In this research, we study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc networks through the lens of IPv6-enabled Wireless Sensor Actuator Networks. These networks consist of highly constrained devices able to communicate wirelessly in an ad-hoc fashion, thus following the architecture of ad-hoc networks. Current state of the art IDS in IoT and WSNs have been developed considering the architecture of conventional computer networks, and as such they do not efficiently address the paradigm of ad-hoc networks, which is highly relevant in emerging network paradigms, such as the Internet of Things (IoT). In this context, the network properties of resilience and redundancy have not been extensively studied. In this thesi...
Intrusion Detection systems plays a crucial role in detecting malicious activities that deteriorate ...
The Internet of Things (IoT) or IP-connected IoT has become an emerging technology that connects an ...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
We study efficient and lightweight Intrusion Detection Systems for Ad-Hoc networks via the prism of ...
We study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc net- works via the p...
Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing...
Routing protocol for Low power and lossy network (RPL) is a standardized optimal protocol for routin...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
6LoWPAN (IPv6 over Low-power Wireless Personal Area Network) is a standard developed by the Internet...
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny se...
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power,...
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network pe...
Security is a significant concern for many sensor network applications. Intrusion detection is one m...
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of dev...
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in considerable gr...
Intrusion Detection systems plays a crucial role in detecting malicious activities that deteriorate ...
The Internet of Things (IoT) or IP-connected IoT has become an emerging technology that connects an ...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...
We study efficient and lightweight Intrusion Detection Systems for Ad-Hoc networks via the prism of ...
We study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc net- works via the p...
Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing...
Routing protocol for Low power and lossy network (RPL) is a standardized optimal protocol for routin...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
6LoWPAN (IPv6 over Low-power Wireless Personal Area Network) is a standard developed by the Internet...
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny se...
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power,...
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network pe...
Security is a significant concern for many sensor network applications. Intrusion detection is one m...
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of dev...
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in considerable gr...
Intrusion Detection systems plays a crucial role in detecting malicious activities that deteriorate ...
The Internet of Things (IoT) or IP-connected IoT has become an emerging technology that connects an ...
Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a coo...