Threshold-based intrusion detection in ad hoc networks and secure AODV
โ Scribed by A. Patwardhan; J. Parker; M. Iorga; A. Joshi; T. Karygiannis; Y. Yesha
- Publisher
- Elsevier Science
- Year
- 2008
- Tongue
- English
- Weight
- 949 KB
- Volume
- 6
- Category
- Article
- ISSN
- 1570-8705
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in
This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds