Skip to main content
Erschienen in: Wireless Networks 2/2020

30.09.2019

Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks

verfasst von: R. Santhana Krishnan, E. Golden Julie, Y. Harold Robinson, Raghvendra Kumar, Le Hoang Son, Tong Anh Tuan, Hoang Viet Long

Erschienen in: Wireless Networks | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad hoc Networks (MANETs) have gained great interests owing to their dynamic and smoothness of exploitation. Conversely, the wireless and energetic nature adds exposed to different types of protection attacks than the other kind of networks. In this kind of attacks, it is essential to expand proficient intrusion-detection system to prevent MANET from different attacks. In this paper, we recommend a new intrusion-detection system called Modified Zone Based Intrusion Detection System (MZBIDS) for MANETs. Evaluated to contemporary methodologies, MZBIDS exhibits superior malicious behavior-detection ratios in convinced situations whereas it may not significantly influence performance of entire network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless (Vol. 5, pp. 153–181). Norwell: Kluwer. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless (Vol. 5, pp. 153–181). Norwell: Kluwer.
2.
Zurück zum Zitat Kenkre, P. S., Pai, A., & Colaco, L., (2015), Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405–411). Springer. Kenkre, P. S., Pai, A., & Colaco, L., (2015), Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405–411). Springer.
3.
Zurück zum Zitat Stakhanova, N., Basu, S., & Wong, J. (2006). Taxonomy of intrusion response systems. Computer Science, Iowa State University, Technical report 06-05. Stakhanova, N., Basu, S., & Wong, J. (2006). Taxonomy of intrusion response systems. Computer Science, Iowa State University, Technical report 06-05.
4.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.CrossRef
5.
Zurück zum Zitat Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials,17(4), 2461–2492.CrossRef Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials,17(4), 2461–2492.CrossRef
6.
Zurück zum Zitat Faisal, M., Abbas, S., & Rahman, H. U. (2018). Identity attack detection system for 802.11-based ad hoc networks. EURASIP Journal on Wireless Communications and Networking,10(1), 128.CrossRef Faisal, M., Abbas, S., & Rahman, H. U. (2018). Identity attack detection system for 802.11-based ad hoc networks. EURASIP Journal on Wireless Communications and Networking,10(1), 128.CrossRef
7.
Zurück zum Zitat Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks,9(16), 3049–3058.CrossRef Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks,9(16), 3049–3058.CrossRef
8.
Zurück zum Zitat Robinson, Y. H., Julie, E. G., Kumar, R., & Son, H. L. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Applications, 12(5), 1061–1075. Robinson, Y. H., Julie, E. G., Kumar, R., & Son, H. L. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Applications, 12(5), 1061–1075.
9.
10.
Zurück zum Zitat Robinson, Y. H., Krishnan, R. S., Julie, E. G., Kumar, R., Son, H. L., & Thong, P. H. (2019). Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad hoc networks. Ad Hoc Networks,93, 101896–101909.CrossRef Robinson, Y. H., Krishnan, R. S., Julie, E. G., Kumar, R., Son, H. L., & Thong, P. H. (2019). Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad hoc networks. Ad Hoc Networks,93, 101896–101909.CrossRef
11.
Zurück zum Zitat Robinson, Y. H., Julie, E., Kumar, R., & Son, L. H. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Application,12(5), 1061–1075.CrossRef Robinson, Y. H., Julie, E., Kumar, R., & Son, L. H. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Application,12(5), 1061–1075.CrossRef
12.
Zurück zum Zitat Silva, A. A., Pontes, E., Guelfi, A. E., Caproni, I., Aguiar, R., Zhou, F., et al. (2015). Redicting model for identifying the malicious activity of nodes in MANETs. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC) (pp. 700–707). Silva, A. A., Pontes, E., Guelfi, A. E., Caproni, I., Aguiar, R., Zhou, F., et al. (2015). Redicting model for identifying the malicious activity of nodes in MANETs. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC) (pp. 700–707).
13.
