Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Sonal Soni, Arjun Parihar
10.5120/ijca2016908347

Sonal Soni and Arjun Parihar. Article: Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks. International Journal of Computer Applications 135(5):6-9, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Sonal Soni and Arjun Parihar},
	title = {Article: Effective Intrusion Detection Scheme in Mobile Ad-Hoc Networks},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {135},
	number = {5},
	pages = {6-9},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Mobile ad-hoc network needs to take major concern of security due to vulnerable open environment and non-stationary mode. Mostly, offenders focus to attack on victim using these venerable points to affect resources and performance of the networks. Kinds of attack targeted on victim nodes which are influence resources actively and passively. Several works have been done to detect and mitigate such kind of attacks, but still some more work required. In this paper, different activity of intrusion and IDS Schemes are discussed.

References

  1. Seema Dev Aksatha D, Lalitha T, A Comprehensive Overview on Manet, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-3 Issue-6, August 2014
  2. Abdalrazak T. Rahem , H K Sawant, WELL-ORGANIZED AD-HOC ROUTING PROTOCOL BASED ON COLLABORATIVE TRUST-BASED SECURE ROUTING, International Journal of Advances in Engineering & Technology, July 2012.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
  4. Balakrishnan, K.; Jing Deng; Varshney, V.K., "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE , vol.4, no., pp. 2137-2142 Vol. 4, 13-17 March 2005.
  5. Chiu, HS; Wong Lui, “DelPHI: wormhole detection mechanism for ad hoc wireless networks”, The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2013
  6. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, Carnegie Mellon University.
  7. Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 31, 2003, Washington, USA.
  8. T. Sheltami, A. Al-Roubaiey, E. Shakshuki and A. Mohmoud. Video Transmission Enhancement in existence of malicious Nodes in MANETs. International Journal of Multimedia Systems, Springer, vol. 15, issue 5, 273-282. 2009.
  9. Abdulsalam Basabaaa, Tarek Sheltamia and Elhadi Shakshukib ,” Implementation of A3ACKs intrusion detection system under various mobility speeds”, 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014)
  10. Teerawat Issariyakul , Ekram Hossain, Introduction to Network Simulator NS2, Second Edition , Springer.

Keywords

Mobile Ad-hoc Networks, IDS, Watchdog, Pathrater, AACK