2007
DOI: 10.1109/mwc.2007.4396943
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection techniques in mobile ad hoc and wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
82
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 162 publications
(82 citation statements)
references
References 13 publications
0
82
0
Order By: Relevance
“…The encryption decryption security scheme and IDS (Intrusion Detection System) against passive and active attackers is identified or detect the malicious actions done by attackers. The IDS are of many types [4,5] that are detecting the malicious activities of attacker and provide the secure communication in MANET. The attacker detection is not only necessary but prevention is also required.…”
Section: Fig 1 Example Of Manetmentioning
confidence: 99%
“…The encryption decryption security scheme and IDS (Intrusion Detection System) against passive and active attackers is identified or detect the malicious actions done by attackers. The IDS are of many types [4,5] that are detecting the malicious activities of attacker and provide the secure communication in MANET. The attacker detection is not only necessary but prevention is also required.…”
Section: Fig 1 Example Of Manetmentioning
confidence: 99%
“…The base station is secure and able to detect all compromised nodes. Detection of compromised nodes can be actually achieved by means of an Intrusion Detection System (IDS) such as [27][28][29][30]. The BS maintains a blacklist containing the identity of compromised nodes.…”
Section: Network Modelmentioning
confidence: 99%
“…WSNs play an important role in a wide range of applications, such as emergency response [13], environment monitoring [11], smart In WSN with a static sink, the sensed readings of the sensors are usually routed via multihop forwarding to the sink for processing. This type of communication creates a bottleneck in the sensor network.…”
Section: Introductionmentioning
confidence: 99%