An IDS First Line of Defense for Ad Hoc Networks.
Alia FouratiKhaldoun Al AghaPublished in: WCNC (2007)
Keyphrases
- ad hoc networks
- intrusion detection
- intrusion detection system
- network topology
- routing protocol
- end to end
- wireless ad hoc networks
- wireless networks
- network security
- quality of service
- routing algorithm
- key management
- mobile wireless
- peer to peer
- mobile networks
- multi hop
- base station
- mobile ad hoc networks
- wireless mesh networks
- end to end delay
- mac protocol
- limited bandwidth
- mobile nodes
- anomaly detection
- wired networks
- data sets
- communication networks
- network infrastructure
- propagation model
- multipath routing