Network forensics on mobile ad-hoc networks

Akira Otaka, Tsuyoshi Takagi, Osamu Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A variety of countermeasures for every eventuality are more important than maintaining a mechanism that does not suffer any kind of assaults in mobile adhoc networks. From the experimental results, the ratio of the number of evidence packets and the total number of nodes was confirmed with the ratios of the transmission range and the objective range. The number of the evidence packets is controlled by the level of reliability. All nodes in mobile ad hoc networks need to be free from all suspicions.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings
Pages175-182
Number of pages8
EditionPART 3
DOIs
Publication statusPublished - Dec 24 2008
Event12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008 - Zagreb, Croatia
Duration: Sep 3 2008Sep 5 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 3
Volume5179 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008
CountryCroatia
CityZagreb
Period9/3/089/5/08

Fingerprint

Mobile ad hoc networks
Mobile Ad Hoc Networks
Wireless networks
Countermeasures
Vertex of a graph
Range of data
Experimental Results
Digital forensics
Evidence

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Otaka, A., Takagi, T., & Takahashi, O. (2008). Network forensics on mobile ad-hoc networks. In Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings (PART 3 ed., pp. 175-182). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5179 LNAI, No. PART 3). https://doi.org/10.1007/978-3-540-85567-5-23

Network forensics on mobile ad-hoc networks. / Otaka, Akira; Takagi, Tsuyoshi; Takahashi, Osamu.

Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings. PART 3. ed. 2008. p. 175-182 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5179 LNAI, No. PART 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Otaka, A, Takagi, T & Takahashi, O 2008, Network forensics on mobile ad-hoc networks. in Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings. PART 3 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), no. PART 3, vol. 5179 LNAI, pp. 175-182, 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, Zagreb, Croatia, 9/3/08. https://doi.org/10.1007/978-3-540-85567-5-23
Otaka A, Takagi T, Takahashi O. Network forensics on mobile ad-hoc networks. In Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings. PART 3 ed. 2008. p. 175-182. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 3). https://doi.org/10.1007/978-3-540-85567-5-23
Otaka, Akira ; Takagi, Tsuyoshi ; Takahashi, Osamu. / Network forensics on mobile ad-hoc networks. Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings. PART 3. ed. 2008. pp. 175-182 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 3).
@inproceedings{4645982ab6854c5ca754a9353c4021b5,
title = "Network forensics on mobile ad-hoc networks",
abstract = "A variety of countermeasures for every eventuality are more important than maintaining a mechanism that does not suffer any kind of assaults in mobile adhoc networks. From the experimental results, the ratio of the number of evidence packets and the total number of nodes was confirmed with the ratios of the transmission range and the objective range. The number of the evidence packets is controlled by the level of reliability. All nodes in mobile ad hoc networks need to be free from all suspicions.",
author = "Akira Otaka and Tsuyoshi Takagi and Osamu Takahashi",
year = "2008",
month = "12",
day = "24",
doi = "10.1007/978-3-540-85567-5-23",
language = "English",
isbn = "3540855661",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 3",
pages = "175--182",
booktitle = "Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings",
edition = "PART 3",

}

TY - GEN

T1 - Network forensics on mobile ad-hoc networks

AU - Otaka, Akira

AU - Takagi, Tsuyoshi

AU - Takahashi, Osamu

PY - 2008/12/24

Y1 - 2008/12/24

N2 - A variety of countermeasures for every eventuality are more important than maintaining a mechanism that does not suffer any kind of assaults in mobile adhoc networks. From the experimental results, the ratio of the number of evidence packets and the total number of nodes was confirmed with the ratios of the transmission range and the objective range. The number of the evidence packets is controlled by the level of reliability. All nodes in mobile ad hoc networks need to be free from all suspicions.

AB - A variety of countermeasures for every eventuality are more important than maintaining a mechanism that does not suffer any kind of assaults in mobile adhoc networks. From the experimental results, the ratio of the number of evidence packets and the total number of nodes was confirmed with the ratios of the transmission range and the objective range. The number of the evidence packets is controlled by the level of reliability. All nodes in mobile ad hoc networks need to be free from all suspicions.

UR - http://www.scopus.com/inward/record.url?scp=57749184300&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57749184300&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-85567-5-23

DO - 10.1007/978-3-540-85567-5-23

M3 - Conference contribution

AN - SCOPUS:57749184300

SN - 3540855661

SN - 9783540855668

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 175

EP - 182

BT - Knowledge-Based Intelligent Information and Engineering Systems - 12th International Conference, KES 2008, Proceedings

ER -