Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for han...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:ETRI journal Ročník 38; číslo 6; s. 1145 - 1152
Hlavní autoři: Gowri, Muthukrishnan, Paramasivan, Balasubramanian
Médium: Journal Article
Jazyk:angličtina
Vydáno: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016
한국전자통신연구원
Témata:
ISSN:1225-6463, 2233-7326
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain pre‐defined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.
AbstractList Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rulebased anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN. KCI Citation Count: 2
Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain pre‐defined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.
Author Gowri, Muthukrishnan
Paramasivan, Balasubramanian
Author_xml – sequence: 1
  givenname: Muthukrishnan
  surname: Gowri
  fullname: Gowri, Muthukrishnan
  email: gowrim1078@gmail.com
– sequence: 2
  givenname: Balasubramanian
  surname: Paramasivan
  fullname: Paramasivan, Balasubramanian
  email: paramasivanb46@yahoo.com
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqNkMtOwkAUhidGExF9AVfduijOtZ0uES-QEE0Q4spMhukpDpSOzpQQdj6Cz-iTSIGVC-Pqz0nOd_6c7wwdV64ChC4J7nBK5DXU3s47JOlgQkQHp5k4Qi1KGYtTRpNj1CKUijjhCTtFZyHMMaaYC9lCr6NVCd-fXzc6QB51K7fU5Sa6hRpMbV0VjcG8VfZjBdEk2GoWjZxeNtnf9m_eXR2iwvnoxXooIYToGaqwnR-hXju_COfopNBlgItDttHk_m7c68fDp4dBrzuMDUu5iKeZmYqc44IRSIQGDtqwHMsCczZNWJrlacG0lHkupnkmMwo5lzI1xGQMUo1ZG13t71a-UAtjldN2lzOnFl51R-OBIjTDTGbbXbnfNd6F4KFQxta6ebb22paKYNUoVTuliiSqUaoapVuU_kLfvV1qv_kbOvStbQmbfxDqbjyihHDBfgBpsZE5
CitedBy_id crossref_primary_10_1109_TETC_2022_3184112
crossref_primary_10_1016_j_engappai_2024_108996
crossref_primary_10_1155_2021_6699313
crossref_primary_10_1109_TNSE_2023_3333230
Cites_doi 10.1109/JSYST.2012.2223531
10.1109/SURV.2012.121912.00006
10.1016/j.measurement.2014.04.034
10.1049/iet-wss.2011.0064
10.1016/j.jcss.2013.06.016
10.3390/s130810087
10.1109/TPDS.2014.2308198
10.1016/j.jcss.2013.06.017
10.1049/iet-ifs.2012.0052
10.1109/TCOMM.2012.031912.110179
10.1155/2014/348606
ContentType Journal Article
Copyright 2016 ETRI
Copyright_xml – notice: 2016 ETRI
DBID AAYXX
CITATION
ACYCR
DOI 10.4218/etrij.16.0115.0795
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 1152
ExternalDocumentID oai_kci_go_kr_ARTI_1290389
10_4218_etrij_16_0115_0795
ETR21145
Genre article
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAMMB
AAYXX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
OVT
ID FETCH-LOGICAL-c3745-b9cb5d40f31e65ae4eac3d08f043b6379d7f3a88dd5bd9892ed4887c1c93e7a03
IEDL.DBID WIN
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000391851700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1225-6463
IngestDate Sat Oct 25 08:02:05 EDT 2025
Tue Nov 18 21:15:02 EST 2025
Sat Nov 29 03:21:26 EST 2025
Wed Jan 22 16:55:43 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License http://doi.wiley.com/10.1002/tdm_license_1.1
http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3745-b9cb5d40f31e65ae4eac3d08f043b6379d7f3a88dd5bd9892ed4887c1c93e7a03
Notes is with the Department of Information Technology, Sethu Institute of Technology, Kariapatti, India.
is with the Department of Computer Science and Engineering, National Engineering College, Kovilpatti, India.
