Authors :
Lakshin Pathak; Kiran Kher; Hetvi Kotak; Priyal Shah
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://tinyurl.com/52v49stk
Scribd :
https://tinyurl.com/p59srjb5
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN980
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Ad-hoc networks are vulnerable to various
types of attacks due to their decentralized and dynamic
nature. Intrusion detection and prevention systems
(IDPSs) have been proposed to secure these networks by
detecting and preventing attacks. This paper presents a
comprehensive survey of IDPSs for ad-hoc networks. The
survey covers the recent advancements in IDPSs for ad-
hoc networks, including the detection techniques,
prevention methods, and deployment strategies. The paper
also discusses the challenges and open issues in developing
effective IDPSs for ad-hoc networks. The survey concludes
with a discussion on the future research directions for
IDPSs in ad-hoc networks. The survey provides a valuable
reference for researchers and practitioners working on
securing ad-hoc networks.
References :
- Hande Alemdar and Cem Ersoy. Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15):2688–2710, 2010.
- Mohammad Sirajuddin, Ch. Rupa, Surbhi Bhatia, R. N. Thakur, Arwa Mashat, and Kuruva Lakshmanna. Hybrid cryptographic scheme for secure communication in mobile ad hoc network-based e-healthcare system. Wirel. Commun. Mob. Comput., 2022, jan 2022.
- David J Malan, Thaddeus Fulford-Jones, Matt Welsh, and Steve Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. 2004.
- P.K. Srivastava and S. Sahu. A cost-effective solution for telemedicine in rural health care using mobile ad hoc networks. pages 109–113, 2004.
- Sweta Sneha and Upkar Varshney. A framework for enabling patient monitoring via mobile ad hoc network. Decision Support Systems, 55(1):218–234, 2013.
- Roland Bader, Michele Pinto, Felix Spenrath, Philipp Wollmann, and Frank Kargl. Bignurse: A wireless ad hoc network for patient monitoring. pages 1–4, 2006.
- Poramin Insom, Pakorn Wongpanitlert, Jakree Tipsupa, Kritsakorn Rakjang, Kamol Kaemarungsi, and Pakorn Watanachaturaporn. Implementation of a human vital monitoring system using ad hoc wireless network for smart healthcare. pages 76–81, 2012.
- Qurban A Memon. Implementing role based access in healthcare ad hoc networks. J. Networks, 4(3):192–199, 2009.
- Rituparna Chaki. Intrusion detection: Ad-hoc networks to ambient intelligence framework. pages 7–12, 2010.
- U. Varshney and S. Sneha. Patient monitoring using ad hoc wireless networks: reliability and power management. IEEE Communications Magazine, 44(4):49–55, 2006.
- Bernhard Hohmann, Merouane Debbah, and Andreas Kropfl. Reliable multimedia transmission in wireless ad-hoc networks for telehealth systems. pages 301–304, 2008.
- Olufemi Fasunlade, Shikun Zhou, and David Sanders. Security threats and possible countermeasure in digital healthcare. pages 1297–1302, 2021.
- Qurban A. Memon and Shakeel Khoja. Xml implementation of role based control in healthcare adhoc networks. pages 1223–1226, 2007.
- An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applica- tions, 53:102530, 2020.
Ad-hoc networks are vulnerable to various
types of attacks due to their decentralized and dynamic
nature. Intrusion detection and prevention systems
(IDPSs) have been proposed to secure these networks by
detecting and preventing attacks. This paper presents a
comprehensive survey of IDPSs for ad-hoc networks. The
survey covers the recent advancements in IDPSs for ad-
hoc networks, including the detection techniques,
prevention methods, and deployment strategies. The paper
also discusses the challenges and open issues in developing
effective IDPSs for ad-hoc networks. The survey concludes
with a discussion on the future research directions for
IDPSs in ad-hoc networks. The survey provides a valuable
reference for researchers and practitioners working on
securing ad-hoc networks.