STEHLÍK, Martin, Václav MATYÁŠ and Andriy STETSKO. Towards better selective forwarding and delay attacks detection in wireless sensor networks. In 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC). Los Alamitos: IEEE Computer Society, 2016, p. 1-6. ISBN 978-1-4673-9975-3. Available from: https://dx.doi.org/10.1109/ICNSC.2016.7478978.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Towards better selective forwarding and delay attacks detection in wireless sensor networks
Authors STEHLÍK, Martin (203 Czech Republic, guarantor, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Andriy STETSKO (804 Ukraine, belonging to the institution).
Edition Los Alamitos, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC), p. 1-6, 6 pp. 2016.
Publisher IEEE Computer Society
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
Publication form storage medium (CD, DVD, flash disk)
WWW URL
RIV identification code RIV/00216224:14330/16:00087692
Organization unit Faculty of Informatics
ISBN 978-1-4673-9975-3
Doi http://dx.doi.org/10.1109/ICNSC.2016.7478978
UT WoS 000386326100097
Keywords in English Collaboration;Delays;Evolutionary computation;Intrusion detection;Monitoring;Optimization;Wireless sensor networks
Tags firank_B
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 14/5/2020 15:21.
Abstract
A number of intrusion detection techniques have been proposed to detect different kinds of active attacks on wireless sensor networks (WSNs). Selective forwarding and delay attacks are two simple but effective attacks that can disrupt the communication in WSNs. We propose two parametrized collaborative intrusion detection techniques and optimize their parameters for given scenarios using extensive simulations and multiobjective evolutionary algorithms. Moreover, we sample the whole search space to enable evaluation of evolution performance. We evaluate the influence of changes of the number of malicious nodes on the intrusion detection performance.
Links
VG20102014031, research and development projectName: Experimentální vývoj bezpečnostní softwarové platformy se systémem detekce průniku a režimy ochrany soukromí pro bezdrátové senzorové sítě (Acronym: WSNSec)
Investor: Ministry of the Interior of the CR
PrintDisplayed: 5/5/2024 16:17