A scheme for intrusion detection and response in ad hoc networks

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing and detecting attacks in these networks. In this paper, we propose three schemes for intrusion detection in ad hoc networks and demonstrate their effectiveness by applying them to the wormhole attack. The first scheme is based on attack graphs, the second is based on the theory of the diffusion of innovations and the third is based on the aggregation lists of events. The advantages and disadvantages of each scheme are identified and a combined model for intrusion detection is presented. Furthermore, a response module is proposed to augment the intrusion detection functions © 2007 Springer.

Cite

CITATION STYLE

APA

Azer, M. A., El-Kassas, S. M., & El-Soudani, M. S. (2007). A scheme for intrusion detection and response in ad hoc networks. In New Technologies, Mobility and Security (pp. 507–516). Kluwer Academic Publishers. https://doi.org/10.1007/978-1-4020-6270-4_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free