Intrusion detection techniques in wireless ad hoc networks

被引:0
|
作者
Wang, Xia [1 ]
机构
[1] Iowa State Univ Sci & Technol, Dept Comp Sci, Ames, IA 50011 USA
来源
30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this article, we present our research work in intrusion detection over wireless ad hoc network. We summarize the current intrusion detection techniques into three categories. Then we investigate detection of wormhole attack in wireless ad hoc networks. A novel end-to-end wormhole detection method is proposed.
引用
收藏
页码:347 / 349
页数:3
相关论文
共 50 条
  • [1] Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
    Sun, Bo
    Osborne, Lawrence
    Xiao, Yang
    Guizani, Sghaier
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 56 - 63
  • [2] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [3] A novel intrusion detection approach for wireless ad hoc networks
    Nadkarni, K
    Mishra, A
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 831 - 836
  • [4] A Distributed Intrusion Detection System for Wireless Ad Hoc Networks
    Sen, Jaydip
    Ukil, Arijit
    Bera, Debasish
    Pal, Arpan
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 363 - 368
  • [5] Integration of mobility and intrusion detection for wireless ad hoc networks
    Sun, Bo
    Wu, Kui
    Xiao, Yang
    Wang, Ruhai
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (06) : 695 - 721
  • [6] An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks
    Sen, Jaydip
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 202 - 207
  • [7] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [8] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [9] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366
  • [10] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158