Zurück zum Zitat Kalnoor, G., & Agarkhed, J. (2018). Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J,4(1), 00093. Kalnoor, G., & Agarkhed, J. (2018). Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J,4(1), 00093.
14.
Zurück zum Zitat Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2017). Framework for threat analysis and attack modelling of network security protocols. International Journal of Synthetic Emotions (IJSE),8(2), 62–75.CrossRef Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2017). Framework for threat analysis and attack modelling of network security protocols. International Journal of Synthetic Emotions (IJSE),8(2), 62–75.CrossRef
15.
Zurück zum Zitat Debar, H., & Wespi, A. (2001). Aggregation and correlation of intrusion-detection alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (pp. 85–103). Debar, H., & Wespi, A. (2001). Aggregation and correlation of intrusion-detection alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (pp. 85–103).
16.
Zurück zum Zitat Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., & Moradzadeh, H. (2014). Intrusion detection systems in MANET: a review. Procedia-Social and Behavioral Sciences,129, 453–459.CrossRef Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., & Moradzadeh, H. (2014). Intrusion detection systems in MANET: a review. Procedia-Social and Behavioral Sciences,129, 453–459.CrossRef
17.
Zurück zum Zitat Thalor, J., & Monika, M. (2013). Wormhole attack detection and prevention technique in mobile ad hoc networks: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 137–142. Thalor, J., & Monika, M. (2013). Wormhole attack detection and prevention technique in mobile ad hoc networks: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 137–142.
18.
Zurück zum Zitat Manju, B., Sandhya, S. G., Ramkuma, M. O., & Jayakumar, D. (2018). An efficient and secured monitoring system to identify the selfish node in MANET. International Journal of Pure and Applied Mathematics,118(15), 271–276. Manju, B., Sandhya, S. G., Ramkuma, M. O., & Jayakumar, D. (2018). An efficient and secured monitoring system to identify the selfish node in MANET. International Journal of Pure and Applied Mathematics,118(15), 271–276.
19.
Zurück zum Zitat Justin, V., Marathe, N., & Dongre, N. (2017). Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In International conference on I-SMAC. IEEE Xplore Justin, V., Marathe, N., & Dongre, N. (2017). Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In International conference on I-SMAC. IEEE Xplore
20.
Zurück zum Zitat Chen, T., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9. Chen, T., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9.
21.
Zurück zum Zitat Gour, N., Agarwal, M., Singh, H., & Kumar, A. (2014), A review on impersonation attack in mobile Ad-Hoc Network. International Journal of Computer Trends and Technology (IJCTT), 8(1). Gour, N., Agarwal, M., Singh, H., & Kumar, A. (2014), A review on impersonation attack in mobile Ad-Hoc Network. International Journal of Computer Trends and Technology (IJCTT), 8(1).
22.
Zurück zum Zitat Barani, F., & Abadi, M. (2012). BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. The ISC International Journal of Information Security,4(1), 25–39. Barani, F., & Abadi, M. (2012). BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. The ISC International Journal of Information Security,4(1), 25–39.
23.
Zurück zum Zitat Sen, B., Meitei, M. G., Sharma, K., Ghose, M. K., & Sinha, S. (2018). Mitigating black hole attacks in MANETs using a trust-based threshold mechanism. International Journal of Applied Engineering Research,13(7), 5458–5463. Sen, B., Meitei, M. G., Sharma, K., Ghose, M. K., & Sinha, S. (2018). Mitigating black hole attacks in MANETs using a trust-based threshold mechanism. International Journal of Applied Engineering Research,13(7), 5458–5463.
24.
Zurück zum Zitat Amouri, A., Jaimes, L. G., Manthena, R., Morgera, S.D., Vergara-Laurens, I. J. (2015). A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET. In Proceedings of the 7th IEEE Latin-American Conference on Communications (LATINCOM), Arequipa, Peru (pp. 1–6). Amouri, A., Jaimes, L. G., Manthena, R., Morgera, S.D., Vergara-Laurens, I. J. (2015). A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET. In Proceedings of the 7th IEEE Latin-American Conference on Communications (LATINCOM), Arequipa, Peru (pp. 1–6).
