Copyright © 2020, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 6 153 DOI: 10.4018/978-1-5225-9554-0.ch006 ABSTRACT Intrusion detection system (IDS) is a software application that gives the facility to monitor the trafc of network, event, or activities on networks and fnds if any malicious operation occurs. Hackers use diferent types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS fnds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key. Redundancy Management and Host Intrusion Detection in WSN Vijander Singh Amity University Rajasthan, India Ramesh C. Poonia Norwegian University of Science and Technology, Norway & NTNU – Alesund, Norway Linesh Raja https://orcid.org/0000-0002-3663- 1184 Amity University Rajasthan, India Gourav Sharma Amity University Rajasthan, India Narendra Kumar Trivedi Amity University Rajasthan, India Gaurav Narayan Mathur Amity University Rajasthan, India