PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Amin HassanzadehZhaoyan XuRadu StoleruGuofei GuMichalis PolychronakisPublished in: ICICS (2013)
Keyphrases
- intrusion detection
- resource constrained
- wireless mesh networks
- intrusion detection system
- wireless sensor networks
- sensor networks
- anomaly detection
- resource constraints
- network security
- network traffic
- key management
- information security
- security mechanisms
- real world
- wireless networks
- data mining
- multi hop
- multi channel
- security protocols
- ad hoc networks
- routing protocol
- embedded systems
- data mining techniques
- sensor nodes
- unsupervised learning
- data streams
- low cost
- data sets
- power supply