Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks
Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for han...
Uloženo v:
| Vydáno v: | ETRI journal Ročník 38; číslo 6; s. 1145 - 1152 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Electronics and Telecommunications Research Institute (ETRI)
01.12.2016
한국전자통신연구원 |
| Témata: | |
| ISSN: | 1225-6463, 2233-7326 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain pre‐defined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN. |
|---|---|
| AbstractList | Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rulebased anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN. KCI Citation Count: 2 Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain pre‐defined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN. |
| Author | Gowri, Muthukrishnan Paramasivan, Balasubramanian |
| Author_xml | – sequence: 1 givenname: Muthukrishnan surname: Gowri fullname: Gowri, Muthukrishnan email: gowrim1078@gmail.com – sequence: 2 givenname: Balasubramanian surname: Paramasivan fullname: Paramasivan, Balasubramanian email: paramasivanb46@yahoo.com |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqNkMtOwkAUhidGExF9AVfduijOtZ0uES-QEE0Q4spMhukpDpSOzpQQdj6Cz-iTSIGVC-Pqz0nOd_6c7wwdV64ChC4J7nBK5DXU3s47JOlgQkQHp5k4Qi1KGYtTRpNj1CKUijjhCTtFZyHMMaaYC9lCr6NVCd-fXzc6QB51K7fU5Sa6hRpMbV0VjcG8VfZjBdEk2GoWjZxeNtnf9m_eXR2iwvnoxXooIYToGaqwnR-hXju_COfopNBlgItDttHk_m7c68fDp4dBrzuMDUu5iKeZmYqc44IRSIQGDtqwHMsCczZNWJrlacG0lHkupnkmMwo5lzI1xGQMUo1ZG13t71a-UAtjldN2lzOnFl51R-OBIjTDTGbbXbnfNd6F4KFQxta6ebb22paKYNUoVTuliiSqUaoapVuU_kLfvV1qv_kbOvStbQmbfxDqbjyihHDBfgBpsZE5 |
| CitedBy_id | crossref_primary_10_1109_TETC_2022_3184112 crossref_primary_10_1016_j_engappai_2024_108996 crossref_primary_10_1155_2021_6699313 crossref_primary_10_1109_TNSE_2023_3333230 |
| Cites_doi | 10.1109/JSYST.2012.2223531 10.1109/SURV.2012.121912.00006 10.1016/j.measurement.2014.04.034 10.1049/iet-wss.2011.0064 10.1016/j.jcss.2013.06.016 10.3390/s130810087 10.1109/TPDS.2014.2308198 10.1016/j.jcss.2013.06.017 10.1049/iet-ifs.2012.0052 10.1109/TCOMM.2012.031912.110179 10.1155/2014/348606 |
| ContentType | Journal Article |
| Copyright | 2016 ETRI |
| Copyright_xml | – notice: 2016 ETRI |
| DBID | AAYXX CITATION ACYCR |
| DOI | 10.4218/etrij.16.0115.0795 |
| DatabaseName | CrossRef Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2233-7326 |
| EndPage | 1152 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_1290389 10_4218_etrij_16_0115_0795 ETR21145 |
| Genre | article |
| GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAMMB AAYXX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION OVT |
| ID | FETCH-LOGICAL-c3745-b9cb5d40f31e65ae4eac3d08f043b6379d7f3a88dd5bd9892ed4887c1c93e7a03 |
| IEDL.DBID | WIN |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000391851700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1225-6463 |
| IngestDate | Sat Oct 25 08:02:05 EDT 2025 Tue Nov 18 21:15:02 EST 2025 Sat Nov 29 03:21:26 EST 2025 Wed Jan 22 16:55:43 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Language | English |
| License | http://doi.wiley.com/10.1002/tdm_license_1.1 http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3745-b9cb5d40f31e65ae4eac3d08f043b6379d7f3a88dd5bd9892ed4887c1c93e7a03 |
| Notes | is with the Department of Information Technology, Sethu Institute of Technology, Kariapatti, India. is with the Department of Computer Science and Engineering, National Engineering College, Kovilpatti, India. paramasivanb46@yahoo.com Balasubramanian Paramasivan gowrim1078@gmail.com Muthukrishnan Gowri (corresponding author https://etrij.etri.re.kr/etrij/journal/article/article.do?volume=38&issue=6&page=1145 G704-001110.2016.38.6.018 |
| OpenAccessLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446 |
