Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
The existing credit-based mechanisms mainly focus on stimulating the rational packet droppers to relay other nodes' packets, but they cannot identify the irrational packet dro...
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...