A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks

@article{Nakayama2009ADA,
  title={A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks},
  author={H. Nakayama and S. Kurosawa and A. Jamalipour and Y. Nemoto and N. Kato},
  journal={IEEE Transactions on Vehicular Technology},
  year={2009},
  volume={58},
  pages={2471-2481}
}
  • H. Nakayama, S. Kurosawa, +2 authors N. Kato
  • Published 2009
  • Computer Science
  • IEEE Transactions on Vehicular Technology
  • Mobile ad hoc networks (MANETs) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network attacks, and therefore, security is a more significant issue than infrastructure-based wireless networks. In MANETs, it is difficult to identify malicious hosts as the topology of the network dynamically changes. A malicious host can easily interrupt a route for which it is one of the forming nodes in the communication path. In the literature… CONTINUE READING
    A dynamic clustering-based approach for anomaly detection in AODV-based MANETs
    • 19
    AN EFFICIENT LOCATION AND DETECTION (ELD) BASED MOBILE AD-HOC IMPLEMENTATION WITH EMBEDDED SYSTEMS
    • 1
    • Highly Influenced
    • PDF
    An unsupervised anomaly detection engine with an efficient feature set for AODV
    • 3
    • Highly Influenced
    A New Approach for the Detection of Black hole Nodes in AODV Based Mobile Ad-Hoc Networks
    Analysis of security attacks in AODV
    • 5

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 56 REFERENCES
    A specification-based intrusion detection system for AODV
    • 297
    • PDF
    Towards adaptive intrusion detection in mobile ad hoc networks
    • 36
    • PDF
    Securing ad hoc networks
    • 2,889
    • PDF
    Routing security in wireless ad hoc networks
    • 1,040
    • PDF
    Secure data transmission in mobile ad hoc networks
    • 236
    • PDF
    How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
    • 175
    • PDF
    Authenticated routing for ad hoc networks
    • 367
    • PDF