Skip to main content
. 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046
Algorithm 4. Procedure D.
Procedure (D): IDS_EngineHBC and IVB
Input: Data[a(maci)]
Output: Suspicious events detection
1. From Procedure C (step 2)
2. Set node’s internal intrusion dataset If
3. Get events (a(maci)) at node ni; sender or forwarding node
4. Call IDS_EngineHBC and IVB at ni
            If a(maci,IHFi)==TRUE):
             Call IDS rule engine functions
             Start ule seta; atraffic attributes, Table 1.
             Validate If MAC_ini==TRUE
             Validate If MAC_ipni==MAC_iprni
             Validate If Bpni==Bprni
       prniPreceding Node;BpniBlocked identifiers,
        MACiWireless Physical Address of sensor node
5. Start rule-based classification function,
          CRF=i=1Nf(c1,c2,c3cN) C(AXi)
6. Set event classifier logs for each node
7. Update the logs for each session
8. Redo for all channels
End of Procedure (D)