ntrusion detection and prevention systems (hereafter called
IDS) are designed to identify and prevent intrusions into a net-work. IDS are broadly divided into two categories: host-based
IDS and network-based IDS. In wireless sensor networks, host-based IDS may be more suitable for mitigating black hole
attacks since the protection does not rely on dedicated and
trusted hardware on the network. The literature speaks of de-centralized intrusion detection mechanisms for use on wireless
sensor networks [15]. Existing systems check for message
integrity, delays by neighbours and repeat transmissions from
neighbours.