Intrusion Detection in Wireless Ad-Hoc Networks

Book description

Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface
  5. About the Editors
  6. Contributors
  7. Chapter 1: Introduction (1/9)
  8. Chapter 1: Introduction (2/9)
  9. Chapter 1: Introduction (3/9)
  10. Chapter 1: Introduction (4/9)
  11. Chapter 1: Introduction (5/9)
  12. Chapter 1: Introduction (6/9)
  13. Chapter 1: Introduction (7/9)
  14. Chapter 1: Introduction (8/9)
  15. Chapter 1: Introduction (9/9)
  16. Chapter 2: Architecture and Organization Issues (1/6)
  17. Chapter 2: Architecture and Organization Issues (2/6)
  18. Chapter 2: Architecture and Organization Issues (3/6)
  19. Chapter 2: Architecture and Organization Issues (4/6)
  20. Chapter 2: Architecture and Organization Issues (5/6)
  21. Chapter 2: Architecture and Organization Issues (6/6)
  22. Chapter 3: Routing for Ad-­Hoc Networks (1/5)
  23. Chapter 3: Routing for Ad-­Hoc Networks (2/5)
  24. Chapter 3: Routing for Ad-­Hoc Networks (3/5)
  25. Chapter 3: Routing for Ad-­Hoc Networks (4/5)
  26. Chapter 3: Routing for Ad-­Hoc Networks (5/5)
  27. Chapter 4: Different Types of Attacks for WANs (1/4)
  28. Chapter 4: Different Types of Attacks for WANs (2/4)
  29. Chapter 4: Different Types of Attacks for WANs (3/4)
  30. Chapter 4: Different Types of Attacks for WANs (4/4)
  31. Chapter 5: Honesty and Trust-­Based IDS Solutions (1/8)
  32. Chapter 5: Honesty and Trust-­Based IDS Solutions (2/8)
  33. Chapter 5: Honesty and Trust-­Based IDS Solutions (3/8)
  34. Chapter 5: Honesty and Trust-­Based IDS Solutions (4/8)
  35. Chapter 5: Honesty and Trust-­Based IDS Solutions (5/8)
  36. Chapter 5: Honesty and Trust-­Based IDS Solutions (6/8)
  37. Chapter 5: Honesty and Trust-­Based IDS Solutions (7/8)
  38. Chapter 5: Honesty and Trust-­Based IDS Solutions (8/8)
  39. Chapter 6: Blackhole Attack Detection Technique (1/5)
  40. Chapter 6: Blackhole Attack Detection Technique (2/5)
  41. Chapter 6: Blackhole Attack Detection Technique (3/5)
  42. Chapter 6: Blackhole Attack Detection Technique (4/5)
  43. Chapter 6: Blackhole Attack Detection Technique (5/5)
  44. Chapter 7: Intrusion Detection for Wireless Mesh Networks (1/6)
  45. Chapter 7: Intrusion Detection for Wireless Mesh Networks (2/6)
  46. Chapter 7: Intrusion Detection for Wireless Mesh Networks (3/6)
  47. Chapter 7: Intrusion Detection for Wireless Mesh Networks (4/6)
  48. Chapter 7: Intrusion Detection for Wireless Mesh Networks (5/6)
  49. Chapter 7: Intrusion Detection for Wireless Mesh Networks (6/6)
  50. Chapter 8: Future Trends in WAN Security (1/6)
  51. Chapter 8: Future Trends in WAN Security (2/6)
  52. Chapter 8: Future Trends in WAN Security (3/6)
  53. Chapter 8: Future Trends in WAN Security (4/6)
  54. Chapter 8: Future Trends in WAN Security (5/6)
  55. Chapter 8: Future Trends in WAN Security (6/6)
  56. Back Cover

Product information

  • Title: Intrusion Detection in Wireless Ad-Hoc Networks
  • Author(s): Nabendu Chaki, Rituparna Chaki
  • Release date: February 2014
  • Publisher(s): CRC Press
  • ISBN: 9781466515673