Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. D'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.

    Original languageEnglish
    Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
    Pages2038-2043
    Number of pages6
    DOIs
    Publication statusPublished - 2008
    Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
    Duration: 2008 Nov 182008 Nov 21

    Publication series

    NameProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

    Other

    Other9th International Conference for Young Computer Scientists, ICYCS 2008
    Country/TerritoryChina
    CityZhang Jia Jie, Hunan
    Period08/11/1808/11/21

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Computer Science Applications
    • Education

    Fingerprint

    Dive into the research topics of 'Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks'. Together they form a unique fingerprint.

    Cite this