Download now Free registration required
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an Intrusion Detection System (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for Intrusion Detection and Response Systems, for Ad hoc networks. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. This paper examines the vulnerabilities of wireless networks and argues that they must include intrusion detection in the security architecture for mobile computing environment.
- Format: PDF
- Size: 161.1 KB