International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 260

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.6 / 10


     

Intrusion Secure Algorithm for AODV

Ekta, Nasib Singh Gill


Abstract: A mobile Adhoc network (MANET) is distinguished by their mobile nodes, multihop wireless connectivity, absence of infrastructure, communicating environment and its dynamic topology. In Ad hoc network routing is reactive on-demand philosophy where the routes are established only when required. Whereas stable routing, security and power efficiency are considered the major issues in this field. As far as the Adhoc environment is concerned, the network is accessible to both the legitimate and malicious nodes. Many security models have been proposed to detect these malicious nodes. The proposed approach named malicious node detection IDS is intended to incorporate security aspect on existing protocols. This paper checks the attacks occurring in MANETS and tries to detect those attacks by understanding the situation in case of attack. Scheme has been incorporated on AODV and results have been calculated using NS2.


Keywords: Adhoc networks, AODV, IDS, Performance Evaluation


Edition: Volume 3 Issue 7, July 2014


Pages: 707 - 711



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ekta, Nasib Singh Gill, "Intrusion Secure Algorithm for AODV", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 707-711, https://www.ijsr.net/getabstract.php?paperid=20141148, DOI: https://www.doi.org/10.21275/20141148



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, Singapore, Volume 13 Issue 5, May 2024

Pages: 711 - 722

General Multi-Objective Performance Expression for Population-Based Search and Optimization

Eik Fun Khor

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 851 - 855

Chaos Testing: A Proactive Framework for System Resilience in Distributed Architectures

Chandra Shekhar Pareek

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article



Top