STETSKO, Andriy, Tobiáš SMOLKA, Václav MATYÁŠ and Martin STEHLÍK. Improving Intrusion Detection Systems for Wireless Sensor Networks. In Ioana Boureanu, Philippe Owesarski, Serge Vaudenay. Applied Cryptography and Network Security. Heidelberg: Springer, 2014, p. 343-360. ISBN 978-3-319-07535-8. Available from: https://dx.doi.org/10.1007/978-3-319-07536-5_21.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Improving Intrusion Detection Systems for Wireless Sensor Networks
Authors STETSKO, Andriy (804 Ukraine, guarantor, belonging to the institution), Tobiáš SMOLKA (703 Slovakia, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Martin STEHLÍK (203 Czech Republic, belonging to the institution).
Edition Heidelberg, Applied Cryptography and Network Security, p. 343-360, 18 pp. 2014.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form storage medium (CD, DVD, flash disk)
WWW Springer
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/14:00073679
Organization unit Faculty of Informatics
ISBN 978-3-319-07535-8
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-07536-5_21
Keywords in English Intrusion detection; optimization; wireless sensor networks
Tags best3, core_B, firank_A
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 27/4/2015 05:40.
Abstract
A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 19/9/2024 15:44