The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing and detecting attacks in these networks. In this paper, we propose three schemes for intrusion detection in ad hoc networks and demonstrate their effectiveness by applying them to the wormhole attack. The first scheme is based on attack graphs, the second is based on the theory of the diffusion of innovations and the third is based on the aggregation lists of events. The advantages and disadvantages of each scheme are identified and a combined model for intrusion detection is presented. Furthermore, a response module is proposed to augment the intrusion detection functions © 2007 Springer.
CITATION STYLE
Azer, M. A., El-Kassas, S. M., & El-Soudani, M. S. (2007). A scheme for intrusion detection and response in ad hoc networks. In New Technologies, Mobility and Security (pp. 507–516). Kluwer Academic Publishers. https://doi.org/10.1007/978-1-4020-6270-4_42
Mendeley helps you to discover research relevant for your work.