2014
DOI: 10.1016/j.comcom.2014.08.002
|View full text |Cite
|
Sign up to set email alerts
|

A specification-based intrusion detection engine for infrastructure-less networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(28 citation statements)
references
References 35 publications
0
28
0
Order By: Relevance
“…Based on this, each node decides whether it should forward other nodes' data. Panos et al [18] proposed 'SIDE', which monitors a node's behavior using a host-based detection engine and a remote attestation procedure for ensuring the integrity of the SIDE. Li and Cao [19] addressed routing misbehaviors and mitigated them in DTNs.…”
Section: Related Workmentioning
confidence: 99%
“…Based on this, each node decides whether it should forward other nodes' data. Panos et al [18] proposed 'SIDE', which monitors a node's behavior using a host-based detection engine and a remote attestation procedure for ensuring the integrity of the SIDE. Li and Cao [19] addressed routing misbehaviors and mitigated them in DTNs.…”
Section: Related Workmentioning
confidence: 99%
“…In , they presented a specification‐based IDS called SIDE that safeguards the operation of the AODV routing protocol against a set of routing attacks. SIDE consists of two main functionalities: (i) a specification‐based detection engine and (ii) a remote attestation procedure.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…SIDE consists of two main functionalities: (i) a specification‐based detection engine and (ii) a remote attestation procedure. The specification‐based detection engine is installed on every node that detects a number of routing attacks . The remote attestation procedure ensures the integrity of a running SIDE instance and accelerates the detection mechanism.…”
Section: Intrusion Detection Techniquesmentioning
confidence: 99%
“…These networks comprise a wide range of networking paradigms such as mesh networks, mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), delay tolerant networks (DTN), opportunistic and sensor networks [1]. A common characteristic of these networks is the absence of any fixed architectural components such as routers, access points, etc., supporting and serving dynamic topologies and behaviors.…”
Section: Introductionmentioning
confidence: 99%