A survey on intrusion detection and prevention in wireless ad-hoc networks
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …
their vast variety of applications in majority fields. Due to their features such as hostile …
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …
existing infrastructure or any centralized management. Securing the exchanges in such …
A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless
networks in which the nodes are resource constrained. Intrusion detection systems (IDSs) …
networks in which the nodes are resource constrained. Intrusion detection systems (IDSs) …
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
AP Lauf, RA Peters, WH Robinson - Ad Hoc Networks, 2010 - Elsevier
This paper describes the design and implementation of a two-stage intrusion detection
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
T-BCIDS: Trust-based collaborative intrusion detection system for VANET
With the development of an intelligent transport system (ITS), security becomes an
increasingly important issue. The Vehicle ad-hoc network (VANET) security researchers …
increasingly important issue. The Vehicle ad-hoc network (VANET) security researchers …
Detection and Prevention of sinkhole attack on AODV Protocol in Mobile Adhoc Network
N Gandhewar, R Patel - 2012 Fourth International Conference …, 2012 - ieeexplore.ieee.org
MANET is formed by a collection of mobile nodes, with no preset infrastructure where each
node plays a role of router, It is getting fame day by day due to wide use of mobile and …
node plays a role of router, It is getting fame day by day due to wide use of mobile and …
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their
operation and the provided services. Intrusion Detection Systems (IDSs) may act as …
operation and the provided services. Intrusion Detection Systems (IDSs) may act as …
[PDF][PDF] Defending against collaborative packet drop attacks on MANETs
Detecting packet drop attacks is important for security of MANETs and current random audit
based mechanism cannot detect collaborative attacks. In this paper, we design a hash …
based mechanism cannot detect collaborative attacks. In this paper, we design a hash …