Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
| dc.contributor | Aalto-yliopisto | fi |
| dc.contributor | Aalto University | en |
| dc.contributor.author | Liu, Gao | en_US |
| dc.contributor.author | Yan, Zheng | en_US |
| dc.contributor.author | Pedrycz, Witold | en_US |
| dc.contributor.department | Department of Communications and Networking | en |
| dc.contributor.organization | Xidian University | en_US |
| dc.contributor.organization | University of Alberta | en_US |
| dc.date.accessioned | 2018-03-16T10:33:15Z | |
| dc.date.available | 2018-03-16T10:33:15Z | |
| dc.date.embargo | info:eu-repo/date/embargoEnd/2020-03-02 | en_US |
| dc.date.issued | 2018-03-01 | en_US |
| dc.description.abstract | Mobile Ad Hoc Network (MANET) is becoming one type of major next generation wireless networks. Nevertheless, it easily suffers from various attacks due to its specific characteristics. In order to evaluate and measure the security of MANET in real time and make this network react accordingly, a promising alternative is to integrate detection mechanisms that play a role of the second line of defense to detect attacks in MANETs. We note that in most attack detection mechanisms, it is essential and crucial to collect the data related to security for further analysis. If security-related data collection is untrustworthy, attack detection and security measurement might be impacted and disabled. Unfortunately, few existing studies concern security-related data collection in attack detection for the purpose of trustworthy security measurement. The literature lacks a thorough survey on security-related data collection for attack detection and security measurement in MANETs. In this paper, we propose a number of requirements for trustworthy security-related data collection, and then review detection mechanisms in MANETs that were published in recent 20 years. In particular, we employ the proposed requirements as a set of criteria to evaluate the existing work about security-related data collection. Based on the survey and evaluation, we identify a number of open issues and point out future research directions. | en |
| dc.description.version | Peer reviewed | en |
| dc.format.extent | 18 | |
| dc.format.mimetype | application/pdf | en_US |
| dc.identifier.citation | Liu, G, Yan, Z & Pedrycz, W 2018, 'Data collection for attack detection and security measurement in Mobile Ad Hoc Networks : A survey', Journal of Network and Computer Applications, vol. 105, pp. 105-122. https://doi.org/10.1016/j.jnca.2018.01.004 | en |
| dc.identifier.doi | 10.1016/j.jnca.2018.01.004 | en_US |
| dc.identifier.issn | 1084-8045 | |
| dc.identifier.issn | 1095-8592 | |
| dc.identifier.other | PURE UUID: 8614e729-7082-4179-87c4-cfc9b9e2efae | en_US |
| dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/8614e729-7082-4179-87c4-cfc9b9e2efae | en_US |
| dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/18127400/yan_et_alelsarticle_template1.pdf | |
| dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/30289 | |
| dc.identifier.urn | URN:NBN:fi:aalto-201803161759 | |
| dc.language.iso | en | en |
| dc.publisher | Elsevier | |
| dc.relation.fundinginfo | This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the 111 project (grants B08038 and B16037), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), and Academy of Finland (grant 308087). | |
| dc.relation.ispartofseries | Journal of Network and Computer Applications | en |
| dc.relation.ispartofseries | Volume 105, pp. 105-122 | en |
| dc.rights | openAccess | en |
| dc.subject.keyword | Data collection | en_US |
| dc.subject.keyword | Intrusion detection | en_US |
| dc.subject.keyword | MANETs | en_US |
| dc.subject.keyword | Security measurement | en_US |
| dc.title | Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey | en |
| dc.type | A2 Katsausartikkeli tieteellisessä aikakauslehdessä | fi |
| dc.type.version | acceptedVersion |