Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/5787
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAcharya, Rathanakar-
dc.contributor.authorK, Asha-
dc.date.accessioned2024-02-07T05:45:50Z-
dc.date.available2024-02-07T05:45:50Z-
dc.date.issued2008-
dc.identifier.citationpp. 462en_US
dc.identifier.isbn9781424438051-
dc.identifier.issn1556-6463-
dc.identifier.urihttp://dx.doi.org/10.1109/ICON.2008.4772642-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/5787-
dc.description.abstractWireless Sensor Networks Are Emerging As Cost Effective Solutions To Critical Applications Such As Remote Monitoring Of Strategic Installations Covering Large Geographical Areas, Pollution Control And Disaster Recovery. Their Ability Of Self-Organization, Built-In Redundancy And Operational Capabilities Without Needing Human Intervention Make Wireless Sensor Networks Suitable For Such Remote Monitoring Applications. But The Unattended Operation Of Wsns And Limited Processing Capabilities Of The Individual Nodes Make Them Vulnerable To A Variety Of Security Attacks, Especially Disruption Of Information Flow Or Data Corruption. For Wired Or Wireless Ad-Hoc Networks, There Exist Several Automated Systems For Maintaining Their Functional Integrity. Unfortunately, These Strategies Are Not Directly Applicable To Wsns Since Ad-Hoc Networks Are Not As Resource Constrained As Wsns. This Paper Tries To Develop Distributed Algorithms For Detecting Anomalous Activity In Information Flow Patterns In Large-Scale Sensor Networks. These Algorithms Will Be Used As Building Blocks Of An Integrated System For Intrusion Detection, Attack Isolation And Fully Automated Response For Assuring Wsn Survivability And Information Flow Continuity.en_US
dc.language.isoenen_US
dc.publisherProceedings Of The 2008 16Th International Conference On Networksen_US
dc.subjectCouple Algorithmen_US
dc.subjectWireless Sensor Networksen_US
dc.subjectAd-Hoc Networksen_US
dc.subjectIntrusion Detectionen_US
dc.titleData Integrity And Intrusion Detection In Wireless Sensor Networksen_US
dc.typeOtheren_US
Appears in Collections:Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.