A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020 - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Collaborative trust aware intelligent intrusion detection in VANETs

N Kumar, N Chilamkurti - Computers & Electrical Engineering, 2014 - Elsevier
Abstract Trust aware Collaborative Learning Automata based Intrusion Detection System (T-
CLAIDS) for VANETs is proposed in this paper. Learning Automata (LA) are assumed to be …

A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks

N Mohd, A Singh, HS Bhadauria - Wireless Personal Communications, 2020 - Springer
It is well known that the safety, reliability and energy efficiencies are the prime concerns
while designing and deploying wireless sensor networks. Therefore, unattained features …

A distributed intrusion detection system for resource-constrained devices in ad-hoc networks

AP Lauf, RA Peters, WH Robinson - Ad Hoc Networks, 2010 - Elsevier
This paper describes the design and implementation of a two-stage intrusion detection
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

A comparative evaluation of intrusion detection architectures for mobile ad hoc networks

C Xenakis, C Panos, I Stavrakakis - Computers & Security, 2011 - Elsevier
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their
operation and the provided services. Intrusion Detection Systems (IDSs) may act as …

Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation

N Khanna, M Sachdeva - International Journal of …, 2019 - Wiley Online Library
Security against routing attacks in MANET is most critical issue and traditional concepts of
cryptography, authentication, or Watchdog are not that significant in mitigation of these …

An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing

N Kumar, JP Singh, RS Bali, S Misra, S Ullah - Cluster Computing, 2015 - Springer
In recent years, vehicular cloud computing (VCC) has emerged as a new technology which
is being used in wide range of applications in the area of multimedia-based healthcare …

Fuzzy-assisted social-based routing for urban vehicular environments

RH Khokhar, R Md Noor, KZ Ghafoor, CH Ke… - EURASIP journal on …, 2011 - Springer
In the autonomous environment of Vehicular Ad hoc NETwork (VANET), vehicles randomly
move with high speed and rely on each other for successful data transmission process. The …