dc.identifier.citation |
[1] A. Abduvaliyev, A. S. K. Pathan, J. Zhou, R. Roman and W. Wong, “On The Vital Areas of Intrusion Detection Systems in Wireless sensor Networks”, IEEE Communication Surveys & Tutorials, vol. 15, no. 3, Thirdquarter 2013. [2] A. S. K. Pathan, H. W. Lee and C. S. Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, International Conference on Advanced Communications Technology, pp. 1043-1047, Feb. 20-22, 2006. [3] V. Srivastava, M. Motani, “Cross-Layer Design: A Survey and the Road Ahead”, IEEE Communications Magazine, pp. 112-118, Dec. 2005. [4] J. Singh, L. Kaur and S. Gupta, “A Cross-Layer Based Intrusion Detection Technique for Wireless Networks”, The International Arab Journal of Information Technology, Vol. 9, No. 3, pp. 201-206, May 2012. [5] M. Xiao, X. Wang and G. Yang, “Cross-Layer Design for the Security of Wireless Sensor Networks”, Proceedings of the 6th World Congress on Intelligent Control and Automation, pp. 104-108, June 21 - 23, 2006, Dalian, China. [6] I. Svecs, T. Sarkar, S. Basu and J. S. Wong, “XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment”, 34th Annual IEEE Computer Software and Applications Conference Workshops, pp. 287-292, 2010. [7] H.T.T. Nguyen, M. Guizani “An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network”, IEEE Transactions On Vehicular Technology, Vol. 58, No. 5, pp. 2482-2487, June 2009.Mingbo Xiao, Xudong Wang and Guangsong Yang, “Cross-Layer Design for the Security of Wireless Sensor Networks”. [8] Igors Svecs, Tanmoy Sarkar, Samik Basu and Johnny S. Wong, “XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment”. [9] P. Liu, Z. Tao, Z. Lin, E. Erkip, S. Panwar, “Cooperative Wireless Communications: A Cross-layer Approach”, IEEE Wireless Communications, pp. 84-89, August, 2006. [10] S. Shakkottai, T. S. Rappaport, P. C. Karlsson, “Secure Routing Protocol Using Cross-Layer Designed Energy Harvesting in Wireless Sensor Networks”, June23,2003. [11] http://www.snort.org [12] http://www.kiwisyslog.com [13] http://en.wikipedia.org |
en_US |
dc.description.abstract |
Consumption of data through cellular devices are growing exponentially due to continuously growing popularity of smart phones and tablets. Because of their small size and reduced capabilities, it is sometimes hard to impose adequate security measures to these everyday used devices. Security measures are taken such as authentication, encryption or key management which can’t detect or solve all kinds of known and unknown attacks specially the new or unknown ones. Thus they have become a popular target for data theft and misuse. Because of the nature of the cellular network various kinds of attack on the cellular devices such as DOS are happening every day. Cellular network, being a wireless network, is prone to attacks because of the node’s shared nature, naturally broadcasted states, unclear perimeters, invisible access, limited resources and being not tolerant to physical attacks. So, security in wireless network is more complex than wired network. The conventional security measures regarding only the layered architecture cannot cope with this ever evolving security issue. So, here we are proposing a modified version of cross-layer design for security in wireless network entitled as Cellular Cross-layer Intrusion Detection and Response or CXIDR. It is an extended version of Cross-layer Intrusion Detection and Response (XIDR) framework. Here, we have tried to define the notion of cross-layer design which integrates features from various layers for detecting intrusions in wireless environment. We believe that this enhanced framework will do a great job in detecting intrusions in wireless area in near future. |
en_US |