摘要 :
Let
p
≡
3
...
展开
Let
p
≡
3
(
mod
4
)
{p\equiv 3\pmod{4}}
and
l
≡
5
(
mod
8
)
{l\equiv 5\pmod{8}}
be different primes such that
p
l
=
1
{\frac{p}{l}=1}
and
2
p
=
p
l
4
{\frac{2}{p}=\frac{p}{l}_{4}}
. Put
k
=
?
?
(
l
)
{k=\mathbb{Q}(\sqrt{l})}
, and denote by ? its fundamental unit. Set
K
=
k
?
(
-
2
?
p
?
?
?
l
收起
摘要 :
Mobile Ad Hoc Network (MANET) has emerged as a new technology to provide anytime, anywhere communication. Increasingly wireless ad-hoc networks are being employed in the tactical battlefield, emergency rescue and search missions, ...
展开
Mobile Ad Hoc Network (MANET) has emerged as a new technology to provide anytime, anywhere communication. Increasingly wireless ad-hoc networks are being employed in the tactical battlefield, emergency rescue and search missions, as well as civilian ad-hoc situations like classrooms and conferences. Due to its unique characteristics, mobile ad hoc networks (MANETs) are more vulnerable to malicious attack and the absolute security in the mobile ad hoc network is very hard to achieve. Prevention methods as cryptographic techniques alone are not sufficient to make them secure; therefore, efficient intrusion detection must be deployed and elaborated to facilitate the identification of attacks. An Intrusion Detection System (IDS) aims to detect malicious and selfish nodes in a network. The intrusion detection techniques used for wired networks may no longer be effective and sufficient when adapted directly to a wireless ad-hoc network, thus existing methods of intrusion detection have to be modified and new methods have to be defined in order to work effectively and efficiency in this new network architecture. In this paper we give a survey of different architectures and methods of intrusion detection systems (IDSs) for MANETs accordingly to the recent literature.
收起