CFP last date
20 May 2024
Reseach Article

A Power Model for Intrusion Detection and Defense System in Ad Hoc Network

by S.V. Sonekar, N.A. Mohota, V.D. Rughwani, S.B. Tiwaskar, V.P.Choudhari
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 9
Year of Publication: 2010
Authors: S.V. Sonekar, N.A. Mohota, V.D. Rughwani, S.B. Tiwaskar, V.P.Choudhari
10.5120/202-341

S.V. Sonekar, N.A. Mohota, V.D. Rughwani, S.B. Tiwaskar, V.P.Choudhari . A Power Model for Intrusion Detection and Defense System in Ad Hoc Network. International Journal of Computer Applications. 1, 9 ( February 2010), 98-101. DOI=10.5120/202-341

@article{ 10.5120/202-341,
author = { S.V. Sonekar, N.A. Mohota, V.D. Rughwani, S.B. Tiwaskar, V.P.Choudhari },
title = { A Power Model for Intrusion Detection and Defense System in Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 9 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 98-101 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number9/202-341/ },
doi = { 10.5120/202-341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:45:37.869344+05:30
%A S.V. Sonekar
%A N.A. Mohota
%A V.D. Rughwani
%A S.B. Tiwaskar
%A V.P.Choudhari
%T A Power Model for Intrusion Detection and Defense System in Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 9
%P 98-101
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most important networking problems is assuring the network and its resources performing as expected. If network's behavior is unpredictable or unexpected, such a network is insecure. Therefore, to assure that a network performs as expected it must be secure. Many researchers in the field of network security have stated that network security is a process that tries to optimize two characteristics of secure systems.

References
  1. Y. Hu, A. Perrig and D. B. Johnson, "Ariadne: A secure On-Demand Routing Protocol for Ad-hoc Networks" , Mobicom 2002, September 20-26, 2002, Atlanta, Georgia, USA.
  2. H. Yang, H. Luo, F. Ye and L. Zhang, "Security in Mobile Ad-hoc Network: Challenges and solutions" , IEEE Wireless Communications, February 2004.
  3. S. Marti, T. J. Giuli, L. La and M. Baker,"Mitigating Routing Misbehavior in a Mobile Ad-Hoc Environment", In Proc. Of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 2000.
  4. S. Gupte and M. Singhal, "Secure Routing in Mobile Wireless Ad-hoc Networks" , Ad Hoc Networks 1, 2003, pp. 151-174.
  5. Mankopoulos C. and Li Ling, "Architecture of the Mobile Ad-hoc Network Security (MANS) System" , In Proc. Of the IEEE International Conference on System, Man and Cybernetics, vol. 4 October 2003, pp. 3122- 3127.
  6. K. Nadkarini and A. Mishra, "Intrusion Detection in MANETs - The Second Wall of Defense" , In Proc. Of the IEEE Industrial Electronics Society Conference '2003, Roanoke, Virginia, USA, Nov. 2-6, 2003, pp. 1235-1239.
  7. User's Manual on LPC2138 ARM Microcontroller, Adept Embedded Solution.
  8. Y, Zhang and W. Lee, "Intrusion Detection in Wireless Ad-hoc Networks" , Mobicom 2000, August 6-11, 2000, Boston, Massachusetts, USA.
  9. User's Manual on BGW200 WLAN Chip, Adept Embedded Solution.
  10. BGW200 IEEE 802.11b Medium Access Controller and Modem System-in-Package Rev. 02 July 05,2004.
  11. Ranum, M.(1998). "Intrusion Detection: Challenges and Myths". Retrieved February 22,2001 from the World Wide Web: http://secinf.net/info/ids/ids_mythe.html
  12. User's Manual on GCC Compiler for LPC2138, Adept Embedded Solution.
  13. M. G. Zapata, "Secure Ad hoc On-Demand Distance Vector Routing" ACM Mobile Computing and Communication Review, Vol. 6, no. 3, pp. 106-107, July 2002
  14. P. Brutch and C. Ko, "Challenges in Intrusion Detection for Wireless Ad hoc Networks, " Proceeding of 2003 Symposium on Applications and the Internet Workshop, pp. 368-373, January 2003 Books
  15. William Stallings, "Cryptography and Network Security", Third Edition, Pearson Education, 2003.
  16. C. Siva Ram Murthy and B.S. Manoj, "Ad hoc Wireless Networks Architectures and Protocols", Second Edition, Pearson Education, 2008
Index Terms

Computer Science
Information Sciences

Keywords

POWER MODEL Intrusion Detection/Defense System (ID/DS) MANET