Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Intrusion detection in wireless ad hoc networks

Published: 01 February 2004 Publication History

Abstract

Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure; the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. In this article we present a survey on the work that has been done in the area of intrusion detection in mobile ad hoc networks.

Cited By

View all
  • (2022)An Intrusion Detection Model Based on Improved ACGAN in Big Data EnvironmentSecurity and Communication Networks10.1155/2022/68211742022Online publication date: 1-Jan-2022
  • (2022)Computational Intelligence Approaches in Developing Cyberattack Detection SystemComputational Intelligence and Neuroscience10.1155/2022/47053252022Online publication date: 1-Jan-2022
  • (2022)Intrusion detection based on machine learning in the internet of things, attacks and counter measuresThe Journal of Supercomputing10.1007/s11227-021-04188-378:6(8890-8924)Online publication date: 1-Apr-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Wireless Communications
IEEE Wireless Communications  Volume 11, Issue 1
February 2004
66 pages

Publisher

IEEE Press

Publication History

Published: 01 February 2004

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)An Intrusion Detection Model Based on Improved ACGAN in Big Data EnvironmentSecurity and Communication Networks10.1155/2022/68211742022Online publication date: 1-Jan-2022
  • (2022)Computational Intelligence Approaches in Developing Cyberattack Detection SystemComputational Intelligence and Neuroscience10.1155/2022/47053252022Online publication date: 1-Jan-2022
  • (2022)Intrusion detection based on machine learning in the internet of things, attacks and counter measuresThe Journal of Supercomputing10.1007/s11227-021-04188-378:6(8890-8924)Online publication date: 1-Apr-2022
  • (2022)A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETsInformation Systems Frontiers10.1007/s10796-017-9809-421:5(959-977)Online publication date: 10-Mar-2022
  • (2021)A feature dimension reduction technology for predicting DDoS intrusion behavior in multimedia internet of thingsMultimedia Tools and Applications10.1007/s11042-019-7591-780:15(22671-22684)Online publication date: 1-Jun-2021
  • (2019)A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2019.8651782(1-6)Online publication date: 11-Jan-2019
  • (2019)Adaptive Risk Prediction and Anonymous Secured Communication in MANET for Medical InformaticsJournal of Medical Systems10.1007/s10916-019-1231-743:5(1-13)Online publication date: 1-May-2019
  • (2018)A behavioural theory for intrusion detection system in mobile ad-hoc networksProceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications10.1145/3195612.3195617(51-60)Online publication date: 15-Mar-2018
  • (2018)RETRACTED ARTICLE: Stealthy attack detection in multi-channel multi-radio wireless networksMultimedia Tools and Applications10.1007/s11042-018-5866-z77:14(18503-18526)Online publication date: 1-Jul-2018
  • (2017)Pareto Optimal Security Resource Allocation for Internet of ThingsACM Transactions on Privacy and Security10.1145/313929320:4(1-30)Online publication date: 24-Oct-2017
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media