2012
DOI: 10.1007/978-3-642-33260-9_6
|View full text |Cite
|
Sign up to set email alerts
|

TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks

Abstract: Part 2: Security, Access Control and Intrusion DetectionInternational audienceThis paper aims to propose a new trust-based Intrusion Detection system (IDS) for wireless, ad-hoc networks with or without mobility of nodes. In fact, the proposed solution not only detects intrusions but also proactively responds towards route setup avoiding the compromised nodes. It could be extended for mesh or hybrid networking environment too. Trust is evaluated as the weighted sum of direct evaluation of the neighboring nodes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…Therefore, novel address this kind of problems. security is to provide security intrusion detection [8,9], 1], access control [12], and nodes for effective routing [13, ATED WORK ective risk management which nder uncertainty and usefulness wn entity [16]. This section ed approaches used for gathering e trust.…”
Section: Trust Management In Manetsmentioning
confidence: 99%
“…Therefore, novel address this kind of problems. security is to provide security intrusion detection [8,9], 1], access control [12], and nodes for effective routing [13, ATED WORK ective risk management which nder uncertainty and usefulness wn entity [16]. This section ed approaches used for gathering e trust.…”
Section: Trust Management In Manetsmentioning
confidence: 99%
“…The novel on-demand trust-based unicast routing protocol provides a flexible and feasible approach to choose the shortest route that meets the security requirement of data packets transmission. Then they made some improvements on the former trust model [5], and proposed an on-demand trust-based multi-path routing protocol (AOTMDV) [13], in which two novel trust mechanisms were proposed. Firstly, the Message Authentication Code (MAC) mechanism was used to protect the new fields added in the routing control packets.…”
Section: Trust-based Routing Protocols In Manetsmentioning
confidence: 99%
“…We simulate and compare the following schemes: the standard AOMDV, three deformation versions of AOMDV (AOTMDV [5], LTB-AOMDV [13] and new protocol TeAOMDV). TeAOMDV-1 denotes for that the trust attributes contains the rating, while not in TeAOMDV-2.…”
Section: Experiments Setupmentioning
confidence: 99%
“…The authors need to measure the performance of their IDS with respect to the standard network security parameters. Trust‐based IDS is one of our more recent woks. The algorithm is well simulated.…”
Section: Review Of the Ids Solutions For Wireless Networkmentioning
confidence: 99%