A Review on Intrusion Detection Schemes in Wireless Sensor Network?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 10)Publication Date: 2014-10-30
Authors : Nidhi Aley; Shruti Kolte;
Page : 810-813
Keywords : Watchdog; Insider threats; Trust mechanism; WSN; IDSs;
Abstract
Modern wireless sensor networks require specific and high degree of security due to their limitation and versatility tasks. Their limited computational ability and battery resources restrictions make them vulnerable to many kinds of attacks. Little real-world data is available about the insider threat. This ―insider threat‖ has received considerable attention, and is cited as one of the most serious security problems. The goal of this paper is to provide a detailed review about different techniques available for detecting an intrusion along with their characteristics and advantages.
Other Latest Articles
- PEDAGOGICAL POTENTIAL OF THE BASHKIR DECORATIVE AND APPLIED ARTS IN ARTISTIC AND AESTHETIC EDUCATION OF JUNIOR SCHOOLCHILDREN AT FINE ARTS LESSONS
- Prediction of Next Mobile Access Gateway (MAG) in Proxy Mobile Internet Protocol Version 6 (PMIPv6)?
- NEW WAYS TO ENSURE FINANCIAL DEVELOPMENT OF CONSUMER CO-OPERATIVES
- POWERS TERMINATION OF THE JUDGE OF THE RUSSIAN CONSTITUTIONAL COURT
- PROBLEMS OF THE ELECTORAL LAW AND MEANS OF SOLUTION
Last modified: 2014-10-29 18:37:20