2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.80
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System in Mobile AdHoc Networks

Abstract: ABSTRACT:In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Additionally, the limited processing power and battery life of the devices used in a MANET also prevent the adoption of heavy-duty cryptographic techniques. While traditional misuse-based Intrusion Detection Systems (IDSes) may work in a MANET, watching for packet dropouts or unknown outs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…For detecting anomalies they have proposed a new algorithm. In [15] the authors proposed solution to detect both anomaly and misuse behavior in MANET. They have proposed an intrusion detection system (IDS) which detects packet drops or delays in the network.…”
Section: Related Workmentioning
confidence: 99%
“…For detecting anomalies they have proposed a new algorithm. In [15] the authors proposed solution to detect both anomaly and misuse behavior in MANET. They have proposed an intrusion detection system (IDS) which detects packet drops or delays in the network.…”
Section: Related Workmentioning
confidence: 99%
“…Madhavi [20] suggested IDS for mobile ad hoc networks that can capture the assurance of nodes receiving the fair quota of the transmission channel. The system reckoned on overhearing the packet transmission of neighboring nodes that made it an efficacious system in networks with nodes having inconsistent transmission power and directional antennas for different neighbors.…”
Section: Related Workmentioning
confidence: 99%
“…As a result this security layer like other security layers is not impenetrable, but success probability of such attack is very low, especially if these would be a combination of different security methods. The other problems are the necessity of entering MAC address list in each AP and list updating as soon as a new user is added to the network [9,16,21]. …”
Section: Mac Address Filteringmentioning
confidence: 99%
“…In contrast to traditional wireless networks, clients can freely access the servers and wireless channels have been more accessible for both authorized clients and malicious internet attacks [21]. So this mobility and accessibility should be reliable and highly secure.…”
Section: Introductionmentioning
confidence: 99%