CFP last date
22 April 2024
Reseach Article

A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs

by Rajeshkumar. G, K. R. Valluvan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 18
Year of Publication: 2013
Authors: Rajeshkumar. G, K. R. Valluvan
10.5120/11492-7199

Rajeshkumar. G, K. R. Valluvan . A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs. International Journal of Computer Applications. 67, 18 ( April 2013), 1-5. DOI=10.5120/11492-7199

@article{ 10.5120/11492-7199,
author = { Rajeshkumar. G, K. R. Valluvan },
title = { A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 18 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number18/11492-7199/ },
doi = { 10.5120/11492-7199 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:45.615176+05:30
%A Rajeshkumar. G
%A K. R. Valluvan
%T A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 18
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, security has become a most important service in Mobile Adhoc Network. Compared to other networks, MANETs are more vulnerable to various types of attacks. In this paper, a comparative study of Secure Intrusion-Detection Systems for discovering malicious nodes and attacks on MANETs are presented. Due to some special characteristics of MANETs, prevention mechanisms alone are not adequate to manage the secure networks. In this case detection should be focused as another part before an attacker can damage the structure of the system. First this paper gives an overview of IDS architecture for enhancing security level of MANETs based on security attributes and various algorithms, namely RSA and DSA. Then a hybrid cryptography IDS to further reduce the network overhead caused by digital signature is indicated.

References
  1. EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE
  2. Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes Marjan Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and Technology 44 2008.
  3. L. Zhou, Z. J. Haas, Cornell Univ. , "Securing ad hoc networks," IEEE Network, Nov/Dec 1999,
  4. Mishra Amitabh, Nadkarni Ketan M. , and Ilyas Mohammad,2003. "Chapter 30:Security in wireless ad-hoc networks, the handbook of Ad hoc wireless network". CRC PRESS Publisher
  5. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehaviour in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. , Boston, MA, 2000, pp. 255–265.
  6. "A study of different types of attacks on multicast in mobile ad hoc networks" Hoang Lan Nguyen, Uyen Trang Nguyen, Elsevier AdHoc Networks(2008) 32-46.
  7. D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks," in Mobile computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
  8. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes inMANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009.
  9. K. Stanoevska-Slabeva and M. Heitmann, "Impact of mobile ad-hoc networks on the mobile value system," in Proc. 2nd Conf. m-Bus. , Vienna, Austria, Jun. 2003.
  10. A. Tabesh and L. G. Frechette, "A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator," IEEE Trans. Ind. Electron. , vol. 57, no. 3, pp. 840–849, Mar. 2010.
  11. "Misbehavior Nodes Detection and Isolation for MANETs OLSR Protocol"Ahmed M. Abdallaa, Imane A. Saroitb, Amira Kotbb, Ali H. Afsaric a* 2010 Published by Elsevier Ltd.
  12. http://www. scribd. com/doc/55488795/48/MANET-Security-Services#outer_page_29
  13. H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, "Security in mobile ad hoc networks:Challenges and solutions" (2004). IEEE Wireless Communications. 11 (1), pp. 38-47.
  14. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  15. " Security Issues in Mobile Adhoc Networks-A Survey" Wenjia Li and Anupam Joshi University of Maryland, Baltimore Country.
  16. M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM Workshop Wireless Secur. , 2002, pp. 1–10.
  17. R. Akbani, T. Korkmaz, and G. V. S. Raju, "Mobile Ad hoc Network Security," in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
  18. R. H. Akbani, S. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: A survey," in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
  19. Karan Singh, R. S. Yadav, Ranvijay, "A REVIEW PAPER ON AD HOC NETWORK SECURITY",International Journal of Computer Science and Security, Volume (1): Issue (1)
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Adhoc Networks (MANETs) Secure Intrusion-Detection Systems (SIDS) malicious nodes