Downloads: 122 | Views: 286
Research Paper | Computer Science & Engineering | India | Volume 7 Issue 3, March 2018 | Popularity: 6.7 / 10
Intrusion Detection and Response System in AODV for Mobile Adhoc Network
Manpreet Kaur, Manoj Kumar
Abstract: Mobile Adhoc network is dynamic topology network in which all nodes can cooperate with each other for data transmission. But some nodes are not cooperative they drops some data packet which is called gray hole attacks. In the past, various techniques are used for detecting these attacks. In the proposed approach we use a gray hole intrusion detection system (G-IDS) for detecting gray hole attack. The G-IDS node monitors the traffic in network and it checks the activity of each node in the network. When it detects that at any node the difference of packet forward and packet receive is greater than threshold value then it sends the alert notification to all nodes about this malicious node. Then all nodes block this malicious node from the network. The proposed approach is compared with the existing approach on the performance parameters. The result in packet delivery ratio, packet loss rate and average throughput prove that this technique is better than other existing techniques.
Keywords: MANET, Gray hole attack, Gray hole intrusion detection system
Edition: Volume 7 Issue 3, March 2018
Pages: 1016 - 1018
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 720
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 701
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 689
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera