IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.
DOI: 10.1109/mahss.2005.1542882
|View full text |Cite
|
Sign up to set email alerts
|

A cross-layer based intrusion detection approach for wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 9 publications
0
26
0
Order By: Relevance
“…Also the fact that nodes fail to respond, e.g. through network congestion, link failure, or topology changes, can be confused with intrusions [15], producing high false positive rates.…”
Section: Related Workmentioning
confidence: 99%
“…Also the fact that nodes fail to respond, e.g. through network congestion, link failure, or topology changes, can be confused with intrusions [15], producing high false positive rates.…”
Section: Related Workmentioning
confidence: 99%
“…A novel Cross-layer based Intrusion Detection System (CIDS) is presented in (Thamilarasu et al, 2005) to recognize the malevolent node(s).…”
Section: Literature Reviewmentioning
confidence: 99%
“…By looking at indicators in the MAC such as collision rate or the number of retransmissions requests, a node may be able to tell if there are degradations of the radio medium, whether they are environmental or caused by an attacker. In all of [4,9,22,26], there is a part of the intrusion detection being done based on the collision rate. This mechanism is close to the definition of specification-based IDS, which detects whether a node respects the protocol they should run.…”
Section: Inputs From the Medium Access Control (Mac) Protocolmentioning
confidence: 99%
“…By designing an IDS more specific to the routing protocol, it becomes possible to detect deviations from the routing protocol, using an analysis that can span from simple rules or features to a complete specification-based monitoring. Both [9] and [26] propose some IDS which uses promiscuous listening. The IDS in [27,29] monitor the routing process of neighboring nodes using finite state machines, respectively built for AODV 1 and OLSR 2 .…”
Section: Data Based On the Routing Layer And Trafficmentioning
confidence: 99%