A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks.
Yassine MalehAbdellah EzzatiPublished in: CoRR (2014)
Keyphrases
- wireless networks
- wireless sensor networks
- intrusion detection and prevention
- malicious users
- denial of service attacks
- intrusion detection
- malicious nodes
- security threats
- secure routing
- network security
- key management
- security mechanisms
- computer security
- attack scenarios
- intrusion detection system
- resource constrained
- security protocols
- security breaches
- information security
- security problems
- network intrusion
- security measures
- intrusion prevention
- cyber attacks
- security vulnerabilities
- security issues
- dos attacks
- energy efficient
- countermeasures
- security risks
- sensor networks
- network intrusions
- energy consumption
- sensor nodes
- java card
- anomaly detection
- routing protocol
- chosen plaintext
- biological inspired
- malicious activities
- routing algorithm
- computer networks
- security flaws
- sensitive data
- malicious attacks
- fault injection
- wireless sensor
- residual energy
- key establishment
- stream cipher
- information leakage
- ddos attacks
- buffer overflow
- alert correlation
- network traffic
- sql injection
- network intrusion detection