Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Cooperative Intrusion Detection in Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
IEEE Transactions on Wireless Communications
DESCV--A Secure Wireless Communication Scheme for Vehicle ad hoc Networking
Mobile Networks and Applications
Lightweight anomaly intrusion detection in wireless sensor networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
On achieving cost-sensitive anomaly detection and response in mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A hierarchical identity based key management scheme in tactical mobile ad hoc networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Modeling the lion attack in cognitive radio networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Misuse detection in consent-based networks
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Wireless Personal Communications: An International Journal
Security in wireless sensor networks: key intrusion detection module in SOOAWSN
Proceedings of the 14th Communications and Networking Symposium
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Mitigating route request flooding attacks in mobile ad hoc networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Anomaly-Based intrusion detection algorithms for wireless networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
On intrusion detection in opportunistic networks
Proceedings of the 17th Panhellenic Conference on Informatics
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure; the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. In this article we present a survey on the work that has been done in the area of intrusion detection in mobile ad hoc networks.