International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 316 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.6 / 10


     

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen


Abstract: The migration to wireless network from wired net- work has been a world trend within the past few decades. The quality and measurability brought by wireless network created it attainable in several applications. Among all the up to date wireless net- works, Mobile Adhoc Network (MANET) is one in every of the foremost necessary and distinctive applications On the contrary to ancient specification, Manet doesn't want a tough and quick network infrastructure; every single node works as every a transmitter and a receiver. Nodes communicate with them when they\'re every within identical communication vary. Otherwise, they deem their neighbors to relay messages. The self-configuring ability of nodes created it for applications like military use or emergency recovery. However, the open medium and wide distribution of nodes build Manet easy to malicious attackers. during this case, it\'s crucial to develop economical intrusion-detection mechanisms to shield Manet from attacks. during this paper, we have a tendency to propose and implement a replacement intrusion-detection system named increased reconciling ACKnow ? ledgment (EAACK) specially designed for MANETs.


Keywords: Digital signature, digital signature algorithm DSA, Enhanced Adaptive ACK -nowledgment AACK EAACK, Mobile Ad hoc NETwork MANET


Edition: Volume 3 Issue 7, July 2014


Pages: 1140 - 1143



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
S. Srihari Reddy, S. Z. Parveen, "Intrusion-Detection System for MANETs", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1140-1143, https://www.ijsr.net/getabstract.php?paperid=20141155, DOI: https://www.doi.org/10.21275/20141155



Similar Articles

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK - To Overcome from Intruders Attacks in Manet's by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article

Downloads: 113

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

Downloads: 123

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1720 - 1725

Performance Improvement in Adaptive Routing Strategy in Mobile Adhoc Network

Samina Anjum, Sapna Khapre

Share this Article

Downloads: 136

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 133 - 135

Data Consistency for Cooperative Caching in Mobile Environments

P. Nithiyalakshmi, V. Udhaya Kumar

Share this Article



Top