Distributed low-cost backbone formation for wireless ad hoc networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Simple approximation algorithms and PTASs for various problems in wireless ad hoc networks
Journal of Parallel and Distributed Computing - Special issue: Algorithms for wireless and ad-hoc networks
Efficient Distributed Low-Cost Backbone Formation for Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A hybrid data mining anomaly detection technique in ad hoc networks
International Journal of Wireless and Mobile Computing
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Enhanced intrusion detection systems in ad hoc networks using a grid based agnostic middleware
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Wireless Personal Communications: An International Journal
Intrusion detection in WSN-based intelligent transportation systems
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology.Wireless networks are particularly vulnerable to intrusion,as they operate in open medium,and use cooperative strategies for network communications.By efficiently merging audit data from multiple network sensors,we analyze the entire ad hocwireless network for intrusions and try to inhibit intrusion attempts.In contrast to many intrusion detection systems designed for wired networks,we implement an efficient and bandwidth-conscious framework that targets intrusion at multiple levels and takes into accountdistributed nature of ad hoc wireless network management and decision policies.