On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
Mobile ad hoc networks mostly operate over open, adverse, or even Side Cover hostile environments and are, therefore, vulnerable to a large body of threats.Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection.To meet this requirement, we first identify