2020
DOI: 10.1007/s11277-019-07022-5
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(38 citation statements)
references
References 32 publications
0
38
0
Order By: Relevance
“…Securing the routing protocols has become a challenging task, due to the excessive usage of wireless connections. Typically, there are several motivations for the eavesdropper to attack the routing protocols [112]. Routing protocols in UAVs are vulnerable to different cyber-attacks because of various reasons [112]- [114].…”
Section: F Vulnerabilities In Packet Forwarding and Routing Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Securing the routing protocols has become a challenging task, due to the excessive usage of wireless connections. Typically, there are several motivations for the eavesdropper to attack the routing protocols [112]. Routing protocols in UAVs are vulnerable to different cyber-attacks because of various reasons [112]- [114].…”
Section: F Vulnerabilities In Packet Forwarding and Routing Protocolsmentioning
confidence: 99%
“…Typically, there are several motivations for the eavesdropper to attack the routing protocols [112]. Routing protocols in UAVs are vulnerable to different cyber-attacks because of various reasons [112]- [114]. For instance, they rely heavily on False alarm rate (FAR) is set A log-likelihood radio test to be fixed, FAR should be updated scheme [87] Gives the approximate value with time of FAR…”
Section: F Vulnerabilities In Packet Forwarding and Routing Protocolsmentioning
confidence: 99%
“…Machine learning techniques have been used in IDS design [9][10][11][12] . In [9] the authors propose a misuse intrusion detection framework for a wireless local area network based on majority voting that differentiates between attacker and legitimate node patterns by examining mac-layer frames.…”
Section: Related Workmentioning
confidence: 99%
“…Their work does not consider lifetime and only considers blackhole and flooding attacks without considering colluding and smart attackers. In [12], a smart approach for intrusion detection and prevention system in mobile ad hoc networks is proposed. Their proposed system relies on machine learning approaches methods where intrusion detection depends on the four entities of packet analyzer, preprocessing unit, feature extraction unit and classification unit.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation