Secure routing and intrusion detection in ad hoc networks

A Patwardhan, J Parker, A Joshi, M Iorga… - Third IEEE …, 2005 - ieeexplore.ieee.org
Security features in the routing protocol include mechanisms for non-… detect and thwart
malicious attacks. We discuss several scenarios where the secure routing and intrusion detection

[HTML][HTML] Secure intrusion detection system routing protocol for mobile ad‐hoc network

R Prasad - Global Transitions Proceedings, 2022 - Elsevier
… The secure routing algorithms deals with the identify the route … to ensure these networks are
secure for transmission of data … on secure routing algorithms to discover secure route paths …

Secure routing in ad hoc networks and a related intrusion detection problem

W Zhang, R Rao, G Cao… - … , 2003. MILCOM 2003., 2003 - ieeexplore.ieee.org
secure routing in ad hoc wireless networks, and discuss the related techniques of cryptographic
key distribution. However; no matter how secure the routing … the described secure muting …

A wireless intrusion detection system for secure clustering and routing in ad hoc networks

L Bononi, C Tacconi - Information Security: 9th International Conference …, 2006 - Springer
Intrusion detection and secure routing schemes have been proposed for increasing the security
… present an integrated secure routing system based on Intrusion Detection Systems (IDS) …

Intrusion detection for secure clustering and routing in mobile multi-hop wireless networks

L Bononi, C Tacconi - International journal of information security, 2007 - Springer
Intrusion detection and secure routing schemes have been proposed for increasing security
… In this paper we present an integrated secure routing system based on Intrusion Detection

Cross centric intrusion detection system for secure routing over black hole attacks in MANETs

N Rajendran, PK Jawahar, R Priyadarshini - Computer Communications, 2019 - Elsevier
… , the Cross Centric Intrusion Detection System and secure routing parameters are created
for finding the Black Hole attack and utilize best secure route. Furthermore the past interaction …

A secure routing protocol with intrusion detection for clustering wireless sensor networks

X Zhenghong, C Zhigang - 2010 International Forum on …, 2010 - ieeexplore.ieee.org
… a secure routing protocol with intrusion detection based on … model of nodes is used to
detect attacks in the cluster head … secure routing protocol from the point of intrusion detection. …

An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
… for assuring security in the network [27]. In the past few years, the secure routing in MANETs
is enabled using the pricing-based methods [28, 29], trust-based security strategies [14, 15], …

An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks

P Aruchamy, S Gnanaselvi… - Concurrency and …, 2023 - Wiley Online Library
… The insecure route also affects the energy efficiency of IWSN. Therefore, robust intrusion
detection along with secure routing is necessitated to protect the IWSN from various security

Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques

K Rui, H Pan, S Shu - Scientific Reports, 2023 - nature.com
Routing and security are the two main prerequisites for ensuring the correct operation of …
This paper presents an algorithm to improve Secure Routing in IoT called SRAIOT. This …