Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/7267
Full metadata record
DC FieldValueLanguage
dc.contributor.authorReddy, K.G.-
dc.contributor.authorRaju, V.P.-
dc.contributor.authorSanthi Thilagam, P.-
dc.date.accessioned2020-03-30T09:58:44Z-
dc.date.available2020-03-30T09:58:44Z-
dc.date.issued2017-
dc.identifier.citation2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, 2017, Vol.2017-January, , pp.2213-2220en_US
dc.identifier.urihttps://idr.nitk.ac.in/jspui/handle/123456789/7267-
dc.description.abstractIntrusion Detection Systems(IDSs) are widely used to detect both known attacks and unknown attacks performed by internal and external attackers in wireless networks. However, challenging issues for developing IDSs inWireless Mesh Networks (WMNs) are 1) supporting interoperability and 2) handling volatile parameters. In addition, security standards for WMN are still in draft stage, and to protect the WMN, IDSs of similar wireless networks such as wireless sensor, Ad-Hoc, MANET can be adopted, but the best performance is not guaranteed. In this paper, we have classified the existing IDSs for wireless networks into four categories namely single layer IDS, cross-layer IDS, reputation-based IDS, reputation based cross-layer IDS, and analyzed the performance of these IDSs with core-layer attacks and detection methodology. Based on our analysis, we address the loopholes in existing IDSs and specify research directions for strengthening the existing IDSs and for developing new efficient IDSs with respect to backbone mesh and client mesh networks. � 2017 IEEE.en_US
dc.titleAn effective analysis on intrusion detection systems in wireless mesh networksen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.