Threshold-based intrusion detection in ad hoc networks and secure AODV.
Anand PatwardhanJim ParkerMichaela IorgaAnupam JoshiTom KarygiannisYelena YeshaPublished in: Ad Hoc Networks (2008)
Keyphrases
- ad hoc networks
- intrusion detection
- key management
- key management scheme
- network topology
- routing protocol
- wireless ad hoc networks
- intrusion detection system
- anomaly detection
- end to end
- quality of service
- network security
- wireless networks
- routing algorithm
- mobile ad hoc networks
- peer to peer
- information security
- network traffic
- end to end delay
- multi hop
- mobile networks
- security issues
- security protocols
- base station
- ns simulator
- wireless sensor networks
- data mining
- mobile nodes
- security requirements
- wireless mesh networks
- network infrastructure
- security mechanisms
- data sets
- data mining techniques
- packet delivery
- key establishment
- routing scheme