{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:31:40Z","timestamp":1763641900015,"version":"3.40.5"},"reference-count":17,"publisher":"Wiley","issue":"15","license":[{"start":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T00:00:00Z","timestamp":1423612800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"Sience and information technology of Guangzhou","award":["2014J2200023"],"award-info":[{"award-number":["2014J2200023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Security issue in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. Data encryption and authentication are the most common two methods to address the security issues in IoTs. However, these efforts are ineffective in detecting the diverse malicious attacks, especially in intrusion detection. Comparatively, very few attentions have been paid for detecting intrusive nodes in IoTs research. Therefore, in this paper, we derive an innovative method called granulometric size distribution (GSD) method based on mathematical morphology for detecting malicious attack in IoTs, such as intrusion detection. We successfully generate GSD clusters to directly monitor the number of active nodes in a wireless sensor network because the GSD curves are similar when the number of active nodes in a wireless sensor network is fixed. Link Quality Indicator data of each node are utilized as the network parameters in this method. The results show the effectiveness in intrusion detection. Copyright \u00a9 2015 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1181","type":"journal-article","created":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T02:51:02Z","timestamp":1423795862000},"page":"2744-2751","source":"Crossref","is-referenced-by-count":4,"title":["An intrusion detection method for wireless sensor network based on mathematical morphology"],"prefix":"10.1002","volume":"9","author":[{"given":"Yanwen","family":"Wang","sequence":"first","affiliation":[{"name":"Guangzhou Institute of Advanced Technology CAS No. 1121, Haibin Rd, Nansha District Guangzhou 511458 China"}]},{"given":"Xiaoling","family":"Wu","sequence":"additional","affiliation":[{"name":"Guangzhou Institute of Advanced Technology CAS No. 1121, Haibin Rd, Nansha District Guangzhou 511458 China"},{"name":"Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis Guangdong University of Petrochemical Technology Maoming 525000 China"},{"name":"Information Technology Research Base of Civil Aviation Administration of China Civil Aviation University of China Tianjin 300300 China"},{"name":"Shenzhen Institutes of Advanced Technology CAS No. 1068, Xueyuan Rd, Shenzhen University Town, Nanshan District Shenzhen 518055 China"}]},{"given":"Hainan","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangzhou Institute of Advanced Technology CAS No. 1121, Haibin Rd, Nansha District Guangzhou 511458 China"},{"name":"Guangdong University of Technology No.100, Huanchengxi Road, University Town Guangzhou 510006 China"}]}],"member":"311","published-online":{"date-parts":[[2015,2,11]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"crossref","unstructured":"Ming\u2010WheiF.Wireless sensor network industrial view? What will be the killer apps for wireless sensor network?IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing SUTC' 08 Taichung Taiwan 2008;270.","DOI":"10.1109\/SUTC.2008.95"},{"issue":"4","key":"e_1_2_9_3_1","first-page":"33","article-title":"Radio link quality estimation in wireless sensor networks: a survey","volume":"8","author":"Nouha B","year":"2012","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"2","key":"e_1_2_9_4_1","first-page":"35","article-title":"Data\u2010driven link quality prediction using link features","volume":"10","author":"Tao L","year":"2014","journal-title":"ACM Transactions on Sensors Networks"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2014.720.724"},{"key":"e_1_2_9_6_1","unstructured":"MatheronG JeanS.The birth of mathematical morphology.In Proceedings 6th International Symposium Mathematical Morphology Sydney Australia 2002;1\u201316."},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2012.2203602"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.08.011"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_2_9_10_1","doi-asserted-by":"crossref","unstructured":"AlMheiriSM AlQamziHS.Data link layer security protocols in wireless sensor networks: a survey.10th IEEE International Conference on Networking Sensing and Control (ICNSC) Paris\u2010Evry France 2013;312\u2013317.","DOI":"10.1109\/ICNSC.2013.6548756"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015056"},{"key":"e_1_2_9_12_1","first-page":"836","volume-title":"Proceedings of the 2008 Spring Simulation Multiconference (SpringSim '08)","author":"Idris MA","year":"2008"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0733"},{"key":"e_1_2_9_14_1","unstructured":"MoorthyM SathiyabamaS.Astudy of intrusion detection using data mining.2012 International Conference on Advances in Engineering Science and Management (ICAESM) Nagapattinam India 2012;8\u201315."},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0192"},{"key":"e_1_2_9_16_1","unstructured":"YanwenW XiaolingW HainanC GuangcongL LeiS.A new intrusion detection method for malicious attack in WSN based on mathematical morphology.9th International Conference on Communications and Networking in China Chinacom 2014 Maoming China 2014."},{"key":"e_1_2_9_17_1","doi-asserted-by":"crossref","unstructured":"Qing\u2010huaZ Yu\u2010xianZ PingY Ji\u2010junX.The Analysis about the unit\u2010step function of the bending moment equation of girder.Intelligent Computing and Integrated Systems (ICISS) 2010 International Conference on Guilin China October 22\u2010242010;479\u2013481.","DOI":"10.1109\/ICISS.2010.5656076"},{"key":"e_1_2_9_18_1","first-page":"11","article-title":"RSSI and LQI data clustering techniques to determine the number of nodes in wireless sensor networks","volume":"2014","author":"Yanwen W","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T23:56:06Z","timestamp":1747612566000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,11]]},"references-count":17,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1002\/sec.1181"],"URL":"https:\/\/doi.org\/10.1002\/sec.1181","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2015,2,11]]}}}