Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of intrusion. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. In this thesis, we proposed a novel scheme that is based on distributed intrusion detection system. The individual IDS agent is placed in every node. Each IDS agent runs independently. If anomaly is detected in the local data, neighbouring IDS agents can cooperatively participate in global intrusion detection process. Here we have focus on detection of two types of attacks: sequence no. attack and flooding attack in AODV protocol. Simulation results show that our proposed intrusion detection system can effectively detect compromised node.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 11,00 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of intrusion. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. In this thesis, we proposed a novel scheme that is based on distributed intrusion detection system. The individual IDS agent is placed in every node. Each IDS agent runs independently. If anomaly is detected in the local data, neighbouring IDS agents can cooperatively participate in global intrusion detection process. Here we have focus on detection of two types of attacks: sequence no. attack and flooding attack in AODV protocol. Simulation results show that our proposed intrusion detection system can effectively detect compromised node. 56 pp. Englisch. Nº de ref. del artículo: 9786139453863
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of intrusion. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. In this thesis, we proposed a novel scheme that is based on distributed intrusion detection system. The individual IDS agent is placed in every node. Each IDS agent runs independently. If anomaly is detected in the local data, neighbouring IDS agents can cooperatively participate in global intrusion detection process. Here we have focus on detection of two types of attacks: sequence no. attack and flooding attack in AODV protocol. Simulation results show that our proposed intrusion detection system can effectively detect compromised node. Nº de ref. del artículo: 9786139453863
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of. Nº de ref. del artículo: 583974113
Cantidad disponible: Más de 20 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 26395825832
Cantidad disponible: 4 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Print on Demand. Nº de ref. del artículo: 400584055
Cantidad disponible: 4 disponibles
Librería: Biblios, Frankfurt am main, HESSE, Alemania
Condición: New. PRINT ON DEMAND. Nº de ref. del artículo: 18395825826
Cantidad disponible: 4 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of intrusion. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. In this thesis, we proposed a novel scheme that is based on distributed intrusion detection system. The individual IDS agent is placed in every node. Each IDS agent runs independently. If anomaly is detected in the local data, neighbouring IDS agents can cooperatively participate in global intrusion detection process. Here we have focus on detection of two types of attacks: sequence no. attack and flooding attack in AODV protocol. Simulation results show that our proposed intrusion detection system can effectively detect compromised node.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Englisch. Nº de ref. del artículo: 9786139453863
Cantidad disponible: 2 disponibles