2011 7th International Conference on Information Assurance and Security (IAS) 2011
DOI: 10.1109/isias.2011.6122816
|View full text |Cite
|
Sign up to set email alerts
|

A cooperative intrusion detection scheme for clustered mobile ad hoc networks

Abstract: A mobile ad hoc network is a collection of wireless mobile devices communicating with each other and forming a temporary network, without any pre-deployed infrastructure. Security in MANET is a main and important element for the basic functions of a network. One of the security technologies is intrusion detection system which provides a second line of defense. In this paper, we propose an efficient defense system based on a cooperative scheme to deal with intrusions in clustered ad hoc networks. Our proposed s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Similar to the system presented in [83], the authors in [84] suggested a Cooperative Intrusion Detection System based on clustering methods. In this strategy, an intrusion is not only detected but the type of attack and the perpetrator is also identified.…”
Section: Cooperative Intrusion Detection Systemmentioning
confidence: 99%
“…Similar to the system presented in [83], the authors in [84] suggested a Cooperative Intrusion Detection System based on clustering methods. In this strategy, an intrusion is not only detected but the type of attack and the perpetrator is also identified.…”
Section: Cooperative Intrusion Detection Systemmentioning
confidence: 99%
“…Hajar Al-Hujailan et al [3] in 2011 proposed a scheme called Cooperative Intrusion Detection Scheme. For basic function of a network such as routing, packet forwarding, network management and so on, security in MANET is very important.…”
Section: Intrusion Detection In Mobile Ad-hoc Networkmentioning
confidence: 99%
“…In [5] watermarking and finger printing is used to check infringement in the activities of the attacker. A distributed cooperative intrusion detection with the help of mobile agents is described in [6] by Dalila Boughaci et al [7] describes the intrusion detection by using the tables for malicious activities and accordingly it acknowledges among the nodes into the network. [8] uses the autonomous agents for intrusion detection(AAFID).…”
Section: Related Workmentioning
confidence: 99%