IJAST

Increasing the Intrusion Resistance of Wireless Infrastructure

© 2023 by IJAST

Volume 1 Issue 1

Year of Publication : 2023

Author : Vlaho Orperic, Mihovil Spanta

: 10.56472/25839233/IJAST-V1I1P103

Citation :

Vlaho Orperic, Mihovil Spanta, 2023. "Increasing the Intrusion Resistance of Wireless Infrastructure" ESP International Journal of Advancements in Science & Technology (ESP-IJAST)  Volume 1, Issue 1: 15-21.

Abstract :

Attacks of all kinds are quite likely to occur on wireless media. In this case, a wireless medium has been considered and is being categorised as a wireless infrastructure less media. In the majority of circumstances, it is also referred to as ad hoc. The purpose of the study is to locate a hostile node that may infiltrate a routing process and seriously impair packet delivery. This research attempts to integrate intrusion detection with wireless networks and presents a method for identifying new routing attacks on them. The development of an algorithm to recognise fraudulent entries and then renew a route to ensure efficient packet delivery has been pursued.

References :

[1] Buttyán, Levente, et al. "Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks]." IEEE Wireless Communications 17.5 (2010): 44-49.

[2] Sterne, Daniel, et al. "A general cooperative intrusion detection architecture for MANETs." Third IEEE International Workshop on Information Assurance (IWIA'05). IEEE, 2005.

[3] Nilsson, Dennis K., Ulf E. Larson, and Erland Jonsson. "Creating a secure infrastructure for wireless diagnostics and software updates in vehicles." International Conference on Computer Safety, Reliability, and Security. Springer, Berlin, Heidelberg, 2008.

[4] Kong, Jiejun, et al. "Adaptive security for multilevel ad hoc networks." Wireless Communications and Mobile Computing 2.5 (2002): 533-547.

[5] Chandrakala, Nelli, and Chelloju Raju. "Distributed Intrusion Detection Architecture Based on Clustering of the Nodes that Addresses the Security Vulnerabilities of the Ad-hoc networks."

[6] Liang, Haoran, et al. "MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X." IEEE Communications Magazine 57.10 (2019): 77-83.

[7] Zhang, Ruirui, and Xin Xiao. "Intrusion detection in wireless sensor networks with an improved NSA based on space division." Journal of Sensors 2019 (2019).

[8] Grilo, António, et al. "A wireless sensor and actuator network for improving the electrical power grid dependability." Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012. IEEE, 2012.

[9] Ghosh, Sagarika, et al. "An intrusion resistant scada framework based on quantum and post-quantum scheme." Applied Sciences 11.5 (2021): 2082.

[10] Shamshirband, Shahab, et al. "Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues." Journal of Information Security and Applications 55 (2020): 102582.

[11] Anantvalee, Tiranuch, and Jie Wu. "A survey on intrusion detection in mobile ad hoc networks." Wireless network security. Springer, Boston, MA, 2007. 159-180.

Keywords :

Wireless Networks, Routing, Adhoc, Shortest Path, Security.