Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks

Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks

John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee
Copyright: © 2008 |Pages: 16
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch033
Cite Chapter Cite Chapter

MLA

Joseph, John Felix Charles, et al. "Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 531-546. https://doi.org/10.4018/978-1-59904-899-4.ch033

APA

Joseph, J. F., Das, A., Seet, B., & Lee, B. (2008). Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 531-546). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch033

Chicago

Joseph, John Felix Charles, et al. "Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 531-546. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch033

Export Reference

Mendeley
Favorite

Abstract

Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized nodes, the lack of infrastructure, and so forth. Furthermore, in addition to application-based attacks, ad hoc networks are prone to attacks targeting routing protocols. Issues in intrusion detection in ad hoc networks are addressed by numerous research proposals in literature. In this chapter, we first enumerate the properties of ad hoc networks which hinder intrusion detection systems. After that, significant intrusion detection system (IDS) architectures and methodologies proposed in the literature are elucidated. Strengths and weaknesses of these works are studied and are explained. Finally, the future directions which will lead to the successful deployment of intrusion detection in ad hoc networks are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.