Identifying security threats in ad hoc wireless network

被引:0
|
作者
Hassan, K [1 ]
Conner, M [1 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10003 USA
来源
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2 | 2003年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc wireless networks are very vulnerable to security threats, therefore it is critical to monitor and identify any encountered security threats immediately. Once a threat is present on the network, an intrusion Detection System (IDS) tries to detect and alert on attempted intrusions into a network. In this paper, a Genetic Algorithm (GA) based adaptive approach is used to exploit IDS provided information for identifying the sources of threats containing probes from an alphabet. The characters in that alphabet, we consider are being generated into the network by a Linear Feedback Shift Register (LFSR). The LFSR is one of the widely used models of pseudo-random number generator (PRNG).
引用
收藏
页码:34 / 38
页数:5
相关论文
共 50 条
  • [21] Review of Vehicular Ad Hoc Network Security
    Kumar, Kuldeep
    Arora, Sandeep Kumar
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (11): : 17 - 34
  • [22] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [23] A proposed Security subsystem for Ad Hoc Wireless Networks
    Alfawaer, Zeyad M.
    Al zoubi, Saleem
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 253 - +
  • [24] Ad hoc network security measurement and evaluation
    Ning, HZ
    Liu, Y
    He, DQ
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 4, 2005, : 488 - 492
  • [25] A novel cryptography for ad hoc network security
    Pi Jian-yong
    Liu Xin-song
    Wu Ai
    Liu Dan
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1448 - +
  • [26] Mobile ad hoc network security - a taxonomy
    Alampalayam, S
    Kumar, A
    Srinivasan, S
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 839 - 844
  • [27] Security management in hierachical ad hoc network
    Yang, PL
    Zheng, SR
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : B642 - B649
  • [28] Ad hoc network routing and security:: A review
    Zhang, Congzhe
    Zhou, MengChu
    Yu, Ming
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (08) : 909 - 925
  • [29] Synthesizing Datasets with Security Threats for Vehicular Ad-Hoc Networks
    Goncalves, Fabio
    Ribeiro, Bruno
    Gama, Oscar
    Santos, Joao
    Costa, Antonio
    Dias, Bruno
    Nicolau, Maria Joao
    Macedo, Joaquim
    Santos, Alexandre
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [30] A simulation platform for wireless ad hoc network
    Zhong, XF
    Wang, YZ
    Mei, SL
    Wang, J
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 705 - 709