Nayyar, 2013 - Google Patents
Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETSNayyar, 2013
View PDF- Document ID
- 15311044029534268886
- Author
- Nayyar A
- Publication year
- Publication venue
- International Journal of Computer Science and Mobile Computing
External Links
Snippet
Mobile Ad hoc network (MANET) is a kind of wireless network which has no infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes. Due to unique characteristic of MANETs, it creates a …
- 238000001514 detection method 0 title abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
- H04W40/14—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/20—Hop count for routing purposes, e.g. TTL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nakayama et al. | A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks | |
| Liu et al. | A dynamic trust model for mobile ad hoc networks | |
| Yamini et al. | Improving routing disruption attack detection in MANETs using efficient trust establishment | |
| Kumar et al. | An empirical critique of on-demand routing protocols against rushing attack in MANET | |
| Arul Selvan et al. | Malicious node identification using quantitative intrusion detection techniques in MANET | |
| Kousar et al. | A Secure Data Dissemination in a DHT‐Based Routing Paradigm for Wireless Ad Hoc Network | |
| Upadhyay et al. | Avoiding Wormhole attack in MANET using statistical analysis approach | |
| Vijayakumar et al. | Study on reliable and secure routing protocols on manet | |
| Kolade et al. | Performance analysis of black hole attack in MANET | |
| Panos et al. | A novel intrusion detection system for MANETs | |
| Sumit et al. | Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining | |
| CN106412888B (en) | Appearance based on performance feedback invades method for routing | |
| Nayyar | Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS | |
| Veerasamy et al. | Angle and context free grammar based precarious node detection and secure data transmission in MANETs | |
| Kasiran et al. | Throughput performance analysis of the wormhole and sybil attack in AODV | |
| Kurosawa et al. | A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks | |
| Chandan et al. | Performance analysis of AODV under black hole attack | |
| Vadhana Kumari et al. | RTO‐TV: Routed Tree Optimization and Trust‐Value‐Based Security Scheme to Prevent Black Hole Attack in MANET | |
| Fujita et al. | An effective ids against routing attacks on mobile ad-hoc networks | |
| Yadav et al. | An authenticated enrolment scheme of nodes using blockchain and prevention of collaborative blackhole attack in WSN | |
| Mobinunnisa et al. | Detection of multiple malicious nodes in MANETS in a single query | |
| Roy et al. | BHIDS: a new, cluster based algorithm for black hole IDS | |
| Sangeetha et al. | Detection of malicious node in mobile ad-hoc network | |
| Reddy et al. | An effective analysis on intrusion detection systems in wireless mesh networks | |
| Roy et al. | Prevention against internal attack via trust-based detection for wireless mesh networks |