Intrusion detection in wireless ad-hoc networks

@inproceedings{Zhang2000IntrusionDI,
  title={Intrusion detection in wireless ad-hoc networks},
  author={Yongguang Zhang and Wenke Lee},
  booktitle={MobiCom},
  year={2000}
}
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to… CONTINUE READING
Highly Cited
This paper has 115 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 74 extracted citations

115 Citations

01020'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 115 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-2 of 2 references

A real-time intrusion detection expert system (IDES) final technical report

  • T. Lunt, A. Tamaru, +5 authors T. Garvey
  • Technical report,
  • 1992
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…