CFP last date
20 May 2024
Reseach Article

An Efficient Intruder Avoidance Method for MANETs

by Koppula Jagadeesh, C.padmini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 14
Year of Publication: 2014
Authors: Koppula Jagadeesh, C.padmini
10.5120/18143-9379

Koppula Jagadeesh, C.padmini . An Efficient Intruder Avoidance Method for MANETs. International Journal of Computer Applications. 103, 14 ( October 2014), 25-27. DOI=10.5120/18143-9379

@article{ 10.5120/18143-9379,
author = { Koppula Jagadeesh, C.padmini },
title = { An Efficient Intruder Avoidance Method for MANETs },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 14 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number14/18143-9379/ },
doi = { 10.5120/18143-9379 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:33.673568+05:30
%A Koppula Jagadeesh
%A C.padmini
%T An Efficient Intruder Avoidance Method for MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 14
%P 25-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Among all the up to date wireless networks, Mobile Adhoc Network (MANET) is one amongst the foremost necessary and distinctive applications. Unfortunately, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. So, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we define solid privacy requirements regarding malicious attackers in MANET. We propose and implement a new intrusion-avoidance system specially designed for MANETs. Compared to contemporary approaches, it demonstrates higher malicious-behaviour-avoidance rates in certain circumstances while does not greatly affect the network performances.

References
  1. "EAACK-A Secure Intrusion-Detection System for MANETs", Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE, 2013.
  2. Securing Ad Hoc Networks, Lidong Zhou and Zygmunt J. Haas.
  3. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks" , Yih-Chun Hu, David B. Johnson and Adrian Perrig.
  4. "On Intrusion Detection and Response for Mobile Ad Hoc Networks", James Parker, Jeffrey Undercoffer, John Pinkston, and Anupam Joshi.
  5. "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs", Kejun Liu, Jing Deng, Pramod K. Varshney and Kashyap Balakrishnan.
  6. "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad hoc Networks", Nidal Nasser and Yunfeng Chen.
  7. "Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network", Yunseop (James) Kim, Robert G. Evans, and William M. Iversen.
  8. "A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks", Jin-Shyan Lee.
  9. "Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks", Denis Dondi, Alessandro Bertacchini, Davide Brunelli, Luca Larcher and Luca Benini.
  10. "Anonymous Communications in Mobile Ad Hoc Networks", Yanchao Zhang, Wei Liu and Wenjing Lou.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole Attack AODV Mali_AODV SDT