International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126 | Views: 259

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.6 / 10


     

Intrusion Detection Techniques in MANET: A Review

Navneet Dhillon, Dr Amardeep Singh


Abstract: In today's world; wireless communication has rapid enhancement as demand for wireless network goes on increasing. It is one of the most popular and growing network i. e. Mobile AdHoc Network as no of mobile users are incremented day by day. Mobile AdHoc Network (MANET) is infrastructure-less network i. e. It doesn't require any central (base) station; so it is applicable in various fields for communications such as rescue operations and in critical situations like battlefields. To secure such demanding network is itself a big challenge. Due to some unique characteristics of MANETs like lack of infrastructure and central authority; node mobility and change of dynamic topology; prevention methods alone are not sufficient to make them secure therefore; detection should be added as another defense line before the system could be penetrated. To secure network we have to detect the attacks and take appropriate action on it. This paper reviews the performances of various detection techniques used to detect the malicious/selfish node in the network.


Keywords: MANET, IDS, TWOACK, EAACK


Edition: Volume 3 Issue 5, May 2014


Pages: 358 - 363



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Navneet Dhillon, Dr Amardeep Singh, "Intrusion Detection Techniques in MANET: A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 358-363, https://www.ijsr.net/getabstract.php?paperid=20131809, DOI: https://www.doi.org/10.21275/20131809



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Book Chapter, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 836 - 846

A Comprehensive Introduction to SDN Architectural Foundations and Applications

Dr. Yogita Hande, Dr. Rupali Vairagade

Share this Article
Top