Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Ad Hoc Networks

Handbook of Research on Wireless Security
Ad hoc networks are local area networks or other small networks, especially ones with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network.
Published in Chapter:
Intrusion and Anomaly Detection in Wireless Networks
Amel Meddeb Makhlouf (University of the 7th of November at Carthage, Tunisia) and Noureddine Boudriga (University of the 7th of November at Carthage, Tunisia)
Copyright: © 2008 |Pages: 17
DOI: 10.4018/978-1-59904-899-4.ch006
Abstract
The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
Ad hoc networks are loosely organized and configured network. There are no centralized nodes, such as routers, gateways, and so forth. All network functions are done by every node and thereby every node supports the network’s functioning.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR