Mitrokotsa et al., 2007 - Google Patents
Intrusion detection and response in ad hoc networksMitrokotsa et al., 2007
View PDF- Document ID
- 14954014759696569660
- Author
- Mitrokotsa A
- Komninos N
- Douligeris C
- Publication year
- Publication venue
- International Journal of Computer Research, to appear, available upon request
External Links
Snippet
Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be …
- 238000001514 detection method 0 title abstract description 85
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | Security considerations in ad hoc sensor networks | |
Zhang et al. | Intrusion detection techniques for mobile wireless networks | |
Giruka et al. | Security in wireless sensor networks | |
Lou et al. | A survey of wireless security in mobile ad hoc networks: challenges and available solutions | |
Krontiris et al. | LIDeA: a distributed lightweight intrusion detection architecture for sensor networks | |
Razaque et al. | Secure data aggregation using access control and authentication for wireless sensor networks | |
Elhoseny et al. | Recent advances of secure clustering protocols in wireless sensor networks | |
Sultana et al. | Kinesis: a security incident response and prevention system for wireless sensor networks | |
Drira et al. | ECGK: An efficient clustering scheme for group key management in MANETs | |
Yadav et al. | Cluster-based classical routing protocols and authentication algorithms in WSN: a survey based on procedures and methods | |
Sankar et al. | Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. | |
Padiya et al. | Survey of innovated techniques to detect selfish nodes in MANET | |
Sen et al. | A distributed trust mechanism for mobile ad hoc networks | |
Sen | A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network | |
Mitrokotsa et al. | Intrusion detection and response in ad hoc networks | |
Sen et al. | A distributed intrusion detection system for wireless ad hoc networks | |
Sreevidya et al. | False data injection prevention in wireless sensor networks using node-level trust value computation | |
Yu et al. | A new secure routing protocol to defend byzantine attacks for ad hoc networks | |
Mitrokotsa et al. | Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks | |
Alrammahi et al. | WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS UNDER SINKHOLE ATTACKS. | |
Raju et al. | Mobile ad hoc networks security | |
Khan | New scheme to prevent node replication attacks for wireless sensor networks | |
Soundararajan et al. | Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection. | |
Caballero‐Gil et al. | Self‐organizing life cycle management of mobile ad hoc networks | |
Dinker et al. | Sensor Network Security |