All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F13%3A00066312" target="_blank" >RIV/00216224:14330/13:00066312 - isvavai.cz</a>

  • Result on the web

    <a href="http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html" target="_blank" >http://mitpress.mit.edu/sites/default/files/titles/content/ecal13/ch082.html</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.7551/978-0-262-31709-2-ch082" target="_blank" >10.7551/978-0-262-31709-2-ch082</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks

  • Original language description

    Intrusion detection is an essential mechanism to protect wireless sensor networks against internal attacks that are relatively easy and not expensive to mount in these networks. Recently, we proposed, implemented and tested a framework that helps a network operator to find a trade-off between detection accuracy and usage of resources that are usually highly constrained in wireless sensor networks. We used a single-objective optimization evolutionary algorithm for this purpose. This approach, however, has its limitations. In order to eliminate them, we show benefits of multi-objective evolutionary algorithms for intrusion detection parametrization and examine two multi-objective evolutionary algorithms (NSGA-II and SPEA2). Our examination focuses on theimpact of an evolutionary algorithm (and its parameters) on the optimality of found solutions, the speed of convergence and the number of evaluations.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/GAP202%2F11%2F0422" target="_blank" >GAP202/11/0422: Privacy preserving security protocols and intrusion detection for wireless sensor networks</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems

  • ISBN

    9780262317092

  • ISSN

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    569-576

  • Publisher name

    MIT Press

  • Place of publication

    Cambridge, MA 02142-1493 USA

  • Event location

    Taormina, Italy

  • Event date

    Sep 2, 2013

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article