Other formats:
BibTeX
LaTeX
RIS
@inproceedings{1127558, author = {Stehlík, Martin}, address = {Brno}, booktitle = {Security and Protection of Information 2013}, editor = {Jaroslav Dočkal, Milan Jirsa, Josef Kaderka}, keywords = {intrusion detection system; IDS; wireless sensor network; WSN; simulator; optimization; evolutionary algorithm}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Brno}, isbn = {978-80-7231-922-0}, pages = {119-124}, publisher = {University of Defence}, title = {Optimization of Intrusion Detection Systems for Wireless Sensor Networks Using Evolutionary Algorithms}, year = {2013} }
TY - JOUR ID - 1127558 AU - Stehlík, Martin PY - 2013 TI - Optimization of Intrusion Detection Systems for Wireless Sensor Networks Using Evolutionary Algorithms PB - University of Defence CY - Brno SN - 9788072319220 KW - intrusion detection system KW - IDS KW - wireless sensor network KW - WSN KW - simulator KW - optimization KW - evolutionary algorithm N2 - Wireless sensor networks (WSNs) are a type of ad hoc wireless networks with several specifics. WSNs consist of sensor nodes that monitor some environment and send measurements hop-by-hop to a base station (BS). Sensor nodes are low-cost devices highly restricted in their resources regarding to the size of memory, the microcontroller performance and last but not least the energy supply limited by the battery capacity. The concept of the WSNs opens an area for novel attacks. Active attacks, where the attacker manipulates communication, can be detected by an intrusion detection system (IDS) running on the sensor nodes in a distributive and collaborative manner. Since the IDS necessary brings an overhead to the computation and wireless communication of the sensor nodes, it should be deployed with respect to the restricted WSNs. Our goal is to optimize IDS parameters towards solutions suitable for various scenarios and to deal with trade-off between IDS accuracy and WSN performance and lifetime. We assume that a network operator of the WSN will be able to set IDS parameters according to current requirements. In this work, we show how multi-objective evolutionary algorithms can provide optimized solutions and assist with IDS settings. ER -
STEHLÍK, Martin. Optimization of Intrusion Detection Systems for Wireless Sensor Networks Using Evolutionary Algorithms. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. \textit{Security and Protection of Information 2013}. Brno: University of Defence, 2013, p.~119-124. ISBN~978-80-7231-922-0.
|