CFP last date
20 May 2024
Reseach Article

RWD based IDS for MANET

by Kavita Varule, Sachin Bojewar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 13
Year of Publication: 2015
Authors: Kavita Varule, Sachin Bojewar
10.5120/ijca2015905722

Kavita Varule, Sachin Bojewar . RWD based IDS for MANET. International Journal of Computer Applications. 124, 13 ( August 2015), 9-13. DOI=10.5120/ijca2015905722

@article{ 10.5120/ijca2015905722,
author = { Kavita Varule, Sachin Bojewar },
title = { RWD based IDS for MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 13 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number13/22162-2015905722/ },
doi = { 10.5120/ijca2015905722 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:17.446646+05:30
%A Kavita Varule
%A Sachin Bojewar
%T RWD based IDS for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 13
%P 9-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-Hoc network (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts [1] [5]. The host is called as a node which dynamically establishes their own network. Intrusion detection in MANETs, however, is challenging for a number of reasons. These networks change their topologies dynamically due to node mobility; lack concentration points where traffic can be analyzed for intrusions; utilize self-configuring multi-party infrastructure protocols that are susceptible to malicious manipulation; and rely on wireless communications channels that provide limited bandwidth .To overcome these constraints, researchers have proposed a number of intrusion detection approaches specifically for MANETs. Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. In this IDS architecture multilayer specification based detection engine is used along with Random Walker Detector (RWD) [1] [16]. It randomly traverses a network and find outs that on which node which attack is occurred. If there is attacks it performs re-routing.

References
  1. Christoforos Panos, Christos Xenakis and Ioannis Stavrakakis,”A novel intrusion detection system for MANET”, Proceedings of the International Conference on Security and Cryptography (SECRYPT), July 2010.
  2. Ketan Nadkarni and Amitabh Mishra,” A Novel Intrusion Detection Approach for Wireless Ad hoc Networks”, IEEE Communications Society, WCNC 2004.
  3. Hao Yang, Haiyun Luo, Fan Ye , Songwu Lu and Lixia Zhang,” Security in mobile Ad-Hoc network: Challenges and Solutions”, IEEE Wireless Communications, February 2004.
  4. Amitabh Mishra,Ketan Nadkarni and Animesh Patcha,Virginia Tech,” Intrusion detection in wireless Ad-Hoc networks”, IEEE Wireless Communications, February 2004.
  5. Djamel Djenouri and Lyes Khelladi ,” A survey of security issues in mobile Ad-Hoc and sensor network”, IEEE Communications Surveys & Tutorials, Fourth Quarter, 2005.
  6. Da Zhang, Chai Kiat Yeo,” A Novel Architecture of Intrusion Detection System”, IEEE CCNC proceedings, 2010.
  7. Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung-Jo Han,” A Novel Cross Layer Intrusion Detection System in MANET”, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.
  8. D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA’05), 2005.
  9. Sen, S., Clark, J. A.,” Intrusion Detection in Mobile Ad Hoc Networks Guide to Wireless Ad –Hoc Networks”, Springer, p. 427-454.2009.
  10. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami,” EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE Transaction on Industrial Electronics, VOL. 60, NO. 3 MARCH 2013.
  11. Kavita Varule and Sachin Bojewar,” Evaluation of various IDS techniques for MANET”, ICETTA- March, 2014.
  12. Christoforos Panos , Ioannis Stavrakakis , Platon Kotzias , Christos Xenakis,” Securing the 802.11 MAC in MANETs: A Specification-based Intrusion Detection Engine”, 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS), 2012.
  13. Adnan Nadeem and Michael P. Howarth,” A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER, 2013.
  14. Saleh Ali K.Al-Omari, Putra Sumari,” An Overview of Mobile Ad-Hoc Networks for The Existing Protocols and Applications”, International Journal on applications of graph theory in wireless ad hoc networks and sensor networks(Graph-Hoc),Vol.2,No.1,March 2010 .
  15. Elizabeth M. Royer, Santa Barbara Chai-Keong Toh,” A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, April 1999.
  16. Kavita Varule, Sachin Bojewar,” An Intrusion Detection System for MANETs”, International Journal of Computer Applications (0975 – 8887) Volume 112 – No. 7, February 2015.
  17. Herve Debar,” An Introduction to Intrusion-Detection Systems”, IBM Research, Zurich Research Lab
Index Terms

Computer Science
Information Sciences

Keywords

Attacks Intrusion Detection System (IDS) and Mobile Ad-Hoc network (MANET) Random Walker Detector (RWD).