| PageCount | 8 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_1290389 crossref_citationtrail_10_4218_etrij_16_0115_0795 crossref_primary_10_4218_etrij_16_0115_0795 wiley_primary_10_4218_etrij_16_0115_0795_ETR21145 |
| PublicationCentury | 2000 |
| PublicationDate | December 2016 2016-12-00 2016-12 |
| PublicationDateYYYYMMDD | 2016-12-01 |
| PublicationDate_xml | – month: 12 year: 2016 text: December 2016 |
| PublicationDecade | 2010 |
| PublicationTitle | ETRI journal |
| PublicationYear | 2016 |
| Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
| Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
| References | 2012; 2 2013; 15 2013; 26 2014; 80 2013; 69 2014; 2014 2013; 2 2013; 7 2013; 13 2014; 55 2014; 10 2012; 9 Bao (10.4218/etrij.16.0115.0795-BIB013|cr013) 2012; 9 Shamshirband (10.4218/etrij.16.0115.0795-BIB008|cr008) 2014; 55 Shamsh (10.4218/etrij.16.0115.0795-BIB005|cr005) 2013; 69 10.4218/etrij.16.0115.0795-BIB016|cr016 Han (10.4218/etrij.16.0115.0795-BIB007|cr007) 2013; 7 Jokhio (10.4218/etrij.16.0115.0795-BIB001|cr001) 2012; 2 Abduvaliyev (10.4218/etrij.16.0115.0795-BIB004|cr004) 2013; 15 Bhojannawar (10.4218/etrij.16.0115.0795-BIB010|cr010) 2013; 2 Karapistoli (10.4218/etrij.16.0115.0795-BIB012|cr012) 2014; 2014 Canovas (10.4218/etrij.16.0115.0795-BIB011|cr011) 2014; 10 Conti (10.4218/etrij.16.0115.0795-BIB002|cr002) 2014; 80 Abduvaliyev (10.4218/etrij.16.0115.0795-BIB009|cr009) 2013; 15 Xie (10.4218/etrij.16.0115.0795-BIB015|cr015) 2013; 26 Shafiei (10.4218/etrij.16.0115.0795-BIB003|cr003) 2014; 80 Rassam (10.4218/etrij.16.0115.0795-BIB006|cr006) 2013; 13 Sun (10.4218/etrij.16.0115.0795-BIB014|cr014) 2013; 7 |
| References_xml | – volume: 2 start-page: 161 issue: 3 year: 2012 end-page: 169 article-title: “Node Capture Attack Detection and Defence in Wireless Sensor Networks,” publication-title: IET Wireless Sensor Syst. – volume: 15 start-page: 1223 issue: 3 year: 2013 end-page: 1237 article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,” publication-title: IEEE Commun. Surveys Tuts. – volume: 7 start-page: 13 issue: 1 year: 2013 end-page: 25 article-title: “Anomaly Detection Based Secure In‐network Aggregation for Wireless Sensor Networks,” publication-title: IEEE Syst. J. – volume: 80 start-page: 654 issue: 3 year: 2014 end-page: 669 article-title: “Clonewars: Distributed Detection of Clone Attacks in Mobile WSNs,” publication-title: J. Comput. Syst. Sci. – volume: 69 issue: 23 year: 2013 article-title: “Roaming Honeypots along with IDS in Mobile Ad‐Hoc Networks,” publication-title: Int. J. Comput. Appl. – volume: 10 start-page: 1 issue: 7 year: 2014 end-page: 7 article-title: “Web Spider Defense Technique in Wireless Sensor Networks,” publication-title: Int. J. Distrib. Sensor Netw. – volume: 9 start-page: 169 issue: 2 year: 2012 end-page: 183 article-title: “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust‐Based Routing and Intrusion Detection,” publication-title: IEEE Trans. Netw. Service Manag. – volume: 13 start-page: 10087 issue: 8 year: 2013 end-page: 10122 article-title: “Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: a Survey and Open Issues,” publication-title: Sensors – volume: 55 start-page: 212 year: 2014 end-page: 226 article-title: “D‐FICCA: A Density‐based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks,” publication-title: Meas. – volume: 26 start-page: 574 issue: 2 year: 2013 end-page: 583 article-title: “Segment‐Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks,” publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 2014 issue: 3 year: 2014 article-title: “ADLU: a Novel Anomaly Detection and Location‐Attribution Algorithm for UWB Wireless Sensor Networks,” publication-title: EURASIP J. Inform. Security – volume: 7 start-page: 97 issue: 2 year: 2013 end-page: 105 