Identifying security threats in ad hoc wireless network

被引:0
|
作者
Hassan, K [1 ]
Conner, M [1 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10003 USA
来源
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2 | 2003年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc wireless networks are very vulnerable to security threats, therefore it is critical to monitor and identify any encountered security threats immediately. Once a threat is present on the network, an intrusion Detection System (IDS) tries to detect and alert on attempted intrusions into a network. In this paper, a Genetic Algorithm (GA) based adaptive approach is used to exploit IDS provided information for identifying the sources of threats containing probes from an alphabet. The characters in that alphabet, we consider are being generated into the network by a Linear Feedback Shift Register (LFSR). The LFSR is one of the widely used models of pseudo-random number generator (PRNG).
引用
收藏
页码:34 / 38
页数:5
相关论文
共 50 条
  • [1] Resilient Security Mechanism for Wireless Ad hoc Network
    Vaidya, Binod
    Makrakis, Dimitrios
    Park, JongHyuk
    Yeo, Sang-Soo
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (03) : 385 - 401
  • [2] Resilient Security Mechanism for Wireless Ad hoc Network
    Binod Vaidya
    Dimitrios Makrakis
    Jong Hyuk Park
    Sang-Soo Yeo
    Wireless Personal Communications, 2011, 56 : 385 - 401
  • [3] Unmasking threats in mobile wireless ad-hoc network settings
    Spiewak, Dagmara
    Engel, Thomas
    Fusenig, Volker
    WSEAS Transactions on Communications, 2007, 6 (01): : 104 - 110
  • [4] Security Threats in Vehicular Ad Hoc Networks
    Al Hasani, Ahmed Shoeb
    Hossain, Md. Shohrab
    Atiquzzaman, Mohammed
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 404 - 411
  • [5] Security and threats of mobile Ad Hoc networks
    Islamic Azad University Tabriz Branch, Tabriz, Iran
    WSEAS Trans. Commun., 2006, 11 (2123-2128):
  • [6] Enhance Security For Spontaneous Wireless Ad Hoc Network Creation
    Shinde, Kiran Vijaykumar
    Kaur, Harjeet
    Patil, Prakash
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 247 - 250
  • [7] Security of Ad Hoc Network
    Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications
    ZTE Communications, 2007, (04) : 24 - 26
  • [8] Security issues at the network layer in wireless mobile ad hoc networks
    Al-Jaroodi, J
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 576 - 582
  • [9] Security evaluation of a wireless ad-hoc network with dynamic topology
    Kalinin M.O.
    Minin A.A.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 899 - 901
  • [10] An Overview of Ad Hoc Network Security
    Yang, Fan
    Zheng, Yulan
    Xiong, Ping
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 129 - 137