Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks

Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks

    • €13.99
    • €13.99

Publisher Description

This paper investigates the rise in popularity of MANETs (Mobile Ad Hoc Networks) and discusses their valuable role in all manner of situations that require a rapid deployment, and a highly flexible and dynamic approach to mobile networking. The paper examines the advantages, along with the limitations of MANETs, and identifies many of the current security concerns. Examining these concerns has exposed DoS attacks as being of high priority when planning for, and provisioning a secure network. The role of the IDS has been identified as being a crucial element in the security requirements.

However, it has also been identified that the IDS is not a single solution, and that there are a number of options available, each suited to a particular scenario. Many of the IDS solutions have been identified as being complex and difficult to administer and maintain, and can lead to aggressive resource consumption.

In conclusion to this paper it is felt that there is further work to be done to `develop a low resource intensive node based IDS design methodology to help protect MANET nodes from DoS attacks’.

GENRE
Computing & Internet
RELEASED
2015
11 December
LANGUAGE
EN
English
LENGTH
29
Pages
PUBLISHER
GRIN Verlag
PROVIDER INFO
Open Publishing GmbH
SIZE
584.5
KB
Security and Privacy in Cyber-Physical Systems Security and Privacy in Cyber-Physical Systems
2017
Online Business Security Systems Online Business Security Systems
2007
Cyber Threat Intelligence for the Internet of Things Cyber Threat Intelligence for the Internet of Things
2020
Practical Internet Security Practical Internet Security
2007
The IoT Architect's Guide to Attainable Security and Privacy The IoT Architect's Guide to Attainable Security and Privacy
2019
The InfoSec Handbook The InfoSec Handbook
2014