Intrusion detection in wireless ad hoc networks
- 16 August 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Wireless Communications
- Vol. 11 (1), 48-60
- https://doi.org/10.1109/mwc.2004.1269717
Abstract
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure; the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. In this article we present a survey on the work that has been done in the area of intrusion detection in mobile ad hoc networks.Keywords
This publication has 12 references indexed in Scilit:
- Dynamic Source Routing in Ad Hoc Wireless NetworksPublished by Springer Science and Business Media LLC ,2007
- Intrusion detection using mobile agents in wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A data mining framework for building intrusion detection modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Security enhancements in AODV protocol for wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Adaptive security for multilevel ad hoc networksWireless Communications and Mobile Computing, 2002
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Intrusion detection using autonomous agentsComputer Networks, 2000
- Intrusion detection in wireless ad-hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Securing ad hoc networksIEEE Network, 1999