Trust-based intrusion detection with secure key management integrated into MANET.
K. ShanthiD. MuruganT. Ganesh KumarPublished in: Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
- intrusion detection
- key management
- ad hoc networks
- key management scheme
- mobile ad hoc networks
- key distribution
- intrusion detection system
- routing protocol
- anomaly detection
- wireless sensor networks
- network intrusion detection
- network traffic
- security services
- routing algorithm
- network topology
- end to end
- network security
- resource constrained
- secure communication
- digital signature
- wireless networks
- provably secure
- security protocols
- secret key
- mobile networks
- quality of service
- identity based cryptography
- information security
- key establishment
- elliptic curve
- diffie hellman
- peer to peer
- detecting anomalous
- data mining
- resource constraints
- mobile users
- smart card
- data mining techniques