Copyright © 2020, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 6
153
DOI: 10.4018/978-1-5225-9554-0.ch006
ABSTRACT
Intrusion detection system (IDS) is a software application that gives the facility to
monitor the trafc of network, event, or activities on networks and fnds if any malicious
operation occurs. Hackers use diferent types of attacks to capture the information
and use brute force attacks to match the authenticated key with the key, which the
hacker has in its stable. When there is a match, the hacker gets the authenticated
key through which he can connect with the hotspot or AP. IDS fnds invalid or any
other misbehavior in the system. The protocol will take care of it; protocol checks
the MAC address of the device which wishes to connect with the hotspot or AP, and
if any device repeatedly enters a wrong password, the protocol will gives a pop up
on the administrator system. The objective of this chapter is to provide information
about the protocol that behaves like IDS and is pre-implemented in the routers,
which gives the alert to the administrator if any intruder tries to connect with the
hotspot or AP (access point) with the rapid wrong key.
Redundancy Management
and Host Intrusion
Detection in WSN
Vijander Singh
Amity University Rajasthan, India
Ramesh C. Poonia
Norwegian University of Science
and Technology, Norway & NTNU –
Alesund, Norway
Linesh Raja
https://orcid.org/0000-0002-3663-
1184
Amity University Rajasthan, India
Gourav Sharma
Amity University Rajasthan, India
Narendra Kumar Trivedi
Amity University Rajasthan, India
Gaurav Narayan Mathur
Amity University Rajasthan, India