Proceedings ArticleDOI
Intrusion detection in wireless ad-hoc networks
Yongguang Zhang,Wenke Lee +1 more
- pp 275-283
TLDR
This paper examines the vulnerabilities of a wireless ad-hoc network, the reason why intrusion detection is needed, and the reasons why the current methods cannot be applied directly, and describes the new intrusion detection and response mechanisms that are developing for wirelessAd-Hoc networks.Abstract:
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.read more
Citations
More filters
Journal ArticleDOI
Wireless mesh networks: a survey
TL;DR: This paper presents a detailed study on recent advances and open research issues in WMNs, followed by discussing the critical factors influencing protocol design and exploring the state-of-the-art protocols for WMNs.
Journal ArticleDOI
Mobile ad hoc networking: imperatives and challenges
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI
Routing security in wireless ad hoc networks
TL;DR: This article studies the routing security issues of MANETs, and analyzes in detail one type of attack-the "black hole" problem-that can easily be employed against the MANets, and proposes a solution for the black hole problem for ad hoc on-demand distance vector routing protocol.
Proceedings ArticleDOI
The quest for security in mobile ad hoc networks
TL;DR: An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described.
Proceedings ArticleDOI
Providing robust and ubiquitous security support for mobile ad-hoc networks
TL;DR: This paper describes a solution that supports ubiquitous security services for mobile hosts, scales to network size, and is robust against break-ins and employs localized certification schemes to enable ubiquitous services.
References
More filters
Dynamic Source Routing in Ad Hoc Wireless Networks.
David B. Johnson,David A. Maltz +1 more
TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI
Dynamic Source Routing in Ad Hoc Wireless Networks
David B. Johnson,David A. Maltz +1 more
TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Journal ArticleDOI
A review of current routing protocols for ad hoc mobile wireless networks
E.M. Royer,Chai-Keong Toh +1 more
TL;DR: Routing protocols for ad hoc networks are examined by providing an overview of eight different protocols by presenting their characteristics and functionality, and then a comparison and discussion of their respective merits and drawbacks are provided.
Book ChapterDOI
Fast effective rule induction
TL;DR: This paper evaluates the recently-proposed rule learning algorithm IREP on a large and diverse collection of benchmark problems, and proposes a number of modifications resulting in an algorithm RIPPERk that is very competitive with C4.5 and C 4.5rules with respect to error rates, but much more efficient on large samples.
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.