Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks.
Ranjeeth Kumar SundararajanUmamakeswari ArumugamPublished in: J. Sensors (2015)
Keyphrases
- detection algorithm
- wireless sensor networks
- denial of service attacks
- attack scenarios
- residual energy
- alert correlation
- intrusion detection system
- energy consumption
- reduce the energy consumption
- malicious users
- sensor networks
- energy efficient
- detection method
- detection accuracy
- key exchange protocol
- authentication protocol
- sensor nodes
- dos attacks
- detection rate
- node selection
- attack detection
- motion detection
- base station
- intrusion detection
- network security
- data aggregation
- communication protocol
- energy efficiency
- outlier detection
- malicious nodes
- routing algorithm
- cluster head
- corner detection
- feature detection
- data transmission
- routing protocol
- multi hop
- vehicle detection
- moving objects
- network lifetime
- ddos attacks
- mobile nodes
- harris corner
- key management
- wireless communication
- secret key
- data mining