2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733)
DOI: 10.1109/wcnc.2004.1311618
|View full text |Cite
|
Sign up to set email alerts
|

Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…To study the effectiveness of our approach, we have implemented anomaly detection in the Network Simulator, ns-2, software using three popular proactive and ondemand routing protocols, mainly the Dynamic Source Routing (DSR) protocol [20], the Ad-Hoc On-Demand Distance Vector Routing (AODV) protocol [1,19], and the Destination-Sequenced Distance-Vector Routing (DSDV) protocol [24,25]. Table I) to all reachable destinations in DSDV and AODV.…”
Section: Resultsmentioning
confidence: 99%
“…To study the effectiveness of our approach, we have implemented anomaly detection in the Network Simulator, ns-2, software using three popular proactive and ondemand routing protocols, mainly the Dynamic Source Routing (DSR) protocol [20], the Ad-Hoc On-Demand Distance Vector Routing (AODV) protocol [1,19], and the Destination-Sequenced Distance-Vector Routing (DSDV) protocol [24,25]. Table I) to all reachable destinations in DSDV and AODV.…”
Section: Resultsmentioning
confidence: 99%
“…The authors of works [15,[23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] specify the usage of intrusion detection within the field of ad-hoc networks. This field is, as expected, more compact and specific, as general networking techniques and computing power is no longer as applicable as in the traditional static-networkbased IDS scheme.…”
Section: Componentmentioning
confidence: 99%
“…On the prevention side, general approaches such as key generation and management have been used in a distributed manner to ensure the authenticity and integrity of routing information [5,7,9,30].…”
Section: Intrusion Detection Challengesmentioning
confidence: 99%
“…In the protocol, node X 1 first computes and C compute 7 y with a one-way hash function and send message (M2) to node X 1 .…”
Section: Fig 2 -New Nodes In Manetmentioning
confidence: 99%