An Intrusion Detection System for MANETs

@inproceedings{Yeo2015AnID,
  title={An Intrusion Detection System for MANETs},
  author={Kiat Seng Yeo},
  year={2015}
}
Mobile Ad-Hoc network (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts. The host is called as a node which dynamically establishes their own network. In MANET all the nodes operates in cooperative fashion. Due to their certain inherently vulnerable characteristics, there are many possibilities of the attacks in MANET. Every time intrusion prevention measure not guaranteed to work. So we have to monitor what is going on in… CONTINUE READING

From This Paper

Topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Stavrakakis,”A novel intrusion detection system for MANET”,Proceedings of the International Conference on Security and Cryptography (SECRYPT)

Christoforos Panos, Christos Xenakis, Ioannis
2010
View 10 Excerpts
Highly Influenced

EAACK — A Secure Intrusion-Detection System for MANETs

Mohammad Mubasheer, Solasu Sharavani
2014
View 1 Excerpt

Evaluation of various IDS techniques for MANET

Kavita Varule, Sachin Bojewar
ICETTA- March, • 2014
View 2 Excerpts

Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine

2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS) • 2012
View 2 Excerpts

A Novel Architecture of Intrusion Detection System

2010 7th IEEE Consumer Communications and Networking Conference • 2010

A Novel Cross Layer Intrusion Detection System in MANET

2010 24th IEEE International Conference on Advanced Information Networking and Applications • 2010

A general cooperative intrusion detection architecture for MANETs

Third IEEE International Workshop on Information Assurance (IWIA'05) • 2005

A survey of security issues in mobile Ad-Hoc and sensor network

Djamel Djenouri, Lyes Khelladi
IEEE Communications Surveys & Tutorials, Fourth Quarter, • 2005
View 2 Excerpts