Monitoring Behavior-Based Intrusion Detection System for 6LoWPAN Networks

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
Even when 6LoWPAN has an ideal cryptography line defense, it is still necessary to implement an Intrusion Detection System (IDS) to deal with threats targeting network performance such as DoS (Denial of Service) attacks. IDS discover and stop most attacks that make changes on the operation of the network. However, few IDS solution has been proposed for 6LoWPAN networks. IDS missions are to monitor and raise an alarm about any possible threats and pass it to the system to restart the keying process for eliminating the attackers. New technique has been proposed recently based on the principle that neighbor nodes have a trend to have the same behavior, so the detection of the malicious node is based on the detection of the abnormal node that has a bad behavior different than it neighbors.
Download Now

Find By Topic