Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/14988
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Acharya, Rathanakar | - |
dc.contributor.author | Asha, K | - |
dc.date.accessioned | 2024-03-30T10:11:01Z | - |
dc.date.available | 2024-03-30T10:11:01Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | pp. 462-+ | en_US |
dc.identifier.isbn | 9.78142E+12 | - |
dc.identifier.issn | 1556-6463 | - |
dc.identifier.uri | https://doi.org/10.1109/ICON.2008.4772642 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/14988 | - |
dc.description.abstract | Wireless sensor networks are emerging as cost effective solutions to critical applications such as remote monitoring of strategic installations covering large geographical areas, pollution control and disaster recovery. Their ability of self-organization, built-in redundancy and operational capabilities without needing human intervention make Wireless Sensor Networks suitable for such remote monitoring applications. But the unattended operation of WSNs and limited processing capabilities of the individual nodes make them vulnerable to a variety of security attacks, especially disruption of information flow or data corruption. For wired or wireless ad-hoc networks, there exist several automated systems for maintaining their functional integrity. Unfortunately, these strategies are not directly applicable to WSNs since ad-hoc networks are not as resource constrained as WSNs. This paper tries to develop distributed algorithms for detecting anomalous activity in information flow patterns in large-scale sensor networks. These algorithms will be used as building blocks of an integrated system for intrusion detection, attack isolation and fully automated response for assuring WSN survivability and information flow continuity. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Proceedings of the 2008 16th International Conference on Networks | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Couple Algorithm | en_US |
dc.subject | Wireless Sensor Networks | en_US |
dc.subject | Ad-Hoc Networks | en_US |
dc.subject | Intrusion Detection | en_US |
dc.title | Data Integrity and Intrusion Detection in Wireless Sensor Networks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.