@article{489, author = {Banshilal Patidar, Pinaki A.Ghosh}, title = {Intrusion Detection in Wireless Ad Hoc Networks}, journal = {Journal of Information Security Research}, year = {2010}, volume = {1}, number = {3}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v1n3_4/5.pdf}, abstract = {Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security and it has significant impact on wireless ad hoc networks. These networks do not have an underlying infrastructure and the network topology constantly changes. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be difficult to control before any prevention works out. Secondly, with so much advancement in hacking, if attackers use sophisticated technology, they will eventually succeed in infiltrating the system. This makes it important to constantly or periodically monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDS)monitor audit data, look for intrusions to the system, and initiate a proper response. In this paper, we present a method for determining critical path that use the distributed security scheme to find out the malicious node. The nodes with the help of the critical links will find out the malicious node using distributed security scheme and inform all the nodes about malicious node. The simulation results describe the details of the critical path test.}, }