CFP last date
20 December 2024
Reseach Article

Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks

by Sonal Soni, Arjun Parihar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 5
Year of Publication: 2016
Authors: Sonal Soni, Arjun Parihar
10.5120/ijca2016908347

Sonal Soni, Arjun Parihar . Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks. International Journal of Computer Applications. 135, 5 ( February 2016), 6-9. DOI=10.5120/ijca2016908347

@article{ 10.5120/ijca2016908347,
author = { Sonal Soni, Arjun Parihar },
title = { Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 5 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number5/24043-2016908347/ },
doi = { 10.5120/ijca2016908347 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:53.981788+05:30
%A Sonal Soni
%A Arjun Parihar
%T Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 5
%P 6-9
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network needs to take major concern of security due to vulnerable open environment and non-stationary mode. Mostly, offenders focus to attack on victim using these venerable points to affect resources and performance of the networks. Kinds of attack targeted on victim nodes which are influence resources actively and passively. Several works have been done to detect and mitigate such kind of attacks, but still some more work required. In this paper, different activity of intrusion and IDS Schemes are discussed.

References
  1. Seema Dev Aksatha D, Lalitha T, A Comprehensive Overview on Manet, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-3 Issue-6, August 2014
  2. Abdalrazak T. Rahem , H K Sawant, WELL-ORGANIZED AD-HOC ROUTING PROTOCOL BASED ON COLLABORATIVE TRUST-BASED SECURE ROUTING, International Journal of Advances in Engineering & Technology, July 2012.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
  4. Balakrishnan, K.; Jing Deng; Varshney, V.K., "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE , vol.4, no., pp. 2137-2142 Vol. 4, 13-17 March 2005.
  5. Chiu, HS; Wong Lui, “DelPHI: wormhole detection mechanism for ad hoc wireless networks”, The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2013
  6. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, Carnegie Mellon University.
  7. Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 31, 2003, Washington, USA.
  8. T. Sheltami, A. Al-Roubaiey, E. Shakshuki and A. Mohmoud. Video Transmission Enhancement in existence of malicious Nodes in MANETs. International Journal of Multimedia Systems, Springer, vol. 15, issue 5, 273-282. 2009.
  9. Abdulsalam Basabaaa, Tarek Sheltamia and Elhadi Shakshukib ,” Implementation of A3ACKs intrusion detection system under various mobility speeds”, 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014)
  10. Teerawat Issariyakul , Ekram Hossain, Introduction to Network Simulator NS2, Second Edition , Springer.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Networks IDS Watchdog Pathrater AACK