2009
DOI: 10.1109/tvt.2008.2010049
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(59 citation statements)
references
References 32 publications
0
59
0
Order By: Relevance
“…Nakayama et al [11] propose an adaptive method to detect attacks on the AODV routing protocol. The method is based on the calculation of projection distances using multidimensional statistics and the Principal Component Analysis (PCA) to determine the axis that expresses the most relevant data correlations.…”
Section: Related Workmentioning
confidence: 99%
“…Nakayama et al [11] propose an adaptive method to detect attacks on the AODV routing protocol. The method is based on the calculation of projection distances using multidimensional statistics and the Principal Component Analysis (PCA) to determine the axis that expresses the most relevant data correlations.…”
Section: Related Workmentioning
confidence: 99%
“…Kabiri et al [8] have proposed an anomaly-based engine that focuses on detecting denial of service attacks (DoS). The proposed engine shares a number of similarities with [3] analyzed in sect. 2.1.…”
Section: Anomaly Detection Engine With Optimal Featuresmentioning
confidence: 99%
“…Nakayama et al [3] have proposed an anomaly-based engine for detecting malicious actions that target the Ad-hoc On-demand Distance Vector (AODV) [14] routing protocol. The proposed engine utilizes machine learning in order to generate and maintain a normal profile and relies on principal component analysis (PCA) [4] for resolving malicious behaviors.…”
Section: A Dynamic Anomaly Detection Scheme For Aodv-based Manetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Attacks are even smart and act differently in different situations. So, above table describes the traditional methods for solvation of problems in WSN [12][13][14][15][16][17][18][19][20]. …”
Section: Literature Reviewmentioning
confidence: 99%