25.
Zurück zum Zitat Cuppens, F. (2001). Managing alerts in a multi-intrusion detection environment. In 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 10–14 Cuppens, F. (2001). Managing alerts in a multi-intrusion detection environment. In 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 10–14
27.
Zurück zum Zitat Cuppens, F., & Mige, A. (2002). Alert correlation in a cooperative intrusion detection framework (pp. 202–215). Berkeley, CA: IEEE Symposium on Security and Privacy. Cuppens, F., & Mige, A. (2002). Alert correlation in a cooperative intrusion detection framework (pp. 202–215). Berkeley, CA: IEEE Symposium on Security and Privacy.
28.
Zurück zum Zitat Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues,7(4), 12–17. Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues,7(4), 12–17.
29.
Zurück zum Zitat Almomani, O., Al-Shugran, M., Alzubi, J. A., & Alzubi, O. A. (2015). Performance evaluation of position-based routing protocols using different mobility models in MANET. International Journal of Computer Applications, 119(3), 43–48. Almomani, O., Al-Shugran, M., Alzubi, J. A., & Alzubi, O. A. (2015). Performance evaluation of position-based routing protocols using different mobility models in MANET. International Journal of Computer Applications, 119(3), 43–48.
30.
Zurück zum Zitat Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef
31.
Zurück zum Zitat Sun, B., Wu, K., & Pooch, U. W. (2006). Zone-based intrusion detection for mobile ad hoc networks. Ad hoc & sensor wireless networks,2(3), 297–324. Sun, B., Wu, K., & Pooch, U. W. (2006). Zone-based intrusion detection for mobile ad hoc networks. Ad hoc & sensor wireless networks,2(3), 297–324.
32.
Zurück zum Zitat Jiang, H., Gao, Y., Zhang, G., & He, Y. (2005). A zone-based intrusion detection system for wireless ad hoc distribution power communication networks. In IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific, Dalian. Jiang, H., Gao, Y., Zhang, G., & He, Y. (2005). A zone-based intrusion detection system for wireless ad hoc distribution power communication networks. In IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific, Dalian.
34.
Zurück zum Zitat Amouri, A., Morgera, S., Bencherif, M., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors (pp. 1–17) Amouri, A., Morgera, S., Bencherif, M., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors (pp. 1–17)
35.
Zurück zum Zitat Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., & Thong, P. H. (2019). Design of a security-aware routing scheme in Mobile Ad-hoc network using repeated game model. Computer Standards & Interfaces,66, 103358.CrossRef Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., & Thong, P. H. (2019). Design of a security-aware routing scheme in Mobile Ad-hoc network using repeated game model. Computer Standards & Interfaces,66, 103358.CrossRef
36.
Zurück zum Zitat Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks (In press), corrected proof, Available online 2 February 2019. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks (In press), corrected proof, Available online 2 February 2019.
37.
Zurück zum Zitat Condomines, J. P., Zhang, R., & Larrieu, N. (2018). Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks (in press), corrected proof, Available online 7 September 2018. Condomines, J. P., Zhang, R., & Larrieu, N. (2018). Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks (in press), corrected proof, Available online 7 September 2018.
38.
Zurück zum Zitat Saravanan, K., Aswini, S., Kumar, R., & Son, H. L. (2019). How to prevent maritime border collision for fisheries?-A design of real-time automatic identification system. Earth Science Informatics,12(2), 241–252.CrossRef Saravanan, K., Aswini, S., Kumar, R., & Son, H. L. (2019). How to prevent maritime border collision for fisheries?-A design of real-time automatic identification system. Earth Science Informatics,12(2), 241–252.CrossRef
40.
Zurück zum Zitat Kapoor, R., Gupta, R., Son, H. L., Jha, S., & Kumar, R. (2019). Adaptive technique with cross correlation for lowering signal-to-noise ratio wall in sensor networks. Wireless Personal Communications,105(3), 787–802.CrossRef Kapoor, R., Gupta, R., Son, H. L., Jha, S., & Kumar, R. (2019). Adaptive technique with cross correlation for lowering signal-to-noise ratio wall in sensor networks. Wireless Personal Communications,105(3), 787–802.CrossRef
