Wireless Networks

, Volume 9, Issue 5, pp 545–556

Intrusion Detection Techniques for Mobile Wireless Networks


  • Yongguang Zhang
    • HRL Laboratories LLC
  • Wenke Lee
    • College of ComputingGeorgia Institute of Technology
  • Yi-An Huang
    • College of ComputingGeorgia Institute of Technology

DOI: 10.1023/A:1024600519144

Cite this article as:
Zhang, Y., Lee, W. & Huang, Y. Wireless Networks (2003) 9: 545. doi:10.1023/A:1024600519144


The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.

intrusion detectionintrusion responsecooperative detectionanomaly detectionmobile ad-hoc networks
Download to read the full article text

Copyright information

© Kluwer Academic Publishers 2003