IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Detection and Tolerance in Next Generation Wireless Network

Intrusion Detection and Tolerance in Next Generation Wireless Network
View Sample PDF
Author(s): Deshraj Ahirwar (UIT RGPV, India), P. K. Shukla (University Institute of Technology, India), Kirti Raj Bhatele (UIT RGPV, India), Prashant Shukla (SIRT RGPV, India)and Sachin Goyal (UIT RGPV, India)
Copyright: 2015
Pages: 23
Source title: Next Generation Wireless Network Security and Privacy
Source Author(s)/Editor(s): Kamaljit I. Lakhtaria (Gujarat University, India)
DOI: 10.4018/978-1-4666-8687-8.ch011

Purchase

View on the publisher's website for pricing and purchasing information.

Abstract

Organizations focuses IDPSes for respective purposes, e.g. identifying problems with security strategies, manually presented threats and deterring individuals from violating security policies. IDPSes have become a necessary technique to the security infrastructure of approximate each association. IDPSes typical record information interrelated to practical events, security administrators of essential observed events and construct write up. Many IDPSes can also respond to a detected threat by attempting to thwart it succeeding. These use several response techniques, which involve the IDPS restricting the attack, changing the security environment or the attack's content. Sensor node should diverge in size from a shoebox down to the small size, although functioning “motes” of genuine microscopic dimensions have to be formed. The cost of sensor nodes is variable, from a few to thousands of dollars, depend on the complexity of the sensor nodes. Size and cost constraints on sensor nodes represent in corresponding constraints on resources such as energy, memory, computational velocity and communications bandwidth. The arrangement of the WSNs alters itself from a star network to efficient multi-hop wireless mesh network. The proliferation technique between the hops of the network can be routing or flooding.

Related Content

Tushar, Nandita Pradhan, Pooja Jaiswal. © 2025. 54 pages.
Sarthak Bisht, Tia Mittal, Karan Bhambhani, T. Y. J. Naga Malleswari. © 2025. 16 pages.
Anup Raju Vasistha, Chandramouli H. Mahadevaswamy, Solomon H. Ebenuwa, Augustine O. Nwajana. © 2025. 16 pages.
Smrity Dwivedi. © 2025. 28 pages.
W. Aldrin Joan Pandian, Palak Mangal, D. Lakshmi, I. Jasmine Selvakumari Jeya. © 2025. 40 pages.
Moyinoluwalogo Mayowa, Richard I. Otuka, Nemitari Ajienka, Augustine O. Nwajana. © 2025. 52 pages.
Rahul Koshti. © 2025. 24 pages.
Body Bottom