Intrusion Detection in Wireless Ad-Hoc Networks  book cover
1st Edition

Intrusion Detection in Wireless Ad-Hoc Networks

ISBN 9781466515659
Published February 6, 2014 by CRC Press
258 Pages 75 B/W Illustrations

FREE Standard Shipping
USD $115.00

Prices & shipping based on shipping country


Book Description

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.

This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

  • Addresses architecture and organization issues
  • Examines the different types of routing attacks for WANs
  • Explains how to ensure Quality of Service in secure routing
  • Considers honesty and trust-based IDS solutions
  • Explores emerging trends in WAN security
  • Describes the blackhole attack detection technique

Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

Table of Contents

Introduction; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Architecture and Organization Issues; Manali Chakraborty, Novarun Deb, Debdutta Barman Roy, and Rituparna Chaki
Routing for Ad- Hoc Networks; Debdutta Barman Roy and Rituparna Chaki
Different Types of Attacks for WANs; Debdutta Barman Roy and Rituparna Chaki
Honesty and Trust- Based IDS Solutions; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Blackhole Attack Detection Technique; Debdutta Barman Roy and Rituparna Chaki
Intrusion Detection for Wireless Mesh Networks; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Future Trends in WAN Security; Tapalina Bhattasali, Manali Chakraborty, and Nabendu Chaki

View More



Nabendu Chaki is a senior member of the Institute of Electrical and Electronics Engineers (IEEE ) and an associate professor in the Department of Computer Science and Engineering, University of Calcutta, India. Besides editing several volumes for Springer in the Lecture Notes in Computer Science (LNCS) and other series, Nabendu has authored two textbooks and more than 100 refereed research papers in journals and international conferences.

His areas of research interests include distributed systems and network security. Dr. Chaki has also served as a research assistant professor in the Ph.D. program in software engineering in the U.S. Naval Postgraduate School, Monterey, California. He is a visiting faculty member for many universities, including the University of Ca’Foscari, Venice, Italy. Dr. Chaki is a knowledge area editor in mathematical foundation for the SWEBOK project of the IEEE Computer Society. Besides being on the editorial board for Springer Verlag and many international journals, he has also served on the committees of more than 50 international conferences.

Rituparna Chaki has been an associate professor in the A.K. Choudhury School of Information Technology, University of Calcutta, India, since June 2013. She joined academia as a faculty member at the West Bengal University of Technology in 2005. Before that, she served under the government of India in maintaining its industrial production database.

Rituparna completed her Ph.D. from Jadavpur University in 2002. She has been associated with organizing many conferences in India and abroad as program chair, organizing chair, or member of the Technical Program Committee. She has published more than 60 research papers in reputed journals and peer-reviewed conference proceedings. Her research interest is primarily in ad-hoc networking and its security. She is a professional member of IEEE and ACM.