distributed intrusion detection system for resource-constrained devices in ad-hoc networks

FREE-DOWNLOAD AP Lauf, RA Peters… – Ad Hoc Networks, 2010 –
This paper describes the design and implementation of a two-stage intrusion detection system
(IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided
by analyzing the context from the application-level interactions of networked nodes; each