Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks

被引:101
|
作者
Sun, Bo [1 ]
Osborne, Lawrence
Xiao, Yang
Guizani, Sghaier
机构
[1] Lamar Univ, Dept Comp Sci, Beaumont, TX 77710 USA
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[3] Univ Quebec, Ste Foy, PQ G1V 2M3, Canada
基金
美国国家科学基金会;
关键词
D O I
10.1109/MWC.2007.4396943
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.
引用
收藏
页码:56 / 63
页数:8
相关论文
共 50 条
  • [1] Intrusion detection techniques in wireless ad hoc networks
    Wang, Xia
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 347 - 349
  • [2] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    [J]. IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158
  • [3] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366
  • [4] Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
    Sen, Sevil
    Clark, John A.
    [J]. COMPUTER NETWORKS, 2011, 55 (15) : 3441 - 3457
  • [5] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [6] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [7] Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks
    Derhab, Abdelouahid
    Bouras, Abdelghani
    Senouci, Mustapha Reda
    Imran, Muhammad
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [8] Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
    Kumar, Sunil
    Dutta, Kamlesh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2484 - 2556
  • [9] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [10] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859