International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 263

Survey Paper | Computer Science & Engineering | Tanzania | Volume 3 Issue 10, October 2014 | Popularity: 6.2 / 10


     

A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks

Thangaraj E, Arockia Jayadhas S


Abstract: This paper suggesting a sheltered protocol for spontaneous wireless ad hoc networks which uses public and private key that has trust in users in order to exchange the initial data and to exchange the data storage, manipulation, presentation, communication and other capabilities by encrypt such network services. While a sequence of operations that ensure protection of data used with a sheltered protocol, it provides secure delivery of message between network users and monitors the activities by using IDS. Most of the protocol takes network creation, management and protocol messages for building a network with spontaneous, so that it meets the requirement in a physical space in order to make use of services such as communication in group and security. The members who make up this community may vary at any specific time (users may join or leave at will), also offering self-configured sheltered protocol that is able to create the network and share networks secure services.


Keywords: DNS, IDC, IDS, NIDS


Edition: Volume 3 Issue 10, October 2014


Pages: 747 - 751



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Thangaraj E, Arockia Jayadhas S, "A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 747-751, https://www.ijsr.net/getabstract.php?paperid=OCT1498, DOI: https://www.doi.org/10.21275/OCT1498



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 7, July 2024

Pages: 331 - 336

Review: Blockchain and Cryptocurrency: The Future of Digital Transactions

Raghu Raja Mehra, Chaitanya Khosla

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 851 - 855

Chaos Testing: A Proactive Framework for System Resilience in Distributed Architectures

Chandra Shekhar Pareek

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Book Chapter, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 836 - 846

A Comprehensive Introduction to SDN Architectural Foundations and Applications

Dr. Yogita Hande, Dr. Rupali Vairagade

Share this Article



Top