paramasivanb46@yahoo.com
Balasubramanian Paramasivan
gowrim1078@gmail.com
Muthukrishnan Gowri (corresponding author
https://etrij.etri.re.kr/etrij/journal/article/article.do?volume=38&issue=6&page=1145
G704-001110.2016.38.6.018
OpenAccessLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446
PageCount 8
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_1290389
crossref_citationtrail_10_4218_etrij_16_0115_0795
crossref_primary_10_4218_etrij_16_0115_0795
wiley_primary_10_4218_etrij_16_0115_0795_ETR21145
PublicationCentury 2000
PublicationDate December 2016
2016-12-00
2016-12
PublicationDateYYYYMMDD 2016-12-01
PublicationDate_xml – month: 12
  year: 2016
  text: December 2016
PublicationDecade 2010
PublicationTitle ETRI journal
PublicationYear 2016
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 2012; 2
2013; 15
2013; 26
2014; 80
2013; 69
2014; 2014
2013; 2
2013; 7
2013; 13
2014; 55
2014; 10
2012; 9
Bao (10.4218/etrij.16.0115.0795-BIB013|cr013) 2012; 9
Shamshirband (10.4218/etrij.16.0115.0795-BIB008|cr008) 2014; 55
Shamsh (10.4218/etrij.16.0115.0795-BIB005|cr005) 2013; 69
10.4218/etrij.16.0115.0795-BIB016|cr016
Han (10.4218/etrij.16.0115.0795-BIB007|cr007) 2013; 7
Jokhio (10.4218/etrij.16.0115.0795-BIB001|cr001) 2012; 2
Abduvaliyev (10.4218/etrij.16.0115.0795-BIB004|cr004) 2013; 15
Bhojannawar (10.4218/etrij.16.0115.0795-BIB010|cr010) 2013; 2
Karapistoli (10.4218/etrij.16.0115.0795-BIB012|cr012) 2014; 2014
Canovas (10.4218/etrij.16.0115.0795-BIB011|cr011) 2014; 10
Conti (10.4218/etrij.16.0115.0795-BIB002|cr002) 2014; 80
Abduvaliyev (10.4218/etrij.16.0115.0795-BIB009|cr009) 2013; 15
Xie (10.4218/etrij.16.0115.0795-BIB015|cr015) 2013; 26
Shafiei (10.4218/etrij.16.0115.0795-BIB003|cr003) 2014; 80
Rassam (10.4218/etrij.16.0115.0795-BIB006|cr006) 2013; 13
Sun (10.4218/etrij.16.0115.0795-BIB014|cr014) 2013; 7
References_xml – volume: 2
  start-page: 161
  issue: 3
  year: 2012
  end-page: 169
  article-title: “Node Capture Attack Detection and Defence in Wireless Sensor Networks,”
  publication-title: IET Wireless Sensor Syst.
– volume: 15
  start-page: 1223
  issue: 3
  year: 2013
  end-page: 1237
  article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,”
  publication-title: IEEE Commun. Surveys Tuts.
– volume: 7
  start-page: 13
  issue: 1
  year: 2013
  end-page: 25
  article-title: “Anomaly Detection Based Secure In‐network Aggregation for Wireless Sensor Networks,”
  publication-title: IEEE Syst. J.
– volume: 80
  start-page: 654
  issue: 3
  year: 2014
  end-page: 669
  article-title: “Clonewars: Distributed Detection of Clone Attacks in Mobile WSNs,”
  publication-title: J. Comput. Syst. Sci.
– volume: 69
  issue: 23
  year: 2013
  article-title: “Roaming Honeypots along with IDS in Mobile Ad‐Hoc Networks,”
  publication-title: Int. J. Comput. Appl.
– volume: 10
  start-page: 1
  issue: 7
  year: 2014
  end-page: 7
  article-title: “Web Spider Defense Technique in Wireless Sensor Networks,”
  publication-title: Int. J. Distrib. Sensor Netw.
– volume: 9
  start-page: 169
  issue: 2
  year: 2012
  end-page: 183
  article-title: “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust‐Based Routing and Intrusion Detection,”
  publication-title: IEEE Trans. Netw. Service Manag.
– volume: 13
  start-page: 10087
  issue: 8
  year: 2013
  end-page: 10122
  article-title: “Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: a Survey and Open Issues,”
  publication-title: Sensors
– volume: 55
  start-page: 212
  year: 2014
  end-page: 226
  article-title: “D‐FICCA: A Density‐based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks,”
  publication-title: Meas.
– volume: 26
  start-page: 574
  issue: 2
  year: 2013
  end-page: 583
  article-title: “Segment‐Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks,”
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 2014
  issue: 3
  year: 2014
  article-title: “ADLU: a Novel Anomaly Detection and Location‐Attribution Algorithm for UWB Wireless Sensor Networks,”
  publication-title: EURASIP J. Inform. Security
– volume: 7
  start-page: 97
  issue: 2
  year: 2013
  end-page: 105
  article-title: “IDSEP: a Novel Intrusion Detection Scheme Based on Energy Prediction in Cluster‐based Wireless Sensor Networks,”
  publication-title: IET Inform. Security
– volume: 2
  issue: 10
  year: 2013
  article-title: “Anomaly Detection Techniques for Wireless Sensor Networks ‐ a Survey,”
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– volume: 80
  start-page: 644
  issue: 3
  year: 2014
  end-page: 653
  article-title: “Detection and Mitigation of Dink Hole Sttacks in Wireless Sensor Networks,”
  publication-title: J. Comput, Syst. Sci.
