Use this resource - and many more! - in your textbook!
AcademicPub holds over eight million pieces of educational content for you to mix-and-match your way.

Detecting critical nodes for MANET intrusion detection systems
By: Antonakakis, E.; Karygiannis, A.; Apostolopoulos, A.;
2006 / IEEE / 0-7695-2549-0
Description
This item was taken from the IEEE Conference ' Detecting critical nodes for MANET intrusion detection systems ' Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad hoc network does not have these types of network elements where the intrusion detection system (IDS) can collect and analyze audit data for the entire network. A number of neighbor-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. The resources consumed by ad hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. This paper presents a method for determining conditions under which critical nodes should be monitored, describes the details of a critical node test implementation, presents experimental results, and offers a new approach for conserving the limited resources of an ad hoc network IDS.
Related Topics
Routing Protocols
Security Of Data
Mobile Ad Hoc Network
Critical Node Detection
Manet Intrusion Detection Systems
Ad Hoc Routing Protocols
Mobile Ad Hoc Networks
Intrusion Detection
Routing Protocols
Telecommunication Traffic
Face Detection
Network Topology
Data Security
Monitoring
Switches
Vertex-cut.
Mobile Ad Hoc Network
Manet
Intrusion Detection
Ids
Security
Edge-cut
Mobile Communication
Ad Hoc Networks
Telecommunication Security
Engineering
Ad Hoc Networks