2018
DOI: 10.1016/j.jnca.2018.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey

Abstract: Mobile Ad Hoc Network (MANET) is becoming one type of major next generation wireless networks. Nevertheless, it easily suffers from various attacks due to its specific characteristics. In order to evaluate and measure the security of MANET in real time and make this network react accordingly, a promising alternative is to integrate detection mechanisms that play a role of the second line of defense to detect attacks in MANETs. We note that in most attack detection mechanisms, it is essential and crucial to col… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 106 publications
(108 reference statements)
0
31
0
Order By: Relevance
“…Based on the above literature review and many literature surveys [35]- [37], we can see that it lacks an effective data collection method in SDN that can dynamically and adaptively select a small number of nodes as data collectors based on network status in order to collect as few as possible data, but at the same time, the collection still helps detecting sensitive network events with high accuracy. Therefore, in this paper, we aim to propose such a data collection system in SDN.…”
Section: Network Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above literature review and many literature surveys [35]- [37], we can see that it lacks an effective data collection method in SDN that can dynamically and adaptively select a small number of nodes as data collectors based on network status in order to collect as few as possible data, but at the same time, the collection still helps detecting sensitive network events with high accuracy. Therefore, in this paper, we aim to propose such a data collection system in SDN.…”
Section: Network Data Collectionmentioning
confidence: 99%
“…1) Impact Factor Evaluation Time delay (td), packet loss (pl) and bandwidth (bd) are the essential factors to evaluate link availability [24], [35]- [37]. Assume M ω is the measurement value of factor ω.…”
Section: Network Measurement and Evaluation Modelmentioning
confidence: 99%
“…Due to the differences among the ad hoc networks, novel routing schemes must be designed to cater to the main characteristics of FANETs. Table 2 compares the types of links in FANETs with those in MANETs and VANETs [44][45][46][47].…”
Section: How Do Fanets Differ From Other Kinds Of Ad Hoc Network?mentioning
confidence: 99%
“…Eavesdropping, active interference occurs in Physical Layer. Some of the attacks occur in multiple layers [1]. These types of attracts are Denial of Service (DoS), SYN Flooding, Black hole attack, Wormhole attack, Repudiation etc.…”
Section: Literature Reviewmentioning
confidence: 99%