– ident: 10.4218/etrij.16.0115.0795-BIB016|cr016
– volume: 2
  issue: 10
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB010|cr010
  article-title: “Anomaly Detection Techniques for Wireless Sensor Networks - a Survey,”
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– volume: 7
  start-page: 13
  issue: 1
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB014|cr014
  article-title: “Anomaly Detection Based Secure In-network Aggregation for Wireless Sensor Networks,”
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2012.2223531
– volume: 15
  start-page: 1223
  issue: 3
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB009|cr009
  article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,”
  publication-title: IEEE Commun. Surveys Tuts.
  doi: 10.1109/SURV.2012.121912.00006
– volume: 69
  issue: 23
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB005|cr005
  article-title: “Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks,”
  publication-title: Int. J. Comput. Appl.
– volume: 55
  start-page: 212
  year: 2014
  ident: 10.4218/etrij.16.0115.0795-BIB008|cr008
  article-title: “D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks,”
  publication-title: Meas.
  doi: 10.1016/j.measurement.2014.04.034
– volume: 2014
  issue: 3
  year: 2014
  ident: 10.4218/etrij.16.0115.0795-BIB012|cr012
  article-title: “ADLU: a Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks,”
  publication-title: EURASIP J. Inform. Security
– volume: 15
  start-page: 1223
  issue: 3
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB004|cr004
  article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,”
  publication-title: IEEE Commun. Surveys Tuts.
  doi: 10.1109/SURV.2012.121912.00006
– volume: 2
  start-page: 161
  issue: 3
  year: 2012
  ident: 10.4218/etrij.16.0115.0795-BIB001|cr001
  article-title: “Node Capture Attack Detection and Defence in Wireless Sensor Networks,”
  publication-title: IET Wireless Sensor Syst.
  doi: 10.1049/iet-wss.2011.0064
– volume: 80
  start-page: 644
  issue: 3
  year: 2014
  ident: 10.4218/etrij.16.0115.0795-BIB003|cr003
  article-title: “Detection and Mitigation of Dink Hole Sttacks in Wireless Sensor Networks,”
  publication-title: J. Comput, Syst. Sci.
  doi: 10.1016/j.jcss.2013.06.016
– volume: 13
  start-page: 10087
  issue: 8
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB006|cr006
  article-title: “Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: a Survey and Open Issues,”
  publication-title: Sensors
  doi: 10.3390/s130810087
– volume: 26
  start-page: 574
  issue: 2
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB015|cr015
  article-title: “Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks,”
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2014.2308198
– volume: 80
  start-page: 654
  issue: 3
  year: 2014
  ident: 10.4218/etrij.16.0115.0795-BIB002|cr002
  article-title: “Clonewars: Distributed Detection of Clone Attacks in Mobile WSNs,”
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2013.06.017
– volume: 7
  start-page: 97
  issue: 2
  year: 2013
  ident: 10.4218/etrij.16.0115.0795-BIB007|cr007
  article-title: “IDSEP: a Novel Intrusion Detection Scheme Based on Energy Prediction in Cluster-based Wireless Sensor Networks,”
  publication-title: IET Inform. Security
  doi: 10.1049/iet-ifs.2012.0052
– volume: 9
  start-page: 169
  issue: 2
  year: 2012
  ident: 10.4218/etrij.16.0115.0795-BIB013|cr013
  article-title: “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection,”
  publication-title: IEEE Trans. Netw. Service Manag.
  doi: 10.1109/TCOMM.2012.031912.110179
– volume: 10
  start-page: 1
  issue: 7
  year: 2014
  ident: 10.4218/etrij.16.0115.0795-BIB011|cr011
  article-title: “Web Spider Defense Technique in Wireless Sensor Networks,”
  publication-title: Int. J. Distrib. Sensor Netw.
  doi: 10.1155/2014/348606
SSID ssj0020458
Score 2.0917912
Snippet Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a...
