Reliable Greedy Forwarding in Obstacle-Aware Wireless Sensor Networks
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Secure and efficient data storage in unattended wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Personal and Ubiquitous Computing
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.