2010
DOI: 10.5539/cis.v4n1p151
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Techniques for Detecting Misbehaving Nodes

Abstract:

A Mobile Ad hoc Network (MANET) consists of a group of autonomous mobile nodes with wireless transmission capability without using any existing infrastructure or centralized administration. The MANET environment is particularly vulnerable due to its dynamic topology, less powerful mobile devices and distributed environment. Current solutions for security are more geared towards wired networks. Therefore, they are not applicable for wireless ad hoc networks and cannot be applied without modifications in this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…A token-based umpiring technique is introduced in [17] to detect and isolate the selfish nodes. An intrusion detetcion system is proposed in [18] to prevent and recognize the selfish nodes.…”
Section: Related Workmentioning
confidence: 99%
“…A token-based umpiring technique is introduced in [17] to detect and isolate the selfish nodes. An intrusion detetcion system is proposed in [18] to prevent and recognize the selfish nodes.…”
Section: Related Workmentioning
confidence: 99%
“…A token-based umpiring technique is introduced in [17] to detect and isolate the selfish nodes. An intrusion detetcion system is proposed in [18] to prevent and recognize the selfish nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Here 1 and 1 are the coordinate of the source node and 2 and 2 are the coordinate of the destination node. The availability of bandwidth can be calculated based on the consumed bandwidth and total bandwidth as given in Equation (18).…”
Section: Chimp-aodvmentioning
confidence: 99%
“…The path metric can be calculated based on node rating and link reliability. It is an extension to DSR (Pakzad and Rafsanjani, 2011).…”
Section: Secure Routing Protocolsmentioning
confidence: 99%
“…It checks whether the neighbour is correctly forwarding the data or not. If the neighbouring node is found to drop the data, then that node is considered as malicious (Pakzad and Rafsanjani, 2011).…”
Section: Secure Routing Protocolsmentioning
confidence: 99%