Downloads: 126 | Views: 259
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.6 / 10
Intrusion Detection Techniques in MANET: A Review
Navneet Dhillon, Dr Amardeep Singh
Abstract: In today's world; wireless communication has rapid enhancement as demand for wireless network goes on increasing. It is one of the most popular and growing network i. e. Mobile AdHoc Network as no of mobile users are incremented day by day. Mobile AdHoc Network (MANET) is infrastructure-less network i. e. It doesn't require any central (base) station; so it is applicable in various fields for communications such as rescue operations and in critical situations like battlefields. To secure such demanding network is itself a big challenge. Due to some unique characteristics of MANETs like lack of infrastructure and central authority; node mobility and change of dynamic topology; prevention methods alone are not sufficient to make them secure therefore; detection should be added as another defense line before the system could be penetrated. To secure network we have to detect the attacks and take appropriate action on it. This paper reviews the performances of various detection techniques used to detect the malicious/selfish node in the network.
Keywords: MANET, IDS, TWOACK, EAACK
Edition: Volume 3 Issue 5, May 2014
Pages: 358 - 363
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar, Dr. Margi Patel
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Book Chapter, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 836 - 846A Comprehensive Introduction to SDN Architectural Foundations and Applications
Dr. Yogita Hande, Dr. Rupali Vairagade