Record Detail Back
Security for Multihop Wireless Networks
As discussed above, there are many types, sub-types, variants, and sub-variants reported in the literature about security attacks in MANETs. The efforts carried out by the research community to understand and solve the different attacks are remarkable.
However, the absence of valid classifications from a practical perspective can be seen in the in existence of studies that try to extract common attack features. On the contrary, such works and proposals in the literature are quite scanty for each attack analyzed. This fact greatly disperses the efforts made by the community and wastes global detection capabilities that can face different attacks, which is more important to us.
To alleviate this limitation, we propose and argue here the convenience of developing a holistic detection approach. This approach would allow the definition of a more comprehensive and complete detection system by generalizing specific attack detection capabilities. To do this, we suggest extracting a set of features common to all attacks of a given class such that, independent of the particularities of the network layer involved (i.e., independent of the target function attacked, or specie), the system would be able to detect the associated type of occurring attack. For clarity, consider the jellyfish and rushing attacks.
Shafiullah Khan and Jaime Lloret Mauri - Personal Name
1st Edtion
978-1-4665-7804-
NONE
Security for Multihop Wireless Networks
Information Technology
English
Taylor & Francis Group, LLC
2014
USA
1-540
LOADING LIST...
LOADING LIST...