2011
DOI: 10.1007/978-3-642-24037-9_17
|View full text |Cite
|
Sign up to set email alerts
|

A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

Abstract: Abstr act. An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, va… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…A study of detection mechanisms for black hole attacks is presented in , and for wormhole attacks is presented in . In , Deb et al . presented a survey of IDSs in MANETs and WMNs, and compared the IDSs based on their underlying architecture and type of attacks addressed.…”
Section: Related Workmentioning
confidence: 99%
“…A study of detection mechanisms for black hole attacks is presented in , and for wormhole attacks is presented in . In , Deb et al . presented a survey of IDSs in MANETs and WMNs, and compared the IDSs based on their underlying architecture and type of attacks addressed.…”
Section: Related Workmentioning
confidence: 99%
“…Because only the usage of protection and encryption software to protect WMNs are not sufficient and effective, intrusion detection systems are also deployed to provide a second line of defense [33]. Ιntrusion Detection Systems in wired or wireless networks are used to alert the users about possible attacks, ideally in time to stop the attack or mitigate the damage [24]. They consist of three functions [24,26]:…”
Section: ιNtrusion Detection Systemsmentioning
confidence: 99%
“…Ιntrusion Detection Systems in wired or wireless networks are used to alert the users about possible attacks, ideally in time to stop the attack or mitigate the damage [24]. They consist of three functions [24,26]:…”
Section: ιNtrusion Detection Systemsmentioning
confidence: 99%
“…The authors of [13] surveyed countermeasures proposed for various network layer attacks, structuring their survey by attack type. In [14] the authors presented a survey of IDSs in MANETs and wireless mesh networks, mostly from the preceding four years. They compared IDSs based on the type of attack addressed and their underlying architecture.…”
Section: Introductionmentioning
confidence: 99%