2016
DOI: 10.1002/sec.1484
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

Abstract: In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. In order to provide adequate security against multi-level attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(27 citation statements)
references
References 236 publications
(380 reference statements)
0
27
0
Order By: Relevance
“…Various surveys have attempted to describe machine learning-based IDSs for protection against IoT networks or compromised IoT devices. The surveys cover research work on IDSs for cloud-based IoT systems [16], Wireless sensor networks [17][18][19], cyber-physical systems [20], and mobile ad hoc networks (MANETs) [21][22][23]. However, traditional IDS methods are less effective or insufficient for the security of IoT systems because of their peculiar characteristics mentioned above, in particular, limited energy, ubiquitous, heterogeneity, limited bandwidth capacity and global connectivity.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Various surveys have attempted to describe machine learning-based IDSs for protection against IoT networks or compromised IoT devices. The surveys cover research work on IDSs for cloud-based IoT systems [16], Wireless sensor networks [17][18][19], cyber-physical systems [20], and mobile ad hoc networks (MANETs) [21][22][23]. However, traditional IDS methods are less effective or insufficient for the security of IoT systems because of their peculiar characteristics mentioned above, in particular, limited energy, ubiquitous, heterogeneity, limited bandwidth capacity and global connectivity.…”
Section: Motivationmentioning
confidence: 99%
“…While the third one can be a hybrid of both using mobile agents. Another study [23] discussed various Intrusion Detection algorithms related to IDS implementation in MANET. According to the authors, these IDS algorithms can be categorized in various categories based on the underlying principle used for the detection of an attack.…”
Section: Current Reviewsmentioning
confidence: 99%
See 1 more Smart Citation
“…The guard node is between the sending node and the receiving node, which can be used for normal communication and monitoring. The selection of guard nodes is based on the location and trustworthiness of the nodes [18,33,34]. Because the continuous data flow network in this paper is not a WSN-like mobile ad-hoc network, so when selecting guard nodes, we do not need to consider the location factor, but only need to select according to the trustworthiness of the nodes.…”
Section: Anomalous Nodes Discovery and Confidence Evaluationmentioning
confidence: 99%
“…Several works have been suggested in a MANET to detect and prevent the network from dropping and data integrity intrusions [3]. The intrusion detection systems have been categorized into proactive and reactive mechanisms.…”
Section: Related Workmentioning
confidence: 99%