2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT) 2015
DOI: 10.1109/erect.2015.7499026
|View full text |Cite
|
Sign up to set email alerts
|

ZIDS: Zonal-based Intrusion Detection System for studying the malicious node behaviour in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Sangeetha and Kumar [19] presenting an packet transmission characteristics of portable nodes in ad hoc organize are very confounding to comprehend attributable to the decentralized design and dynamic topology. The current framework has introduced different security arrangements to comprehend the noxious movement of the enemy.…”
Section: Related Workmentioning
confidence: 99%
“…Sangeetha and Kumar [19] presenting an packet transmission characteristics of portable nodes in ad hoc organize are very confounding to comprehend attributable to the decentralized design and dynamic topology. The current framework has introduced different security arrangements to comprehend the noxious movement of the enemy.…”
Section: Related Workmentioning
confidence: 99%
“…SRA has higher throughput than currently used methods as a result. Throughput % of Attack Nodes AIS [19] ZIDS [21] Improved AODV [25] Proposed Approach…”
Section: Network Throughputmentioning
confidence: 99%
“…Because of their decentralized structure and changeable architecture, Sangeetha and Kumar [21] give data packet metrics of mobile nodes in ad hoc architecture that are particularly difficult to understand. To understand the poisonous motion of the adversary, the current structure has implemented several security procedures.…”
Section: Related Workmentioning
confidence: 99%
“…The way in which the measure of confidence is generated, allows us to divide the strategies, structures that contain the actions to be developed, into the types mentioned below we will mention the main characteristics [20] of each types: a) Cluster: This trust scheme uses authentication by means of public keys in the evaluation of a node, these are grouped into clusters which allows a group of nodes to monitor the activity of the equipment directly, the nodes certify the trust of a computer which can be verified with the use of the key and a certificate issued by each neighbour, the nodes which issue trust certificates [21,22] which do not coincide with the evaluation of the Cluster would be considered "malicious" nodes and would lose the possibility of participating in the network [23,24]. b) Social networks: Model based on four components on each computer; Monitor that detects unusual behaviour in the nodes, reputation system that allows the nodes to be qualified acording to their routing or data transmission actions, route manager in charge of selecting the routes they present, and a trusted manager that alerts to the so-called malicious nodes.…”
Section: Trusted Modelsmentioning
confidence: 99%