{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:22:05Z","timestamp":1729617725831,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8126174","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T22:26:11Z","timestamp":1512426371000},"page":"2213-2220","source":"Crossref","is-referenced-by-count":3,"title":["An effective analysis on intrusion detection systems in wireless mesh networks"],"prefix":"10.1109","author":[{"given":"K. Ganesh","family":"Reddy","sequence":"first","affiliation":[]},{"given":"V. Purushothama","family":"Raju","sequence":"additional","affiliation":[]},{"given":"P. Santhi","family":"Thilagam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"216","article-title":"Performance analysis of the con?dant protocol","author":"buchegger","year":"2002","journal-title":"Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing MobiHoc '02"},{"key":"ref32","first-page":"419","article-title":"Mtsr: wormhole attack resistant secure routing for ad hoc network","author":"xiu-feng","year":"2010","journal-title":"Information Computing and Telecommunications (YC-ICT) 2010 IEEE Youth Conference"},{"key":"ref31","first-page":"3","article-title":"A reputation-based mechanism for isolating sel? sh nodes in ad-hoc networks","author":"tamer","year":"2005","journal-title":"Mobile and Ubiquitous Systems Networking and Services"},{"key":"ref30","first-page":"57","article-title":"Improving reliability of jamming attack detection in ad hoc networks","volume":"3","author":"ranjit","year":"2011","journal-title":"International Journal of Communication Networks and Information Security (IJCNIS)"},{"key":"ref35","first-page":"1","article-title":"A reputation-based metric for secure routing in wireless mesh networks","author":"franscesco","year":"2008","journal-title":"Global Telecommunications Conference 2008 IEEE GLOBECOM"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/NCM.2009.419"},{"key":"ref10","first-page":"286","author":"xu","year":"2003","journal-title":"The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1145\/2393216.2393283","article-title":"Cross-layer IDS for Rushing attack in Wireless Mesh Networks","author":"ganesh reddy","year":"2012","journal-title":"Proceedings of the Second International Conference on Computational Science Engineering and Information Technology (CCSEIT '12)"},{"key":"ref12","first-page":"371","article-title":"A security framework for wireless mesh networks","volume":"11","author":"parag","year":"2010","journal-title":"Wireless Communication & Mobile Computing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMPSAC.2006.137"},{"key":"ref14","first-page":"606","article-title":"Arsos: An adaptive, robust, and sub-optimal strategy for automated deployment of anomaly detection system in manets","author":"zonghua","year":"2008","journal-title":"International Journal of Network Security & Its Applications"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/JSAC.2005.861384","article-title":"Scan: self-organized network-layer security in mobile ad hoc networks","volume":"24","author":"hao","year":"2006","journal-title":"Selected Areas in Communications IEEE Journal"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1002\/sec.955","article-title":"Reputation-based Cross-layer Intrusion Detection System for Wormhole Related Attacks in Wireless Mesh Networks","volume":"7","author":"ganesh reddy","year":"2014","journal-title":"Wiley's Journal Security and Communication Networks"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/345910.345955"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/986858.986877"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/INFCOM.2003.1209219"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/AINA.2009.131"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-642-30111-7_90"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/NSS.2009.85"},{"key":"ref3","first-page":"20028","article-title":"MAC layer security issues in wireless mesh networks","volume":"1715","author":"ganesh reddy","year":"2016","journal-title":"ADVANCEMENT IN SCIENCE AND TECHNOLOGY Proceedings of the 2nd International Conference on Communication Systems (ICCS-2015)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SAINT.2009.11"},{"key":"ref29","first-page":"861","article-title":"A cross-layerbased intrusion detection approach for wireless ad hoc networks","author":"thamilarasu","year":"2005","journal-title":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.comnet.2007.04.001"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CCNC.2006.1592977"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MNET.2011.5687950"},{"key":"ref2","first-page":"32","article-title":"Secure routing in wireless sensor networks: attacks and countermeasures","volume":"1","author":"hoang","year":"2003","journal-title":"Ad Hoc Networks"},{"year":"2010","author":"fragkiadakis","journal-title":"Anomaly-based intrusion detection algorithms for wireless networks in WWIC 2010","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/b13595","author":"zhang","year":"2008","journal-title":"Security in Wireless Mesh Networks"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-540-39611-6_13"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TWC.2009.070536"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/APSCC.2007.64"},{"key":"ref24","first-page":"1","article-title":"Delphi: wormhole detection mechanism for ad hoc wireless networks","author":"chiu","year":"2006","journal-title":"Wireless Pervasive Computing 2006 1 st International Symposium IEEE"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/AINA.2012.81"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TNET.2011.2163730"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/COMPSAC.2007.63"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08126174.pdf?arnumber=8126174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:14:52Z","timestamp":1693329292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8126174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8126174","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}