TENCON 2005 - 2005 IEEE Region 10 Conference 2005
DOI: 10.1109/tencon.2005.300979
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System for Suburban Ad-hoc Networks

Abstract: Due to the nature of the wireless media, ad-hoc wireless networks are vulnerable to various attacks. There are security protocols that prevent unauthorized nodes from accessing the network through authentication. Secrecy of information is provided through encryption. However these protocols cannot detect if any member of the network degrades the network performance due to misbehavior. Therefore an intrusion detection system (IDS) is required that monitors what is going on in the network, detects misbehavior or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Thus, even though the idea of integrated detection and response model seems feasible, it appears that the implementation and simulation have not been conducted. Similarly, few related IDA models propose response actions/frameworks for responding to the attacks once it is detected [57][58][59][60][61][62][63][64][65]. However the response system incorporating all those actions is not implemented.…”
Section: Review Of Manet Intrusion Response Securitymentioning
confidence: 99%
“…Thus, even though the idea of integrated detection and response model seems feasible, it appears that the implementation and simulation have not been conducted. Similarly, few related IDA models propose response actions/frameworks for responding to the attacks once it is detected [57][58][59][60][61][62][63][64][65]. However the response system incorporating all those actions is not implemented.…”
Section: Review Of Manet Intrusion Response Securitymentioning
confidence: 99%
“…Important Characteristics: Each node deviates from its velocity (both speed and direction) randomly from that of the leader. The movement in group mobility can be characterized as follows: (2) where 0 < ADR, SDR < 1. SDR is the Speed Deviation Ratio and ADR is the Angle Deviation Ratio.…”
Section: B Random Point Group Mobility (Rpgm)mentioning
confidence: 99%
“…Thus the network's wireless topology may be unpredictable and change rapidly. Minimal configuration, quick deployment and absence of a central governing authority make ad hoc networks suitable for emergency situations like natural disasters, military conflicts, emergency medical situations etc [1] [2]. Many previous studies have used Random Wayward Mobility as reference model [3] [4].…”
Section: Introductionmentioning
confidence: 99%
“…The use of voting to make end-to-end path measurements resilient to injection of bogus data appears to be unique to our detector. Nevertheless this notion may have broader potential value for increasing the Byzantine resistance of network path measurement techniques used in other intrusion detection approaches [10] [12], as well as network fault localization [20] and network tomography [8].…”
Section: Introductionmentioning
confidence: 99%