A distributed intrusion detection system for resource-constrained devices in ad-hoc networks.
Adrian P. LaufRichard A. PetersWilliam H. RobinsonPublished in: Ad Hoc Networks (2010)
Keyphrases
- resource constrained
- ad hoc networks
- key management
- wired networks
- routing protocol
- wireless sensor networks
- network nodes
- sensor networks
- embedded systems
- network topology
- network infrastructure
- routing algorithm
- multipath
- end to end
- resource constraints
- wireless networks
- wireless ad hoc networks
- peer to peer
- quality of service
- rfid tags
- base station
- mobile ad hoc networks
- multi hop
- security mechanisms
- mobile networks
- sensor nodes
- mobile devices
- energy consumption
- wireless mesh networks
- service differentiation
- multimedia
- multipath routing
- energy efficient
- data streams