Academic literature on the topic 'Types of MANET and IDS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Types of MANET and IDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Types of MANET and IDS"

1

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly.This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researches achievement on MANET are presented inclusively in this paper, and then the comparison among several researches achievement is evaluated based on these parameter.
APA, Harvard, Vancouver, ISO, and other styles
2

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researches achievement on MANET are presented inclusively in this paper, and then the comparison among several researches achievement is evaluated based on these parameter.
APA, Harvard, Vancouver, ISO, and other styles
3

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Full text
Abstract:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to choose the leader nodes or cluster head dynamically depending on store capacity and power support, we have described the design and testing of dynamic cluster-based intrusion detection systems (IDS) in this technical research study. Another maximum forward capacity leader node is chosen based on the aforementioned resource limits in the event that a specific organizer node abruptly leaves the transmission range. Compared to other networks, MANET is more susceptible to attacks, and different types of attacks are limited to the network's functionality. MARS4, a hybrid cryptographic technique that combines the RSA and MAJE4 algorithms, is used to securely transmit data over the MANET using the Dynamic Source Routing (DSR) routing protocol. The proposed system is implemented and analyzed using Network Simulator (NS2). In addition to offering secure transmission, our suggested hybrid cryptography lowers routing overhead, increases packet delivery ratio and throughput, and efficiently uses bandwidth.</em>
APA, Harvard, Vancouver, ISO, and other styles
4

Dixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.

Full text
Abstract:
<em>Abstract- </em>Mobile Ad-hoc network (MANET) is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. Due to problems like wireless radio, limited battery power, limited bandwidth and dynamic topology environment, nodes are susceptible for intrusion and attack. Security is an important field in this type of network. Each node in a MANET is capable of acting as a router. Routing and routing protocols are important aspects having various security concerns. The bio-inspired approach known as Particle Swarm Optimization (PSO) based on Swarm Intelligence (SI) is suggested for finding solution against attacks in the network. In this paper a survey of different types of attacks are presented and intrusion detection (ID) mechanisms based on PSO is discussed. &nbsp; <em>Keywords- Mobile Ad-Hoc Network (MANET), Intrusion Detection Systems (IDS), Swarm intelligence (SI), Particle Swarm optimization (PSO)</em>
APA, Harvard, Vancouver, ISO, and other styles
5

Javidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.

Full text
Abstract:
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and intrusion tolerance phase. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theory approaches to address the network security issues. This paper reviews some existing game theory solutions which are designed to enhance network security in the intrusion detection phase. Keywords: Mobile Ad hoc Network (MANET), Intrusion detection system (IDS), Cluster head, host based, Game theory.
APA, Harvard, Vancouver, ISO, and other styles
6

Einy, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.

Full text
Abstract:
Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks has led to many challenges, one of the most important of which is network security. In this regard, a lack of regulatory and security infrastructure in MANETs has caused some problems in sending and receiving data, where intrusion in the network has been recognized as one of the most important issues. In MANETs, wireless notes act as a link between the source and destination nodes and play the role of relays and routers in the network. Therefore, malicious node penetration and the destruction of information packages become feasible. Today, intrusion detection systems (IDSs) are used as a solution to deal with the problem through remote monitoring of the performance and behaviors of nodes existing in wireless sensor networks. In addition to detecting malicious nodes in the network, IDSs can predict the behavior of malicious nodes in the future in most cases. Therefore, the present study introduced a network IDS (NIDS) entitled MOPSO-FLN by using a combination of multiobjective particle swarm optimization algorithm- (MOPSO-) based feature subset selection (FSS) and fast-learning network (FLN). In this work, we used the KDD Cup99 and dataset to select features, train the network, and test the model. According to the simulation results, this method was able to improve the performance of the IDS in terms of evaluation criteria, compared to other previous methods, by creating a balance between the objectives of the number of representative features and training errors based on the evolutionary power of MOPSO.
APA, Harvard, Vancouver, ISO, and other styles
7

K.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.

