Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks 2007
DOI: 10.1145/1298239.1298259
|View full text |Cite
|
Sign up to set email alerts
|

Methodologies and frameworks for testing ids in adhoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…In the scenarios, obstacles, group movements, and tactical areas are considered. As one example for a military scenario in [17] a hostage rescue scenario was specified. The scenario is divided into periods (e.g., march, pull, fallback).…”
Section: Models For Tactical Scenariosmentioning
confidence: 99%
“…In the scenarios, obstacles, group movements, and tactical areas are considered. As one example for a military scenario in [17] a hostage rescue scenario was specified. The scenario is divided into periods (e.g., march, pull, fallback).…”
Section: Models For Tactical Scenariosmentioning
confidence: 99%
“…In a Mobile ad-hoc Network (MANET), each node act as a router for other nodes, which allows data to travel, utilizing multi-hop network paths, beyond the line of sight without relying on wired infrastructure. Security in such networks, however, is a great concern [1,2,7,5]. The open nature of the wireless medium makes it easy for outsiders to listen to network traffic or interfere with it.…”
Section: Introductionmentioning
confidence: 99%
“…Lack of clear network entry points also makes it difficult to implement perimeter-based defence mechanisms such as firewalls. Finally, in a MANET nodes might be battery-powered and might have very limited resources, which may make the use of heavy-weight security solutions undesirable [2,3,5,7,4].…”
Section: Introductionmentioning
confidence: 99%
“…In this system the opponent nodes are not removed from network but black listed. As Selfish node detection depends on other nodes that minimize the IDS reliability because the above mentioned nodes may give error result that may be blacklisted in non enemy node [8]. In credit based system node S sends Central Authorized Server (CAS) a receipt to each forward packet, then the Central Authorized Server provide credits to node depending upon the receipt.…”
mentioning
confidence: 99%