{"title":"遥感网络中的入侵检测系统综述","authors":"Reshali Crystal Rebello, Vasudeva Pai, K. Pai","doi":"10.1109/ICSSIT46314.2019.8987789","DOIUrl":null,"url":null,"abstract":"Wireless/Remote Sensor Networks (WSNs) contains sensor hubs and a base station. The role of sensor nodes is to acquire the data from the surrounding in which they are placed and then report the data to base station or sink. While the data gathering, data processing, data reporting and maintaining, it requires a lot of security measures for the data as well as motes(nodes) to be well protected from attacks. Intrusion detection systems (IDs) is a way to detect any anomalies or attacks in the network and also helps to tackle it. The paper focuses on the comparison of the types of intrusion detection systems used against the various attacks in WSNs.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Review: Intrusion Detection Systems in Remote Sensor Network\",\"authors\":\"Reshali Crystal Rebello, Vasudeva Pai, K. Pai\",\"doi\":\"10.1109/ICSSIT46314.2019.8987789\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless/Remote Sensor Networks (WSNs) contains sensor hubs and a base station. The role of sensor nodes is to acquire the data from the surrounding in which they are placed and then report the data to base station or sink. While the data gathering, data processing, data reporting and maintaining, it requires a lot of security measures for the data as well as motes(nodes) to be well protected from attacks. Intrusion detection systems (IDs) is a way to detect any anomalies or attacks in the network and also helps to tackle it. The paper focuses on the comparison of the types of intrusion detection systems used against the various attacks in WSNs.\",\"PeriodicalId\":330309,\"journal\":{\"name\":\"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSIT46314.2019.8987789\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSIT46314.2019.8987789","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review: Intrusion Detection Systems in Remote Sensor Network
Wireless/Remote Sensor Networks (WSNs) contains sensor hubs and a base station. The role of sensor nodes is to acquire the data from the surrounding in which they are placed and then report the data to base station or sink. While the data gathering, data processing, data reporting and maintaining, it requires a lot of security measures for the data as well as motes(nodes) to be well protected from attacks. Intrusion detection systems (IDs) is a way to detect any anomalies or attacks in the network and also helps to tackle it. The paper focuses on the comparison of the types of intrusion detection systems used against the various attacks in WSNs.