A Study on the Description of Centralized Systems and Decentralized Systems in Wireless Sensor Networks

Comparing Distributed and Standalone Intrusion Detection Systems for Wireless Sensor Networks

Authors

  • M. Jagadeeshwar
  • N. Satyanarayana

Keywords:

centralized systems, decentralized systems, wireless sensor networks, protective devices, key monitoring procedures, verification procedures, safe directing, breach discovery system, sensor node, IDS based protection mechanisms

Abstract

Protective devices like Key monitoring procedures, verification procedures and also safe directing cannot provide security to WSNs for these kinds of attacks. Breach discovery system is a solution to this trouble. It evaluations the network by collecting adequate amount of data and finds strange behavior of sensor node. IDS based protection mechanisms suggested for various other network models such as impromptu networks, cannot straight be made use of in WSNs. Scientists have actually suggested different invasion detection systems for wireless sensor networks throughout the last few years. Essentially these methods can be classified into 2 major classifications i.e. dispersed and stand alone.

Downloads

Published

2011-07-01

How to Cite

[1]
“A Study on the Description of Centralized Systems and Decentralized Systems in Wireless Sensor Networks: Comparing Distributed and Standalone Intrusion Detection Systems for Wireless Sensor Networks”, JASRAE, vol. 2, no. 1, pp. 0–0, Jul. 2011, Accessed: Jun. 08, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/3942

How to Cite

[1]
“A Study on the Description of Centralized Systems and Decentralized Systems in Wireless Sensor Networks: Comparing Distributed and Standalone Intrusion Detection Systems for Wireless Sensor Networks”, JASRAE, vol. 2, no. 1, pp. 0–0, Jul. 2011, Accessed: Jun. 08, 2025. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/3942