article-title: “IDSEP: a Novel Intrusion Detection Scheme Based on Energy Prediction in Cluster‐based Wireless Sensor Networks,” publication-title: IET Inform. Security – volume: 2 issue: 10 year: 2013 article-title: “Anomaly Detection Techniques for Wireless Sensor Networks ‐ a Survey,” publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – volume: 80 start-page: 644 issue: 3 year: 2014 end-page: 653 article-title: “Detection and Mitigation of Dink Hole Sttacks in Wireless Sensor Networks,” publication-title: J. Comput, Syst. Sci. – ident: 10.4218/etrij.16.0115.0795-BIB016|cr016 – volume: 2 issue: 10 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB010|cr010 article-title: “Anomaly Detection Techniques for Wireless Sensor Networks - a Survey,” publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – volume: 7 start-page: 13 issue: 1 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB014|cr014 article-title: “Anomaly Detection Based Secure In-network Aggregation for Wireless Sensor Networks,” publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2012.2223531 – volume: 15 start-page: 1223 issue: 3 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB009|cr009 article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,” publication-title: IEEE Commun. Surveys Tuts. doi: 10.1109/SURV.2012.121912.00006 – volume: 69 issue: 23 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB005|cr005 article-title: “Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks,” publication-title: Int. J. Comput. Appl. – volume: 55 start-page: 212 year: 2014 ident: 10.4218/etrij.16.0115.0795-BIB008|cr008 article-title: “D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks,” publication-title: Meas. doi: 10.1016/j.measurement.2014.04.034 – volume: 2014 issue: 3 year: 2014 ident: 10.4218/etrij.16.0115.0795-BIB012|cr012 article-title: “ADLU: a Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks,” publication-title: EURASIP J. Inform. Security – volume: 15 start-page: 1223 issue: 3 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB004|cr004 article-title: “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,” publication-title: IEEE Commun. Surveys Tuts. doi: 10.1109/SURV.2012.121912.00006 – volume: 2 start-page: 161 issue: 3 year: 2012 ident: 10.4218/etrij.16.0115.0795-BIB001|cr001 article-title: “Node Capture Attack Detection and Defence in Wireless Sensor Networks,” publication-title: IET Wireless Sensor Syst. doi: 10.1049/iet-wss.2011.0064 – volume: 80 start-page: 644 issue: 3 year: 2014 ident: 10.4218/etrij.16.0115.0795-BIB003|cr003 article-title: “Detection and Mitigation of Dink Hole Sttacks in Wireless Sensor Networks,” publication-title: J. Comput, Syst. Sci. doi: 10.1016/j.jcss.2013.06.016 – volume: 13 start-page: 10087 issue: 8 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB006|cr006 article-title: “Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: a Survey and Open Issues,” publication-title: Sensors doi: 10.3390/s130810087 – volume: 26 start-page: 574 issue: 2 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB015|cr015 article-title: “Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks,” publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2014.2308198 – volume: 80 start-page: 654 issue: 3 year: 2014 ident: 10.4218/etrij.16.0115.0795-BIB002|cr002 article-title: “Clonewars: Distributed Detection of Clone Attacks in Mobile WSNs,” publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2013.06.017 – volume: 7 start-page: 97 issue: 2 year: 2013 ident: 10.4218/etrij.16.0115.0795-BIB007|cr007 article-title: “IDSEP: a Novel Intrusion Detection Scheme Based on Energy Prediction in Cluster-based Wireless Sensor Networks,” publication-title: IET Inform. Security doi: 10.1049/iet-ifs.2012.0052 – volume: 9 start-page: 169 issue: 2 year: 2012 ident: 10.4218/etrij.16.0115.0795-BIB013|cr013 article-title: “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection,” publication-title: IEEE Trans. Netw. Service Manag. doi: 10.1109/TCOMM.2012.031912.110179 – volume: 10 start-page: 1 issue: 7 year: 2014 ident: 10.4218/etrij.16.0115.0795-BIB011|cr011 article-title: “Web Spider Defense Technique in Wireless Sensor Networks,” publication-title: Int. J. Distrib. Sensor Netw. doi: 10.1155/2014/348606 |
