Dempster-Shafer theory for intrusion detection in ad hoc networks

@article{Chen2005DempsterShaferTF,
  title={Dempster-Shafer theory for intrusion detection in ad hoc networks},
  author={Thomas M. Chen and Varadharajan Venkataramanan},
  journal={IEEE Internet Computing},
  year={2005},
  volume={9},
  pages={35-41}
}
Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion detection among their nodes. But even though a distributed intrusion-detection system can combine data from multiple nodes to estimate the likelihood of an intrusion, the observing nodes-might not be reliable. The Dempster-Shafer theory of evidence is well suited for this type of problem because it reflects uncertainty. Moreover, Dempster's rule for combination gives a numerical procedure, for fusing… CONTINUE READING

Similar Papers

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 122 CITATIONS

Success analysis of deception in wireless sensor networks

VIEW 8 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Trust establishment with data fusion for secure routing in MANETs

  • 2014 IEEE International Conference on Communications (ICC)
  • 2014
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Assessment of the Trustworthiness of Digital Records

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Distributed combined authentication and intrusion detection with data fusion in high security mobile ad-hoc networks

  • 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
  • 2010
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

ASMA : Towards Adaptive Secured Multipath in MANETs

VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2006
2018

CITATION STATISTICS

  • 17 Highly Influenced Citations

  • Averaged 7 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES