2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) 2019
DOI: 10.1109/iconstem.2019.8918871
|View full text |Cite
|
Sign up to set email alerts
|

Cluster based Intrusion Detection System for Mobile Ad-hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Mobile Ad-hoc networks are distributed and made up of different individual devices that can communicate with one another. Attacks on the network can take many different forms due to its scattered nature and weak infrastructure [26,27].…”
Section: Literaturementioning
confidence: 99%
“…Mobile Ad-hoc networks are distributed and made up of different individual devices that can communicate with one another. Attacks on the network can take many different forms due to its scattered nature and weak infrastructure [26,27].…”
Section: Literaturementioning
confidence: 99%
“…The detection in wireless ad hoc networks can be performed by each host node or by a cluster head. Some works, such as in [10][11][12], proposed cluster-based schemes and improved the performance; although, the burden is placed on the cluster head. Cluster-based schemes have issues such as the following:…”
Section: Introductionmentioning
confidence: 99%