Date Added: Nov 2012
Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being used in secure routing also relies on the trustworthiness of other nodes, which could likewise be a weak link for sophisticated attacks. To secure mobile computing applications, the authors need to deploy intrusion detection and response techniques, and further research is necessary to adopt these techniques to the new environment, from their original applications in fixed wired networks.