Full text
Abstract:
<em>Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that current IDS solutions cannot address, the solutions might not always be enough. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediary nodes on a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, therefore the protocol cooperates to analyze and discover malicious nodes in MANETs in a reliable way. In this study, they suggest black-hole assaults as an analysis approach to detect malicious nodes. In order to validate our created method, we used the Modified-Zone based Hierarchical Link State (M-ZHLS) hybrid routing protocol with mobile nodes in Network Simulations 2 (NS2). When mobility speed and topology size change, it is found that the Zone based Hierarchical Link State (ZHLS) routing protocol has a very good detection rate for black holes and malicious nodes, a lower average delay, and an increased packet delivery ratio. </em>
APA, Harvard, Vancouver, ISO, and other styles
8

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, so the protocol cooperates to analyze and detect malicious nodes in MANETs in a reliable way. In this paper, they propose black-hole attacks as an analysis method to detect malicious nodes. In order to validate our developed scheme, we used the Modified-Zone based Hierarchical Link State (M-ZHLS) hybrid routing protocol with mobile nodes in Network Simulations 2 (NS2). When mobility speed and topology size change, it is found that the Zone based Hierarchical Link State (ZHLS) routing protocol has a very good detection rate for black holes and malicious nodes, a lower average delay, and an increased packet delivery ratio.</em>
APA, Harvard, Vancouver, ISO, and other styles
9

POOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.

Full text
Abstract:
A Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other throughradio waves without the aid of any stand-alone infrastructure or centralized administration. These nodes are self-organizing and self-configuring and they act as both hostas well as routers.In MANET each node is free to move independently.MANET is simple and flexible hence widely used in military communication, emergency communication and mobile conferencing. Due to dynamic nature and no certification authority, MANETs are more prone to different types of attacks. The essential requirement for the establishment of communication among different nodes in MANET is that, nodes should cooperate with each other. If misbehaving nodes are present, it may lead to serious security concerns. This paper reviews various techniques available for detecting and preventing malicious node behaviour. Each paper is reviewed with the metrics like type of misbehaviour, detection mechanism, advantages and limitations. Based on our review we are proposing the improved bait detection mechanism.(IBDS), for the detection of misbehaving node that combines the advantages of both proactive and reactive defense schemes. https://journalnx.com/journal-article/20150315
APA, Harvard, Vancouver, ISO, and other styles
10

Marepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.

Full text
Abstract:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc. When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an insider. Among various mobility models to generate mobility patterns the Random waypoint mobility model is used .To solve these issues an IDPS framework for MANET using image processing techniques under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like authentication and confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Types of MANET and IDS"

1

Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.

Full text
Abstract:
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection diagnostic system including complex hybridization of a 3D full color Self-Organizing Map (SOM), Artificial Immune System Danger Theory (AISDT), and a Fuzzy Inference System (FIS). This SOM+ diagnostic archetype includes newly defined intrusion types to facilitate diagnostic analysis, a descriptive computational model, and an Invisible Mobile Network Bridge (IMNB) to collect data, while maintaining compatibility with traditional packet analysis. This system is modular, multitaskable, scalable, intuitive, adaptable to quickly changing scenarios, and uses relatively few resources.
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, Shang-Wei, and 鍾尚衛. "Applying Dynamic Trust on The Union-Defense-Based IDS of MANET." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/39061451855311049185.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Types of MANET and IDS"

1

Hassan, Khondekar Lutful, Somnath Bera, and Pranab Bag. "Agent Based IDS Using RMBOPB Technique in MANET." In Communications in Computer and Information Science. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6427-2_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Puttini, Ricardo S., Jean-Marc Percher, Ludovic Mé, et al. "A Modular Architecture for Distributed IDS in MANET." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44842-x_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pathak, Priya, Ekta Chauhan, Sugandha Rathi, and Siddhartha Kosti. "HMM-Based IDS for Attack Detection and Prevention in MANET." In Information and Communication Technology for Sustainable Development. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3920-1_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chawla, Kitti, Jasmeen Gill, and Mohanjeet Singh. "Comprehensive Survey of IDS Techniques in Mobile Ad Hoc Network (MANET)." In Soft Computing for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1048-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, C. Edwin, and J. Amar Pratap Singh. "An Investigation of Machine Learning-Based IDS for Green Smart Transportation in MANET." In Artificial Intelligence for Smart Healthcare. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23602-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kuchaki Rafsanjani, Marjan, and Arsham Borumand Saeid. "Determination of IDS Agent Nodes Based on Three-Tiered Key Management Framework for MANET." In Networked Digital Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14306-9_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hota, H. S., and Akhilesh Kumar Shrivas. "Data Mining Approach for Developing Various Models Based on Types of Attack and Feature Selection as Intrusion Detection Systems (IDS)." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meddeb Rahma, Triki Bayrem, Jmili Farah, and Korbaa Ouajdi. "An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2018. https://doi.org/10.3233/978-1-61499-900-3-201.

Full text
Abstract:
The connectivity of mobile networks is increasing heavily and the evolution of the risks is highly dynamic. In Mobile Ad Hoc Network (MANET), attacks and digital attacks are becoming increasingly complex. Due to their nature, these networks make some information unavailable and/or incomplete needed for attacks detection process. Several solutions have been made to ensure the security of mobile networks specially intrusion detection systems (IDS). This solution allows enhancing IDS detection efficiency even with incomplete information about occurred attacks. In this paper, we propose an IDS based on three algorithms NCF, FNF and DPA allowing special traffic abstraction and data collection. We used these algorithms to generate a &amp;quot;behavioral database&amp;quot; for supervised nodes in the network. We study and implement four types of Denial of Service (DoS) attacks, which could disturb the routing process in MANET. These attacks are Blackhole, Grayhole, Wormhole, and Flooding attack. We generate these types of attacks by modifying the normal AODV routing algorithm behavior. We have implemented these attacks using Opnet Modeler 14.5. We proposed a set of IDS nodes to supervise the network behavior using Fuzzy Inference System (FIS). These nodes identify a pattern for each attack behavior to be stored in the &amp;quot;behavioral database&amp;quot;. The performance of a network under attack is investigated.
APA, Harvard, Vancouver, ISO, and other styles
9

Pradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch026.

Full text
Abstract:
Over the last two decades, computer and network security has become a main issue, especially with the increase number of intruders and hackers, therefore systems were designed to detect and prevent intruders. This chapter per the authors investigated the most important design approaches, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products. For the collecting capability, there were two main approaches, namely host- and network-based IDSs. Therefore, a combination of the two approaches in a hybrid implementation is ideal, as it will offer the highest level of protection at all levels of system functions. The analysis capability of an IDS can be characterised by the misuse and anomaly detection approaches. Therefore, a combination of the two approaches should improve the analysis capability of an IDS i.e. hybrid of misuse and anomaly detection.
APA, Harvard, Vancouver, ISO, and other styles
10

Pradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch009.

Full text
Abstract:
Over the last two decades, computer and network security has become a main issue, especially with the increase number of intruders and hackers, therefore systems were designed to detect and prevent intruders. This chapter per the authors investigated the most important design approaches, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products. For the collecting capability, there were two main approaches, namely host- and network-based IDSs. Therefore, a combination of the two approaches in a hybrid implementation is ideal, as it will offer the highest level of protection at all levels of system functions. The analysis capability of an IDS can be characterised by the misuse and anomaly detection approaches. Therefore, a combination of the two approaches should improve the analysis capability of an IDS i.e. hybrid of misuse and anomaly detection.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Types of MANET and IDS"

1

Maurer, Jack R. "Results of Seven Years Exposure of Dissimilar Metal Crevice Assemblies in Filtered Seawater." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93490.

Full text
Abstract:
Abstract The super stainless alloys began to make a major impact on material applications in the late seventies and early eighties. Both ferritic and austenitic alloys were developed, tested and applied to severe corrosive environments to bridge the gap between the standard alloys and the exotic high technology materials. Laboratory and natural marine exposures with and without non-metallic crevice formers demonstrated the highly resistant properties of these materials. Both types demonstrated superior resistance chloride pitting and crevice corrosion. In controlled laboratory tests, the superferritics displayed a greater resistance to aggressive ferric chloride solutions than the super ausienitics. Applications of the superferritics uncovered a susceptibility to a form of attack called dissimilar metal crevice(DMC) corrosion. This was encountered in an application where superferritic tubes were roller expanded into a Type 316 tubesheet. Crevice corrosion initiated in the holes of the tubesheet material. As it progressed the concentration of metal ions and chlorides increased, dropping the pH of the crevice solution and eventually depassivating and attacking the nickel "free" ferritic alloy tube surface. Complete wall penetration occurred with some of the tubes, within the confines of the tubesheet, in less than a year. The tube IDs, which are exposed to seawater, have never shown any sign of degradation. Testing of DMC assemblies confirmed the attack within sixty days of initial exposure. In all cases, the superferritics were corroded when assembled with standard austenitic materials such as Type 316. Assemblies of 6% molybdenum alloys with T-316 resulted in the crevice corrosion of the lesser alloy, but not of the super austenitic material. Assemblies made entirely of the super stainless alloys showed no sign of attack of either alloy. Fifteen of the original assemblies immersed in slow flowing, filtered seawater in 1984 were allowed to remain in place until their removal in 1991. Five additional assemblies, using some different material combinations, were exposed in 1985 and removed at the same time as the original samples. This presentation will describe the test program and the results. It confirms the results of the short term exposures and indicates the resistance of the super austenitic alloys to DMC when exposed to marine environments. The results also confirm the long-term performances of the super ferritics and austenitics when coupled together in DMC assemblies.
APA, Harvard, Vancouver, ISO, and other styles
2

