1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Salman Naseer1 and Rashid Mahmood2
1.University of the Punjab, Gujranwala Campus, Pakistan
2.University of Gujrat, Pakistan
Abstract—Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Index Terms—MANET, IDS, intrusions, signature, detection, prevention

Cite: Sheng Dai and Chong Shen, "A Novel Algorithm Based on 2D Packing Algorithm BFD for Timeslots Assignment in MF-TDMA System," Lecture Notes on Information Theory, Vol. 3, No. 1, pp. 52-55, June 2015. doi: 10.18178/lnit.3.1.52-55
Copyright © 2012-2015 Lecture Notes on Information Theory, All Rights Reserved