{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:02:49Z","timestamp":1746331369828,"version":"3.40.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319075358"},{"type":"electronic","value":"9783319075365"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07536-5_21","type":"book-chapter","created":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T23:14:16Z","timestamp":1401923656000},"page":"343-360","source":"Crossref","is-referenced-by-count":7,"title":["Improving Intrusion Detection Systems for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Andriy","family":"Stetsko","sequence":"first","affiliation":[]},{"given":"Tobi\u00e1\u0161","family":"Smolka","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Stehl\u00edk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Texas Instruments. CC2420 \u2013 2.4 GHz IEEE\u00a0802.15.4\u00a0\/\u00a0ZigBee-ready RF transceiver, http:\/\/focus.ti.com\/"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Matyas, V.: Effectiveness metrics for intrusion detection in wireless sensor networks. In: European Conference on Computer Network Defense, pp. 21\u201328 (2009)","DOI":"10.1109\/EC2ND.2009.11"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Svenda, P., Sekanina, L., Matyas, V.: Evolutionary design of secrecy amplification protocols for wireless sensor networks. In: ACM Conference on Wireless Network Security, pp. 225\u2013236 (2009)","DOI":"10.1145\/1514274.1514306"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: IEEE Conference on Mobile Adhoc and Sensor Systems, pp. 733\u2013738 (2011)","DOI":"10.1109\/MASS.2011.80"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Wen, Y., Zhang, W., Wolski, R., Chohan, N.: Simulation-based augmented reality for sensor network development. In: ACM Conference on Embedded Networked Sensor Systems, pp. 275\u2013288 (2007)","DOI":"10.1145\/1322263.1322290"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Smolka, T., Jurnecka, F., Matyas, V.: On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. In: Conference on Simulation Tools and Techniques, pp. 75\u201384 (2012)","DOI":"10.4108\/icst.simutools.2012.247708"},{"key":"21_CR7","unstructured":"Stetsko, A., Smolka, T., Matyas, V., Stehlik, M.: Improving intrusion detection systems for wireless sensor networks. Technical report FIMU-RS-2014-01: Masaryk University, Faculty of Informatics, Brno, Czech Republic (March 2014)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Talbi, E.-G.: Metaheuristics \u2013 From Design to Implementation. John Wiley & Sons, Inc. (2009)","DOI":"10.1002\/9780470496916"},{"key":"21_CR9","unstructured":"Rappaport, T.: Wireless communications: Principles and practice, 2nd edn. Prentice Hall PTR (2001)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Keijzer, M., Merelo, J.J., Romero, G., Schoenauer, M.: Evolving objects: A general purpose evolutionary computation library. In: Conference on Evolution Artificielle, pp. 231\u2013242 (2002)","DOI":"10.1007\/3-540-46033-0_19"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Kopke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T.K., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"21_CR12","unstructured":"OMNeT++ Community, http:\/\/www.omnetpp.org\/"},{"key":"21_CR13","unstructured":"Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: IEEE\/ACM Workshop on Grid computing, pp. 4\u201310 (2004)"},{"issue":"12","key":"21_CR14","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J. Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks\u00a052(12), 2292\u20132330 (2008)","journal-title":"Computer Networks"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: IEEE Consumer Communications and Networking Conference, pp. 640\u2013644 (2006)","DOI":"10.1109\/CCNC.2006.1593102"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: IEEE Conference on Wireless and Mobile Computing, Networking and Communications, pp. 253\u2013259 (2005)","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16\u201323 (2005)","DOI":"10.1145\/1089761.1089765"},{"issue":"23","key":"21_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks\u00a01(23), 293\u2013315 (2003)","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"21_CR19","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.adhoc.2007.05.003","volume":"6","author":"M. Younis","year":"2008","unstructured":"Younis, M., Akkaya, K.: Strategies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Networks\u00a06(4), 621\u2013655 (2008)","journal-title":"Ad Hoc Networks"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Conference on Mobile Computing and Networking, pp. 275\u2013283 (2000)","DOI":"10.1145\/345910.345958"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Roosta, T., Pai, S., Chen, P., Sastry, S., Wicker, S.: Inherent security of routing protocols in ad-hoc and sensor networks. In: Global Telecommunications Conference, pp. 1273\u20131278 (2007)","DOI":"10.1109\/GLOCOM.2007.245"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.: On optimal placement of intrusion detection modules in sensor networks. In: Conference on Broadband Networks, pp. 690\u2013699 (2004)","DOI":"10.1109\/BROADNETS.2004.52"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Liu, C., Cao, G.: Distributed monitoring and aggregation in wireless sensor networks. In: Conference on Computer Communications, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462033"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In: Conference on Computer Communications and Networks, pp. 1\u20138 (2011)","DOI":"10.1109\/ICCCN.2011.6006035"},{"issue":"4","key":"21_CR25","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1016\/j.comnet.2006.06.013","volume":"51","author":"K.P. Ferentinos","year":"2007","unstructured":"Ferentinos, K.P., Tsiligiridis, T.A.: Adaptive design optimization of wireless sensor networks using genetic algorithms. Computer Networks\u00a051(4), 1031\u20131051 (2007)","journal-title":"Computer Networks"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Jourdan, D.B., de Weck, O.L.: Layout optimization for a wireless sensor network using a multi-objective genetic algorithm. In: IEEE Vehicular Technology Conference, pp. 2466\u20132470 (2004)","DOI":"10.1109\/VETECS.2004.1391366"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Nabi, M., Blagojevic, M., Basten, T., Geilen, M., Hendriks, T.: Configuring multi-objective evolutionary algorithms for design-space exploration of wireless sensor networks. In: ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pp. 111\u2013119 (2009)","DOI":"10.1145\/1641913.1641930"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Khanna, R., Liu, H., Chen, H.H.: Self-organization of sensor networks using genetic algorithms. In: IEEE Conference on Communications, pp. 3377\u20133382 (2006)","DOI":"10.1109\/ICC.2006.255594"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Khanna, R., Liu, H., Chen, H.H.: Dynamic optimization of secure mobile sensor networks: A genetic algorithm. In: IEEE Conference on Communications, pp. 3413\u20133418 (2007)","DOI":"10.1109\/ICC.2007.565"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Khanna, R., Liu, H., Chen, H.H.: Reduced complexity intrusion detection in sensor networks using genetic algorithm. In: IEEE Conference on Communications, pp. 1\u20135 (2009)","DOI":"10.1109\/ICC.2009.5199399"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07536-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T07:03:57Z","timestamp":1746255837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07536-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319075358","9783319075365"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07536-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}