SourceID nrf
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 1145
SubjectTerms Authentication
Cryptography
Detection technique
Honeypots
Real‐time data
Wireless Sensor Network (WSN)
전자/정보통신공학
Title Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.16.0115.0795
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446
Volume 38
WOSCitedRecordID wos000391851700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2016, 38(6), , pp.1145-1152
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: WIN
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS-QwEA-e-OA9-HV36HknQXyTartJm-TROxUFWWRdT18ktPmQxbWVbj3w7f6E-xv9S5xJdxdFEDnuKRSakM5kZn6TzgchW4BAJc8ZyHfc8eCgeB8pkySR9U6YjgMjG4Ixf52IbldeXqrTGbI_yYVp60NML9xQMoK-RgHPi9CFhINVQiY29QAEPdtBULMTC4WZ5glPsI3BxXF36nXhn0D0uuDgRhnPWJs5g4vsvl7ihXX6UNb-JWYNRudw8f9sd4ksjEEn3WtPyTKZceUK-fisFOEnctW7H7rHP39_gFWzdK-sbvPhA913TQjVKml_UuuVhiAD2qvyWxyPqtI93FXNiAL6pRhLOwTdSc_AO4bnbhtkPvpMzg8P-j-PonHrhcgwwdOoUKZILbCOJS5Lc8dBPzMbSx9zVmRMKCs8y6W0Ni2skqrjLGgCYRKjmBN5zL6Q2RI2sEpoR3lRCOXzAlub8Fg69DkBWVopnXVijSQTkmszrkuO7TGGGvwTJJ4OpNNJppF0Gkm3Rranc-7aqhxvvr0JnNQ3ZqCxmDaO15W-qTW4DMcaL-IAtcE2AvvesZ4-6PfgG3j69R_mrJN5wFxZGxHzjcw29b37TubM72YwqjfC0X0Cv_zxYA
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB_aKqgPfov1cxHfJG1yu8nuPla9codnkPPUvsiS7IccvSYllwp980_wb_QvcSa5OyyCiPi0BLLLZmZn5jeT2RmA54hAlSg4ync8COighBBpmySRC17agUcj2yVjfpzIPFdHR_rdFgzXd2H6-hCbgBtJRqevScApIE1SLtAsERfbZo6Snu0RqtmLpU634ZJAxEEdHD6N843fRf8Cye_CoxtlIuP93RlaZf_3NS7Yp-2qCRdRa2d2Dm_8pw3fhOsr3MkO-oNyC7Z8dRuu_VKN8A58np4t_I9v31-iYXPsoKpPisU5e-3bLlurYrN1uVfW5RmwaV2c0DiqK39-WrdLhgCYUTrtAtUne48OMj7nfZ758i58OBzOXo2iVfeFyHIp0qjUtkwdco8nPksLL1BFcxerEAteZlxqJwMvlHIuLZ1WeuAdKgNpE6u5l0XM78FOhRu4D2yggyylDkVJ3U1ErDy5nQgunVLeebkLyZrmxq5Kk1OHjIVBF4WIZzrSmSQzRDpDpNuFF5s5p31hjj--_QxZaY7t3FA9bRq_1Oa4Meg1jA3F4hC44TY6_v3FemY4m-I3iPTBP8x5CldGs7cTMxnnbx7CVYRgWZ8g8wh22ubMP4bL9ms7XzZPunP8E92X9X4
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB_aKqIPfov1cxHfJG1yu8nuPlZ7Rw9LKOcpfZEl2Q85ek2OXCr0zT_Bv9G_xJnk7rAIIuLTEsgum5mdmd9vMzsL8BoRqBIFR_uOBwEJSgiRtkkSueClHXgMsl0y5qdjmefq9FSfbMFwfRamrw-x2XAjy-j8NRm4X7hAVi4wLJEW22aGlp7tEarZi6VOt-GayJCY08GScb7hXfQvkHgXLt0oExnvz87QKPu_j3ElPm1XTbiKWruwM7rznyZ8F26vcCc76BfKPdjy1X249Us1wgfweXIx9z--fX-Lgc2xg6o-L-aX7NC3XbZWxabrcq-syzNgk7o4p_aorvzlom6XDAEwo3TaObpP9gEJMj7nfZ758iF8HA2n746i1e0LkeVSpFGpbZk61B5PfJYWXqCL5i5WIRa8zLjUTgZeKOVcWjqt9MA7dAbSJlZzL4uYP4KdCifwGNhAB1lKHYqSbjcRsfJEOxFcOqW883IXkrXMjV2VJqcbMuYGKQoJz3SiM0lmSHSGRLcLbzZ9Fn1hjj--_QpVac7szFA9bWq_1OasMcgaxob24hC44TQ6_f3FeGY4neA3iPTJP_R5CTdODkfmeJy_fwo3EYFlfX7MM9hpmwv_HK7br-1s2bzolvFPkPz1Ag
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rule-Based+Anomaly+Detection+Technique+Using+Roaming+Honeypots+for+Wireless+Sensor+Networks&rft.jtitle=ETRI+journal&rft.au=Gowri%2C+Muthukrishnan&rft.au=Paramasivan%2C+Balasubramanian&rft.date=2016-12-01&rft.issn=1225-6463&rft.volume=38&rft.issue=6&rft.spage=1145&rft.epage=1152&rft_id=info:doi/10.4218%2Fetrij.16.0115.0795&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_16_0115_0795
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon