2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &Amp; Services (MobiQuitous) 2007
DOI: 10.1109/mobiq.2007.4451068
|View full text |Cite
|
Sign up to set email alerts
|

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks

Abstract: Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. In addition, new history based routing schemes e.g. Prophet have been proposed because traditional adhoc routing schemes do not work well in sparse ad hoc network… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
41
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(41 citation statements)
references
References 16 publications
0
41
0
Order By: Relevance
“…Among the few works that address intrusion detection in IC-MANET, there is work by Chuah et al [13] proposing a rule-based misuse detection mechanism targeted towards delay-tolerant networks. It builds on a history-based routing protocol, detects attacker nodes, and mitigates their effects by keeping them on a black list, i.e.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Among the few works that address intrusion detection in IC-MANET, there is work by Chuah et al [13] proposing a rule-based misuse detection mechanism targeted towards delay-tolerant networks. It builds on a history-based routing protocol, detects attacker nodes, and mitigates their effects by keeping them on a black list, i.e.…”
Section: Related Workmentioning
confidence: 99%
“…In most cases these metrics reflect the number of attacks detected, but sometimes they show the number of attackers detected [13]. The detection delay is not usually taken into account, but there are a few exceptions [16,17,13].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Saha [11] et al propose a table-based strategy to record network history and use this information to detect discrepancies in the behavior of nodes, followed by elimination of those detected as malicious. Chuah et al [12] propose a message-ferry-based detection method. This scheme assumes that some dependable mobile nodes exist in the network, and these dependable nodes collect the history delivery information of the nodes they encounter, and then the malicious nodes can be distinguished according to the information collected by dependable nodes.…”
Section: Related Workmentioning
confidence: 99%