Další formáty:
BibTeX
LaTeX
RIS
@inproceedings{1348290, author = {Stehlík, Martin and Matyáš, Václav and Stetsko, Andriy}, address = {Los Alamitos}, booktitle = {2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)}, doi = {http://dx.doi.org/10.1109/ICNSC.2016.7478978}, keywords = {Collaboration;Delays;Evolutionary computation;Intrusion detection;Monitoring;Optimization;Wireless sensor networks}, howpublished = {paměťový nosič}, language = {eng}, location = {Los Alamitos}, isbn = {978-1-4673-9975-3}, pages = {1-6}, publisher = {IEEE Computer Society}, title = {Towards better selective forwarding and delay attacks detection in wireless sensor networks}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7478978}, year = {2016} }
TY - JOUR ID - 1348290 AU - Stehlík, Martin - Matyáš, Václav - Stetsko, Andriy PY - 2016 TI - Towards better selective forwarding and delay attacks detection in wireless sensor networks PB - IEEE Computer Society CY - Los Alamitos SN - 9781467399753 KW - Collaboration;Delays;Evolutionary computation;Intrusion detection;Monitoring;Optimization;Wireless sensor networks UR - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7478978 L2 - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7478978 N2 - A number of intrusion detection techniques have been proposed to detect different kinds of active attacks on wireless sensor networks (WSNs). Selective forwarding and delay attacks are two simple but effective attacks that can disrupt the communication in WSNs. We propose two parametrized collaborative intrusion detection techniques and optimize their parameters for given scenarios using extensive simulations and multiobjective evolutionary algorithms. Moreover, we sample the whole search space to enable evaluation of evolution performance. We evaluate the influence of changes of the number of malicious nodes on the intrusion detection performance. ER -
STEHLÍK, Martin, Václav MATYÁŠ a Andriy STETSKO. Towards better selective forwarding and delay attacks detection in wireless sensor networks. In \textit{2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)}. Los Alamitos: IEEE Computer Society, 2016, s.~1-6. ISBN~978-1-4673-9975-3. Dostupné z: https://dx.doi.org/10.1109/ICNSC.2016.7478978.
|