| SSID | ssj0020458 |
| Score | 2.0917912 |
| Snippet | Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a... |
| SourceID | nrf crossref wiley |
| SourceType | Open Website Enrichment Source Index Database Publisher |
| StartPage | 1145 |
| SubjectTerms | Authentication Cryptography Detection technique Honeypots Real‐time data Wireless Sensor Network (WSN) 전자/정보통신공학 |
| Title | Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.16.0115.0795 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002172446 |
| Volume | 38 |
| WOSCitedRecordID | wos000391851700012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | ETRI Journal, 2016, 38(6), , pp.1145-1152 |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: WIN dateStart: 19970101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS-QwEA-e-OA9-HV36HknQXyTartJm-TROxUFWWRdT18ktPmQxbWVbj3w7f6E-xv9S5xJdxdFEDnuKRSakM5kZn6TzgchW4BAJc8ZyHfc8eCgeB8pkySR9U6YjgMjG4Ixf52IbldeXqrTGbI_yYVp60NML9xQMoK-RgHPi9CFhINVQiY29QAEPdtBULMTC4WZ5glPsI3BxXF36nXhn0D0uuDgRhnPWJs5g4vsvl7ihXX6UNb-JWYNRudw8f9sd4ksjEEn3WtPyTKZceUK-fisFOEnctW7H7rHP39_gFWzdK-sbvPhA913TQjVKml_UuuVhiAD2qvyWxyPqtI93FXNiAL6pRhLOwTdSc_AO4bnbhtkPvpMzg8P-j-PonHrhcgwwdOoUKZILbCOJS5Lc8dBPzMbSx9zVmRMKCs8y6W0Ni2skqrjLGgCYRKjmBN5zL6Q2RI2sEpoR3lRCOXzAlub8Fg69DkBWVopnXVijSQTkmszrkuO7TGGGvwTJJ4OpNNJppF0Gkm3Rranc-7aqhxvvr0JnNQ3ZqCxmDaO15W-qTW4DMcaL-IAtcE2AvvesZ4-6PfgG3j69R_mrJN5wFxZGxHzjcw29b37TubM72YwqjfC0X0Cv_zxYA |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB_aKqgPfov1cxHfJG1yu8nuPla9codnkPPUvsiS7IccvSYllwp980_wb_QvcSa5OyyCiPi0BLLLZmZn5jeT2RmA54hAlSg4ync8COighBBpmySRC17agUcj2yVjfpzIPFdHR_rdFgzXd2H6-hCbgBtJRqevScApIE1SLtAsERfbZo6Snu0RqtmLpU634ZJAxEEdHD6N843fRf8Cye_CoxtlIuP93RlaZf_3NS7Yp-2qCRdRa2d2Dm_8pw3fhOsr3MkO-oNyC7Z8dRuu_VKN8A58np4t_I9v31-iYXPsoKpPisU5e-3bLlurYrN1uVfW5RmwaV2c0DiqK39-WrdLhgCYUTrtAtUne48OMj7nfZ758i58OBzOXo2iVfeFyHIp0qjUtkwdco8nPksLL1BFcxerEAteZlxqJwMvlHIuLZ1WeuAdKgNpE6u5l0XM78FOhRu4D2yggyylDkVJ3U1ErDy5nQgunVLeebkLyZrmxq5Kk1OHjIVBF4WIZzrSmSQzRDpDpNuFF5s5p31hjj--_QxZaY7t3FA9bRq_1Oa4Meg1jA3F4hC44TY6_v3FemY4m-I3iPTBP8x5CldGs7cTMxnnbx7CVYRgWZ8g8wh22ubMP4bL9ms7XzZPunP8E92X9X4 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB_aKqIPfov1cxHfJG1yu8nuPlZ7Rw9LKOcpfZEl2Q85ek2OXCr0zT_Bv9G_xJnk7rAIIuLTEsgum5mdmd9vMzsL8BoRqBIFR_uOBwEJSgiRtkkSueClHXgMsl0y5qdjmefq9FSfbMFwfRamrw-x2XAjy-j8NRm4X7hAVi4wLJEW22aGlp7tEarZi6VOt-GayJCY08GScb7hXfQvkHgXLt0oExnvz87QKPu_j3ElPm1XTbiKWruwM7rznyZ8F26vcCc76BfKPdjy1X249Us1wgfweXIx9z--fX-Lgc2xg6o-L-aX7NC3XbZWxabrcq-syzNgk7o4p_aorvzlom6XDAEwo3TaObpP9gEJMj7nfZ758iF8HA2n746i1e0LkeVSpFGpbZk61B5PfJYWXqCL5i5WIRa8zLjUTgZeKOVcWjqt9MA7dAbSJlZzL4uYP4KdCifwGNhAB1lKHYqSbjcRsfJEOxFcOqW883IXkrXMjV2VJqcbMuYGKQoJz3SiM0lmSHSGRLcLbzZ9Fn1hjj--_QpVac7szFA9bWq_1OasMcgaxob24hC44TQ6_f3FeGY4neA3iPTJP_R5CTdODkfmeJy_fwo3EYFlfX7MM9hpmwv_HK7br-1s2bzolvFPkPz1Ag |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rule-Based+Anomaly+Detection+Technique+Using+Roaming+Honeypots+for+Wireless+Sensor+Networks&rft.jtitle=ETRI+journal&rft.au=Gowri%2C+Muthukrishnan&rft.au=Paramasivan%2C+Balasubramanian&rft.date=2016-12-01&rft.issn=1225-6463&rft.volume=38&rft.issue=6&rft.spage=1145&rft.epage=1152&rft_id=info:doi/10.4218%2Fetrij.16.0115.0795&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_16_0115_0795 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |