State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Software security and privacy risks in mobile e-commerce
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Detecting anomalous agents in mobile agent system: a preliminary approach
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Distributed communication algorithms for ad hoc mobile networks
Journal of Parallel and Distributed Computing - Special issue on wireless and mobile ad hoc networking and computing
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Distributed algorithm engineering
Experimental algorithmics
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Alert aggregation in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Two-tier agent architecture for trusted communication in ad-hoc mobile networks
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
Theoretical Computer Science - Special issue: Foundations of wide area network computing
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Data Mining and Knowledge Discovery
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
An efficient collaborative intrusion detection system for MANET using Bayesian Approach
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
A wireless intrusion detection method based on neural network
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Assessing denial of service vulnerabilities in DOCSIS
Proceedings of the 44th annual Southeast regional conference
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
IEEE Transactions on Knowledge and Data Engineering
Key management for long-lived sensor networks in hostile environments
Computer Communications
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol
Wireless Personal Communications: An International Journal
SecLEACH-On the security of clustered sensor networks
Signal Processing
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Classifier ensembles: Select real-world applications
Information Fusion
Interactive wormhole detection and evaluation
Information Visualization
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
International Journal of Mobile Communications
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Using Echo State Networks for Anomaly Detection in Underground Coal Mines
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Enhanced intrusion detection systems in ad hoc networks using a grid based agnostic middleware
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Balancing intrusion detection resources in ubiquitous computing networks
Computer Communications
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
WSEAS Transactions on Computers
A weighted-dissimilarity-based anomaly detection method for mobile networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A game theoretical framework on intrusion detection in heterogeneous networks
IEEE Transactions on Information Forensics and Security
An intrusion detection system in ad hoc networks: a social network analysis approach
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hi-index | 0.02 |
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.