Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. D'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.

Original languageEnglish
Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
Pages2038-2043
Number of pages6
DOIs
Publication statusPublished - 2008 Dec 1
Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
Duration: 2008 Nov 182008 Nov 21

Publication series

NameProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

Other

Other9th International Conference for Young Computer Scientists, ICYCS 2008
CountryChina
CityZhang Jia Jie, Hunan
Period08/11/1808/11/21

    Fingerprint

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Education

Cite this

Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J., & Lee, H. (2008). Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. In Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008 (pp. 2038-2043). [4709287] (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008). https://doi.org/10.1109/ICYCS.2008.489