2014
DOI: 10.14257/ijgdc.2014.7.6.20
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…By verifying it, the validity of the acknowledgement report can be determined. Mamatha S. and A.Damodaran provided the method for detecting and isolating malicious node by using an anomaly based IDS that monitors the node behavior to avoid the occurrence of the attacks [10]. Data transmission quality function is used for identification of normal nodes with malicious nodes.…”
Section: Defensive Techniques Implementedmentioning
confidence: 99%
“…By verifying it, the validity of the acknowledgement report can be determined. Mamatha S. and A.Damodaran provided the method for detecting and isolating malicious node by using an anomaly based IDS that monitors the node behavior to avoid the occurrence of the attacks [10]. Data transmission quality function is used for identification of normal nodes with malicious nodes.…”
Section: Defensive Techniques Implementedmentioning
confidence: 99%