Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information

P Sarigiannidis, E Karapistoli… - expert systems with …, 2015 - Elsevier
Security is becoming a major concern for many mission-critical applications wireless sensor
networks (WSNs) are envisaged to support. The inherently vulnerable characteristics of …

UTTAMA: an intrusion detection system based on feature clustering and feature transformation

A Nagaraja, B Uma, R Gunupudi - Foundations of Science, 2020 - Springer
Detecting Intrusions and anomalies is becoming much more challenging with new attacks
pop** out over a period of time. Achieving better accuracies by applying benchmark …

EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs

N Tsitsiroudi, P Sarigiannidis… - 2016 9th IFIP …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) have emerged as a valuable, flexible, and interoperable network of
devices, objects, items, and electronics. Fuelled by recent advances in networking …

Lightweight energy consumption based intrusion detection system for wireless sensor networks

M Riecker, S Biedermann, M Hollick - Proceedings of the 28th Annual …, 2013 - dl.acm.org
Wireless sensor networks are increasingly used in industrial settings and in safety-critical
applications, generating a financial and social impact. Complementing to cryptographic …

An extensive survey on intrusion detection-past, present, future

A Nagaraja, TS Kumar - … of the Fourth International Conference on …, 2018 - dl.acm.org
Intrusion Detection is the most eminent fields in the network which can also be called as
anomaly detection. Various methods used by early research tells that, the kind of measures …

[PDF][PDF] Implantable Medical Devices; Networking Security Survey.

S Aram, RA Shirvani, E Pasero… - J. Internet Serv. Inf …, 2016 - academia.edu
The industry of implantable medical devices (IMDs) is constantly evolving, which is dictated
by the pressing need to comprehensively address new challenges in the healthcare field …

[PDF][PDF] Discrete R-contiguous bit matching mechanism appropriateness for anomaly detection in wireless sensor networks

M Zeeshan, H Javed, S Ullah - International Journal of Communication …, 2017 - core.ac.uk
Resource exhaustion is one of the main challenges for the security of Wireless Sensor
Networks (WSNs). The challenge can be addressed by using algorithms that are light …

Exploiting redundancy for UWB anomaly detection in infrastructure-free multi-robot relative localization

S Salimpour, PT Morón, X Yu, T Westerlund… - Frontiers in Robotics …, 2023 - frontiersin.org
Ultra-wideband (UWB) localization methods have emerged as a cost-effective and accurate
solution for GNSS-denied environments. There is a significant amount of previous research …

[PDF][PDF] Balancing Trade off between Data Security and Energy Model for Wireless Sensor Network

BE Manjunath, PV Rao - International Journal of Electrical and Computer …, 2018 - core.ac.uk
An extensive effort to evolve various routing protocol to ensure optimal data delivery in
energy efficient way is beneficial only if there is additional means of security process is …