2004
DOI: 10.1109/mwc.2004.1269717
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
162
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 352 publications
(162 citation statements)
references
References 12 publications
0
162
0
Order By: Relevance
“…Intrusion detection systems (IDS) for MANETs is an active area of research [10]. In the Local Intrusion Detection Architecture [2] communities of nodes are formed, which exchange various security data and intrusion alerts.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection systems (IDS) for MANETs is an active area of research [10]. In the Local Intrusion Detection Architecture [2] communities of nodes are formed, which exchange various security data and intrusion alerts.…”
Section: Related Workmentioning
confidence: 99%
“…The difference between wired infrastructure networks and mobile ad hoc networks [1] has motivated researchers to study IDSs that can handle new security challenges such as securing routing protocols. A cooperative intrusion detection model is proposed in [5] where every node participates in running its IDS in order to collect and identify possible intrusions.…”
Section: Intrusion Detection Systems In Manetmentioning
confidence: 99%
“…On receiving the Election messages from cluster A Àni , node n i verifies each received message with its corresponding hash value that has been sent in Begin-Election message. After the verification is accomplished, each node computes the SCF, which is the minimum valuation 1 of cost of analysis as in Eq. (2).…”
Section: Ids Leader Electionmentioning
confidence: 99%
See 2 more Smart Citations