2015 7th IEEE Latin-American Conference on Communications (LATINCOM) 2015
DOI: 10.1109/latincom.2015.7430139
|View full text |Cite
|
Sign up to set email alerts
|

A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…In [106], Amouri et al proposed a framework of intrusion detection for MANETs. The framework considered a hierarchical architecture where the intrusion detection is distributed through a set of promiscuous zones (PZ).…”
Section: Defense On Network Layermentioning
confidence: 99%
See 1 more Smart Citation
“…In [106], Amouri et al proposed a framework of intrusion detection for MANETs. The framework considered a hierarchical architecture where the intrusion detection is distributed through a set of promiscuous zones (PZ).…”
Section: Defense On Network Layermentioning
confidence: 99%
“…Error detection codes [18] TDM, Error correction codes [18] Denial of sleep and flooding MAC Anomaly detection on motes [66] N/A De-Synchronization MAC N/A 6TiSCH [97] Unfairness MAC N/A Usage of small frames [57] Blackhole Network Anomaly detection on motes [66], REWARD [98], ActiveTrust [103], Packet count [104], TinyOS beaconing [105], Honeypot [100], Watchdog [101], Pseudo clustering algorithm [106] REWARD routing [98], Multi-path routing [59], [93], [120], Mesh network topology [99], ActiveTrust routing [103], Isolation [104], BAMBi [105], MAODV [102] HELLO flooding Network Bidirectional verification technique [107] Identity verification protocol [59], Multi-path multibase station routing [107], µ-TESLA [84] Node-Replication (Clone)…”
Section: Macmentioning
confidence: 99%
“…Machine learning and artificial intelligence-based IDSs were studied extensively during the last decade. Various machine algorithms were explored such as: Neural networks [1] and its newer version, deep learning [2], support vector machines (SVM) [3], decision trees [4], k-NN clustering [5], and Naïve Bayes [6]. However, a study presented by [7] shows several advantages for using random forest when it comes to the complexity, accuracy, and memory usage.…”
Section: Introductionmentioning
confidence: 99%
“…Dhakne et al [12] DTBID enables the development of the trust model to prevent the malicious attack in the wireless sensor networks considering the energy, reliability and data. Amouri et al [13] the intrusion based on the cross layer feature collection from medium access control and network layers. With a hierarchical based approach that eludes the clustering and the sequentially transmits the packet within its communication range.…”
Section: Introductionmentioning
confidence: 99%