2013
DOI: 10.1109/surv.2013.030713.00201
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks

Abstract: Abstract-In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next generation wireless networking technology. However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder node in the network. In this paper, we present a survey of the main types of attack at the network layer, and we then review intrusion detection and protection mechanisms that hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 196 publications
(112 citation statements)
references
References 75 publications
(88 reference statements)
0
112
0
Order By: Relevance
“…The intrusion detection systems have been categorized into proactive and reactive mechanisms. The reactive techniques deploy the IPS to take action before the intrusions are launched in the network, whereas the IDS come into action during an intrusion [4]. The IPS provides a unique identity to each user and verifies the credentials of the users to detect the normal pattern.…”
Section: Related Workmentioning
confidence: 99%
“…The intrusion detection systems have been categorized into proactive and reactive mechanisms. The reactive techniques deploy the IPS to take action before the intrusions are launched in the network, whereas the IDS come into action during an intrusion [4]. The IPS provides a unique identity to each user and verifies the credentials of the users to detect the normal pattern.…”
Section: Related Workmentioning
confidence: 99%
“…IDS is the second level of defense in MANET [60], [61]. Only information security is not sufficient to provide complete protection [62] and therefore, IDS need to integrate.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The encryption decryption security scheme and IDS (Intrusion Detection System) against passive and active attackers is identified or detect the malicious actions done by attackers. The IDS are of many types [4,5] that are detecting the malicious activities of attacker and provide the secure communication in MANET. The attacker detection is not only necessary but prevention is also required.…”
Section: Fig 1 Example Of Manetmentioning
confidence: 99%