How privacy and data security were handled in previous collaborative or distributed detection systems?
  • Centralized Detection System: Still Adopted but risks data aggregate and leakages

Q & A Forum
Literature Review & Gap Analyses

Q: How privacy and data security were handled in previous collaborative or distributed detection systems?

  • Centralized Detection System: Still Adopted but risks data aggregate and leakages
  • Federated Learning (FL): Very promising but never adopted for a MANET IDS
  • Differential Privacy: Conceptual yet lacks practical applicability
  • Secure Aggregation Techniques: Very few in collaborative frameworks
  • Trust Calculation Models: Common sharing of behavior data, at times compromising with privacy of user.

Future researchers seeking PhD research writing support and writing a structured literature review chapter for PhD should consider these points.

Gap Insight: This is another subject with much desired privacy versus security addressed issue and calls for features that will hence advance decentralized methods in privacy-preserving manner.

Get in touch with us to discover how we can help you uphold academic integrity and increase the global visibility of your research at Phdassistance!

This will close in 0 seconds

PhD Assistance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.