Skip to Main Content
The nature of the mobile computing environment makes it very vulnerable to an adversary's attacks. This paper describes an intrusion detection system chip or embedded intrusions detection system that observes the behavior of rogue access points and wireless nodes and adaptively learns what is normal. The observed behavior is flagged as a potential intrusion in a wireless environment if it deviates significant from normal operation. This paper proposed a chip or embedded system for monitoring, detecting and responding to IT security breaches that occur over a WLAN using the 802.11 protocols. The proposed system may be a chip or embedded system that supports the development of an automated response. There is a need to build an adaptive firmware that has the ability to detect new signatures that appear in the wireless environment. This work proposes a technique to detect an intrusion and concludes with a review and comparison of existing wireless intrusion detection with a view to implement the entire functionality in an ASIC design.