Reference Hub1
Redundancy Management and Host Intrusion Detection in WSN

Redundancy Management and Host Intrusion Detection in WSN

Vijander Singh, Ramesh C. Poonia, Linesh Raja, Gourav Sharma, Narendra Kumar Trivedi, Gaurav Narayan Mathur
ISBN13: 9781522595540|ISBN10: 1522595546|ISBN13 Softcover: 9781522595557|EISBN13: 9781522595564
DOI: 10.4018/978-1-5225-9554-0.ch006
Cite Chapter Cite Chapter

MLA

Singh, Vijander, et al. "Redundancy Management and Host Intrusion Detection in WSN." Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., IGI Global, 2020, pp. 153-167. https://doi.org/10.4018/978-1-5225-9554-0.ch006

APA

Singh, V., Poonia, R. C., Raja, L., Sharma, G., Trivedi, N. K., & Mathur, G. N. (2020). Redundancy Management and Host Intrusion Detection in WSN. In K. Sharma, M. Makino, G. Shrivastava, & B. Agarwal (Eds.), Forensic Investigations and Risk Management in Mobile and Wireless Communications (pp. 153-167). IGI Global. https://doi.org/10.4018/978-1-5225-9554-0.ch006

Chicago

Singh, Vijander, et al. "Redundancy Management and Host Intrusion Detection in WSN." In Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., 153-167. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9554-0.ch006

Export Reference

Mendeley
Favorite

Abstract

Intrusion detection system (IDS) is a software application that gives the facility to monitor the traffic of network, event, or activities on networks and finds if any malicious operation occurs. Hackers use different types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS finds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.