loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jaeun Choi ; Myungjong Lee ; Gisung Kim and Sehun Kim

Affiliation: Korea Advanced Institute of Science and Technology, Korea, Republic of

Keyword(s): Intrusion detection, Congestion control, Wireless sensor network, Reliable sensor network.

Related Ontology Subjects/Areas/Topics: Cloud Computing ; Fairness Scheduling and Qos Guarantee ; Information and Systems Security ; Intrusion Detection & Prevention ; Network Security ; Reliability and Dependability ; Sensor and Mobile Ad Hoc Network Security ; Service and Systems Design and Qos Network Security ; Services Science

Abstract: Since wireless resources are limited, an efficient way of utilizing wireless resources is needed in selecting IDSs. We propose a monitoring node selection scheme for intrusion detection in congested wireless sensor network. Network congestion is an important issue in mobile network. The network congestion does not guarantee a proper detection rate and congested networks should cause an unreliable network. We consider congested intrusion detection tasks by queuing theory. We confirm that proposed algorithm guarantee QoS of monitoring tasks and reliable sensor networks.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.119.199

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Choi, J.; Lee, M.; Kim, G. and Kim, S. (2009). MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 117-120. DOI: 10.5220/0002225001170120

@conference{secrypt09,
author={Jaeun Choi. and Myungjong Lee. and Gisung Kim. and Sehun Kim.},
title={MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={117-120},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002225001170120},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK
SN - 978-989-674-005-4
IS - 2184-3236
AU - Choi, J.
AU - Lee, M.
AU - Kim, G.
AU - Kim, S.
PY - 2009
SP - 117
EP - 120
DO - 10.5220/0002225001170120
PB - SciTePress