W1598409340 @default.
- W34543149 cites W178881929 @default.
- W34543149 cites W1805023694 @default.
- W34543149 cites W1824511051 @default.
- W34543149 cites W1843687615 @default.
- W34543149 cites W188588518 @default.
- W34543149 cites W1897830915 @default.
- W34543149 cites W1935541015 @default.
- W34543149 cites W1940397557 @default.
- W34543149 cites W1956043843 @default.
- W34543149 cites W1968864740 @default.
- W34543149 cites W1977369221 @default.
- W34543149 cites W1985902740 @default.
- W34543149 cites W1991590950 @default.
- W34543149 cites W1995967096 @default.
- W34543149 cites W2000754262 @default.
- W34543149 cites W2002762887 @default.
- W34543149 cites W2007087405 @default.
- W34543149 cites W2007595564 @default.
- W34543149 cites W2011938559 @default.
- W34543149 cites W2013627100 @default.
- W34543149 cites W2018806426 @default.
- W34543149 cites W2021891618 @default.
- W34543149 cites W2022960560 @default.
- W34543149 cites W2029384299 @default.
- W34543149 cites W2033751220 @default.
- W34543149 cites W2034794977 @default.
- W34543149 cites W2036358294 @default.
- W34543149 cites W2043089557 @default.
- W34543149 cites W2047301871 @default.
- W34543149 cites W2048402311 @default.
- W34543149 cites W2051152775 @default.
- W34543149 cites W2064725599 @default.
- W34543149 cites W2065616993 @default.
- W34543149 cites W2070301163 @default.
- W34543149 cites W2076812812 @default.
- W34543149 cites W2077582647 @default.
- W34543149 cites W2081860104 @default.
- W34543149 cites W2082309976 @default.
- W34543149 cites W2083352441 @default.
- W34543149 cites W2090636507 @default.
- W34543149 cites W2093091126 @default.
- W34543149 cites W2097005157 @default.
- W34543149 cites W2098506387 @default.
- W34543149 cites W2099595757 @default.
- W34543149 cites W2099766891 @default.
- W34543149 cites W2099852195 @default.
- W34543149 cites W2102981928 @default.
- W34543149 cites W2104846640 @default.
- W34543149 cites W2106335692 @default.
- W34543149 cites W2107905431 @default.
- W34543149 cites W2109921270 @default.
- W34543149 cites W2111184007 @default.
- W34543149 cites W2111912359 @default.
- W34543149 cites W2112534360 @default.
- W34543149 cites W2113928343 @default.
- W34543149 cites W2114495437 @default.
- W34543149 cites W2115373791 @default.
- W34543149 cites W2115398219 @default.
- W34543149 cites W2116090163 @default.
- W34543149 cites W2117089038 @default.
- W34543149 cites W2118982908 @default.
- W34543149 cites W2120611165 @default.
- W34543149 cites W2120874468 @default.
- W34543149 cites W2121686811 @default.
- W34543149 cites W2122126819 @default.
- W34543149 cites W2122661758 @default.
- W34543149 cites W2122744359 @default.
- W34543149 cites W2123336539 @default.
- W34543149 cites W2124363451 @default.
- W34543149 cites W2125492197 @default.
- W34543149 cites W2127699957 @default.
- W34543149 cites W2128064123 @default.
- W34543149 cites W2128381560 @default.
- W34543149 cites W2129429132 @default.
- W34543149 cites W2129542188 @default.
- W34543149 cites W2129919733 @default.
- W34543149 cites W2130403046 @default.