Identifying security threats in ad hoc wireless network

被引:0
|
作者
Hassan, K [1 ]
Conner, M [1 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10003 USA
来源
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2 | 2003年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc wireless networks are very vulnerable to security threats, therefore it is critical to monitor and identify any encountered security threats immediately. Once a threat is present on the network, an intrusion Detection System (IDS) tries to detect and alert on attempted intrusions into a network. In this paper, a Genetic Algorithm (GA) based adaptive approach is used to exploit IDS provided information for identifying the sources of threats containing probes from an alphabet. The characters in that alphabet, we consider are being generated into the network by a Linear Feedback Shift Register (LFSR). The LFSR is one of the widely used models of pseudo-random number generator (PRNG).
引用
收藏
页码:34 / 38
页数:5
相关论文
共 50 条
  • [41] Trust On the Security of Wireless Vehicular Ad-hoc Networking
    Rawat, Danda B.
    Yan, Gongjun
    Bista, Bhed B.
    Weigle, Michele C.
    AD HOC & SENSOR WIRELESS NETWORKS, 2015, 24 (3-4) : 283 - 305
  • [42] Special issue on security on wireless ad hoc and sensor networks
    Guizani, Sghaier
    Chen, Hsiao-Hwa
    Mueller, Peter
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2311 - 2313
  • [43] Eavesdropping Security in Wireless Ad Hoc Networks with Directional Antennas
    Wang, Qiu
    Dai, Hong-Ning
    Zhao, Qinglin
    2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), 2013, : 687 - 692
  • [44] Security Condition for Exact Localization in Wireless Ad Hoc Networks
    Kim, Jin Seok
    Yum, Dae Hyun
    Hong, Sung Je
    Kim, Jong
    Lee, Pil Joong
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (07) : 2459 - 2462
  • [45] On communication security in wireless ad-hoc sensor networks
    Slijepcevic, S
    Potkonjak, M
    Tsiatsis, V
    Zimbeck, S
    Srivastava, MB
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 139 - 144
  • [46] Security Challenges in Reactive Mobile Ad Hoc Network
    Ghosh, Chinmay
    Jana, Debasish
    Bhaumik, Bijan Bihari
    2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [47] Implementing Key Management for Security in Ad Hoc Network
    Sharma, Avinash
    Agarwal, Narendra
    Roy, Satyabrata
    Sharma, Ajay
    Sharma, Pankaj
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 485 - +
  • [48] A framework for integrated internet and ad hoc network security
    Xie, B
    Kumar, A
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 318 - 324
  • [49] Immune Inspired Framework for Ad Hoc Network Security
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    2009 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-3, 2009, : 297 - 302
  • [50] VOD system design in ad hoc wireless network
    Gui, Xiangquan
    Zhang, Yuanping
    Zhu, Yongjiao
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 811 - +