41.
Zurück zum Zitat Krishnan, R. S., Julie, E. G., Robinson, Y. H., Son, H. L., Kumar, R., Abdel-Basset, M., et al. (2019). A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access,7, 38584–38592.CrossRef Krishnan, R. S., Julie, E. G., Robinson, Y. H., Son, H. L., Kumar, R., Abdel-Basset, M., et al. (2019). A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access,7, 38584–38592.CrossRef
43.
Zurück zum Zitat Pal, S., Kumar, R., Son, H. L., Saravanan, K., Abdel-Basset, M., Manogaran, G., & Thong, P. H. (2019) Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud. The Journal of Supercomputing, 1–18. Pal, S., Kumar, R., Son, H. L., Saravanan, K., Abdel-Basset, M., Manogaran, G., & Thong, P. H. (2019) Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud. The Journal of Supercomputing, 1–18.
44.
Zurück zum Zitat Pritam, N., Khari, M., Son, H. L., Kumar, R., Jha, S., Priyadarshini, I., et al. (2019). Assessment of code smell for predicting class change proneness using machine learning. IEEE Access,7, 37414–37425.CrossRef Pritam, N., Khari, M., Son, H. L., Kumar, R., Jha, S., Priyadarshini, I., et al. (2019). Assessment of code smell for predicting class change proneness using machine learning. IEEE Access,7, 37414–37425.CrossRef
45.
Zurück zum Zitat Son, L. H., & Thong, P. H. (2017). Soft computing methods for WiMax network planning on 3D geographical information systems. Journal of Computer and System Sciences,83(1), 159–179.MathSciNetCrossRefMATH Son, L. H., & Thong, P. H. (2017). Soft computing methods for WiMax network planning on 3D geographical information systems. Journal of Computer and System Sciences,83(1), 159–179.MathSciNetCrossRefMATH
46.
Zurück zum Zitat Jha, S., Kumar, R., Chatterjee, J. M., & Khari, M. (2019). Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017. Telecommunication Systems,70(4), 617–634.CrossRef Jha, S., Kumar, R., Chatterjee, J. M., & Khari, M. (2019). Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017. Telecommunication Systems,70(4), 617–634.CrossRef
47.
Zurück zum Zitat Son, P. H., Son, H. L., Jha, S., Kumar, R., & Chatterjee, J. M. (2019). Governing mobile virtual network operators in developing countries. Utilities Policy,56, 169–180.CrossRef Son, P. H., Son, H. L., Jha, S., Kumar, R., & Chatterjee, J. M. (2019). Governing mobile virtual network operators in developing countries. Utilities Policy,56, 169–180.CrossRef
48.
Zurück zum Zitat Tam, N. T., Hai, D. T., Son, H. L., & Vinh, T. L. (2018). Improving lifetime and network connections of 3D wireless sensor networks based on fuzzy clustering and particle swarm optimization. Wireless Networks,24(5), 1477–1490.CrossRef Tam, N. T., Hai, D. T., Son, H. L., & Vinh, T. L. (2018). Improving lifetime and network connections of 3D wireless sensor networks based on fuzzy clustering and particle swarm optimization. Wireless Networks,24(5), 1477–1490.CrossRef
49.
Zurück zum Zitat Jha, S., Kumar, R., Son, H. L., Abdel-Basset, M., Priyadarshini, I., Sharma, R., et al. (2019). Deep learning approach for software maintainability metrics prediction. IEEE Access,7, 61840–61855.CrossRef Jha, S., Kumar, R., Son, H. L., Abdel-Basset, M., Priyadarshini, I., Sharma, R., et al. (2019). Deep learning approach for software maintainability metrics prediction. IEEE Access,7, 61840–61855.CrossRef
50.
Zurück zum Zitat Khan, T., Singh, K., Son, H. L., Abdel-Basset, M., Long, H. V., Singh, S. P., et al. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access,7, 58221–58240.CrossRef Khan, T., Singh, K., Son, H. L., Abdel-Basset, M., Long, H. V., Singh, S. P., et al. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access,7, 58221–58240.CrossRef
Metadaten
Titel
Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks
verfasst von
R. Santhana Krishnan
E. Golden Julie
Y. Harold Robinson
Raghvendra Kumar
Le Hoang Son
Tong Anh Tuan
Hoang Viet Long
Publikationsdatum
30.09.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02151-y

Weitere Artikel der Ausgabe 2/2020

Wireless Networks 2/2020 Zur Ausgabe

Neuer Inhalt