2018
DOI: 10.3390/s18020651
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Layer, Anomaly-Based IDS for WSN and MANET

Abstract: Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…Both scenarios are tested under blackhole (BH) and flooding (FL) attacks with both mobility models RWP, GM. Reporting time (Tr) is 25 s and sampling time (Ts) is 5 s. The detection parameters are true positive rate (TPR) also called recall, true negative rate (TNR), false positive rate (FPR), and false negative rate (FNR), precision, and F 1 score are shown in Equations (3)- (8). A detailed explanation for the detection performance using these equations and Algorithm 1, will be presented in the discussion section.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Both scenarios are tested under blackhole (BH) and flooding (FL) attacks with both mobility models RWP, GM. Reporting time (Tr) is 25 s and sampling time (Ts) is 5 s. The detection parameters are true positive rate (TPR) also called recall, true negative rate (TNR), false positive rate (FPR), and false negative rate (FNR), precision, and F 1 score are shown in Equations (3)- (8). A detailed explanation for the detection performance using these equations and Algorithm 1, will be presented in the discussion section.…”
Section: Resultsmentioning
confidence: 99%
“…(3) An example showing how the results were obtained based on Equations (3)- (8) and Algorithm 1 is shown below. Every fitted slope point has a lower bound (LB) and upper bound (UB), malicious nodes reside in the region below the threshold whereas the benign nodes reside in the region above the threshold.…”
Section: Tpr = Tp Tp + Fnmentioning
confidence: 99%
See 2 more Smart Citations
“…Amouri et al [18] proposed a two-level detection scheme for detecting malicious nodes in MANET. The first stage deploys a dedicated sniffer that works in promiscuous mode.…”
Section: Related Workmentioning
confidence: 99%