Karygiannis, A., K. Robotis, and E. Antonakakis. "Creating Offline MANET IDS Network Traces." In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 2007. http://dx.doi.org/10.1109/wowmom.2007.4351704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sujatha, K. S., Vydeki Dharmar, and R. S. Bhuvaneswaran. "Design of genetic algorithm based IDS for MANET." In 2012 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2012. http://dx.doi.org/10.1109/icrtit.2012.6206796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bahareh Pahlevanzadeh and Azman Samsudin. "Distributed hierarchical IDS for MANET over AODV+." In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/ictmicc.2007.4448633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Petersen, Erick, Marco Antonio To, and Stephane Maag. "A novel online CEP learning engine for MANET IDS." In 2017 IEEE 9th Latin-American Conference on Communications (LATINCOM). IEEE, 2017. http://dx.doi.org/10.1109/latincom.2017.8240196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mechtri, Leila, Fatiha Djemili Tolba, Salim Ghanemi, and Damien Magoni. "An IDS-based Self-healing Approach for MANET Survival." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. ACM, 2015. http://dx.doi.org/10.1145/2816839.2816840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Otrok, Hadi, Noman Mohammed, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya. "An Efficient and Truthful Leader IDS Election Mechanism for MANET." In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007). IEEE, 2007. http://dx.doi.org/10.1109/wimob.2007.4390872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rai, Sandeep, Rajesh Boghey, and Priyanka Rani Yadav. "Cluster based energy efficient authentication scheme for secure IDS over MANET." In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2017. http://dx.doi.org/10.1109/csnt.2017.8418537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sabat, Santoshkumar, and Sujata Kadam. "Adaptive Energy aware reputation based leader election for IDS in MANET." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shona, D., and M. Senthil Kumar. "Efficient IDs for MANET Using Hybrid Firefly with a Genetic Algorithm." In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2018. http://dx.doi.org/10.1109/icirca.2018.8597268.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Types of MANET and IDS"

1

Aslam, Saba, and Megan Schmidt-Sane. Evidence Review: COVID-19 Recovery in South Asian Urban Informal Settlements. SSHAP, 2022. http://dx.doi.org/10.19088/sshap.2022.012.

Full text
Abstract:
The global pandemic has brought renewed attention toward the everyday challenges in informal settlements. COVID-19 reminds us that southern urban life is rooted in ‘collective’ experiences where toilets and kitchens are shared by multiple families; where the categories of work and home, private and public space overlap; and where the majority live in vulnerable conditions. Despite these challenges, some of the most innovative and collective responses to COVID-19 have emerged from these areas. While informal settlements did face a host of risks and vulnerabilities during the pandemic, local responses have highlighted the resilience of informal settlement communities. However, few informal settlements are actually ‘resilient’ and any local responses must be robustly supported by system-wide change including support from local and national governments, improvements to built infrastructure, and improved access to health care services, among other priorities. The category of ‘informal settlements’ also captures a wide range of settlement types, from a legal slum to an informal settlement with no legal status, with many other types in between. This underscores the need to address fundamental issues that ‘perpetuate conditions of inequity, exclusion and vulnerability’ while also recognising the needs and contexts of different kinds of informal settlements. Whether COVID-19 helps governments recognise conditions of insecurity and vulnerability to address safe and secure housing and infrastructures remains to be seen. This is an update to the previous SSHAP brief on ‘COVID-19 in Informal Urban Settlements’ (March 2020). This evidence review highlights local responses, grassroots efforts, and challenges around COVID-19 recovery within urban informal settlements in South Asia. It focuses on specific examples from Karachi, Pakistan and Mumbai, India to inform policy responses for COVID-19 recovery and future epidemic preparedness and response. We show how local level responses are shaped in these cities where national and international responses have not reached communities at municipal and sub-municipal levels. This brief was written by Saba Aslam (IDS Alumni) and Megan Schmidt-Sane (IDS), with reviews from Professor Amita Bhide (Tata Institute of Social Sciences, India), Dr Asad Sayeed (Collective for Social Science Research, Pakistan), Annie Wilkinson (IDS), and contributions from Swati Mishra (LSHTM), Prerana Somani (LSHTM), Saleemullah Odho (Deputy Commissioner, Korangi district Karachi), Dr Noman Ahmed (NED University, Karachi), Tahera Hasan (Imkaan Foundation, Karachi), Atif Khan (District Health Officer, Korangi district Karachi), Dr Harris (District Focal person, Korangi), Aneeta Pasha (Interactive for Research and Development, Karachi), Yasmeen Shah (Pakistan Fisherfolk Forum), Ghulam Mustafa (HANDS Pakistan), and Dr Shehrin Shaila Mahmood (icddr,b). This brief is the responsibility of SSHAP.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography