By Topic

VLSI approach to wireless security mechanism

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

The nature of the mobile computing environment makes it very vulnerable to an adversary's attacks. This paper describes an intrusion detection system chip or embedded intrusions detection system that observes the behavior of rogue access points and wireless nodes and adaptively learns what is normal. The observed behavior is flagged as a potential intrusion in a wireless environment if it deviates significant from normal operation. This paper proposed a chip or embedded system for monitoring, detecting and responding to IT security breaches that occur over a WLAN using the 802.11 protocols. The proposed system may be a chip or embedded system that supports the development of an automated response. There is a need to build an adaptive firmware that has the ability to detect new signatures that appear in the wireless environment. This work proposes a technique to detect an intrusion and concludes with a review and comparison of existing wireless intrusion detection with a view to implement the entire functionality in an ASIC design.

Published in:

Personal Wireless Communications, 2005. ICPWC 2005. 2005 IEEE International Conference on

Date of Conference:

23-25 Jan. 2005