eBiltegia

    • Euskara
    • Español
    • English
  • Contact Us
  • English 
    • Euskara
    • Español
    • English
  • About eBiltegia  
    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Open Access institutional policy
    •   The Library compiles and disseminates your publications
  • Login
View Item 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Scientific production - Conferences
  • Conferences - Engineering
  • View Item
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Scientific production - Conferences
  • Conferences - Engineering
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Thumbnail
View/Open
Reputation-based intrusion detection system for wireless sensor networks.pdf (327.5Kb)
Full record
Impact

Web of Science   

Google Scholar
Microsoft Academic
Share
Save the reference
Mendely
Title
Reputation-based intrusion detection system for wireless sensor networks
Author
Uribeetxeberria, Roberto ccMondragon Unibertsitatea
Zurutuza, Urko ccMondragon Unibertsitatea
Arenaza-Nuño, Ignacio ccMondragon Unibertsitatea
Gerrigagoitia, KeldorMondragon Unibertsitatea
Research Group
Análisis de datos y ciberseguridad
Published Date
2012
Publisher
IEEE
Keywords
Wireless sensor networks
Intrusion Detection
Ad hoc networks
Wireless communication ... [+]
Wireless sensor networks
Intrusion Detection
Ad hoc networks
Wireless communication
Communication system security
Monitoring [-]
Abstract
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There ... [+]
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area. This study proposes a new IDS design based on reputation and trust of the different nodes of a network for decision-making and analysis of possible sources of malicious attacks. [-]
URI
https://hdl.handle.net/20.500.11984/5931
Publisher’s version
https://doi.org/10.1109/CompEng.2012.6242969
ISBN
978467316132
Published at
Proceedings of the 2nd IEEE Workshop on Complexity in Engineering (COMPENG)  Aachen. 11 -13 June. Pp.128-131
Document type
Conference paper
Version
Postprint – Accepted Manuscript
Rights
© 2012 IEEE
Access
Open Access
Collections
  • Conferences - Engineering [242]

Browse

All of eBiltegiaCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished atThis CollectionBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished at

My Account

LoginRegister

Statistics

View Usage Statistics

Harvested by:

OpenAIREBASE

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace
 

 

Harvested by:

OpenAIREBASE

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace