[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Mitrokotsa et al., 2007 - Google Patents

Intrusion detection and response in ad hoc networks

Mitrokotsa et al., 2007

View PDF
Document ID
14954014759696569660
Author
Mitrokotsa A
Komninos N
Douligeris C
Publication year
Publication venue
International Journal of Computer Research, to appear, available upon request

External Links

Snippet

Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Hu et al. Security considerations in ad hoc sensor networks
Zhang et al. Intrusion detection techniques for mobile wireless networks
Giruka et al. Security in wireless sensor networks
Lou et al. A survey of wireless security in mobile ad hoc networks: challenges and available solutions
Krontiris et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Razaque et al. Secure data aggregation using access control and authentication for wireless sensor networks
Elhoseny et al. Recent advances of secure clustering protocols in wireless sensor networks
Sultana et al. Kinesis: a security incident response and prevention system for wireless sensor networks
Drira et al. ECGK: An efficient clustering scheme for group key management in MANETs
Yadav et al. Cluster-based classical routing protocols and authentication algorithms in WSN: a survey based on procedures and methods
Sankar et al. Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes.
Padiya et al. Survey of innovated techniques to detect selfish nodes in MANET
Sen et al. A distributed trust mechanism for mobile ad hoc networks
Sen A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network
Mitrokotsa et al. Intrusion detection and response in ad hoc networks
Sen et al. A distributed intrusion detection system for wireless ad hoc networks
Sreevidya et al. False data injection prevention in wireless sensor networks using node-level trust value computation
Yu et al. A new secure routing protocol to defend byzantine attacks for ad hoc networks
Mitrokotsa et al. Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks
Alrammahi et al. WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS UNDER SINKHOLE ATTACKS.
Raju et al. Mobile ad hoc networks security
Khan New scheme to prevent node replication attacks for wireless sensor networks
Soundararajan et al. Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection.
Caballero‐Gil et al. Self‐organizing life cycle management of mobile ad hoc networks
Dinker et al. Sensor Network Security