2008
DOI: 10.1016/j.adhoc.2007.11.004
|View full text |Cite
|
Sign up to set email alerts
|

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
2

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(25 citation statements)
references
References 5 publications
0
23
0
2
Order By: Relevance
“…Vigna et al [21] propose a misuse detection approach based on the characterisation of the sequences of actions that attackers perform to compromise the AODV routing protocol. Razak et al [22] propose a collaborative intrusion detector where misuse and anomaly detection are both used for a better detection accuracy. Şen et al [23] propose the use of genetic programming for evolving programs to detect each particular attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Vigna et al [21] propose a misuse detection approach based on the characterisation of the sequences of actions that attackers perform to compromise the AODV routing protocol. Razak et al [22] propose a collaborative intrusion detector where misuse and anomaly detection are both used for a better detection accuracy. Şen et al [23] propose the use of genetic programming for evolving programs to detect each particular attack.…”
Section: Related Workmentioning
confidence: 99%
“…Some works [17], [22], [24], [25], [26] propose certain actions in the presence of attacks, but only a few evaluate the consequence of mitigation [17], [26]. Furthermore, a common response consists of the isolation of the nodes that are suspected to be attackers [17], [26], [27].…”
Section: Related Workmentioning
confidence: 99%
“…The purpose is to show that how the social relationships between vehicles can be used for significance performance of VANET routing protocols. We have implemented only simple operational misuse and anomaly detection engines based on existing works in [14,15]. We have assumed that a pair of direct friends or friends-of-friends who have mutual trust with each other can communicate.…”
Section: Friendship Mechanismmentioning
confidence: 99%
“…In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation. A cooperative IDS engine is then employed for detecting more attacks, based on neighbor information [13,38].…”
Section: State Of the Artmentioning
confidence: 99%