International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 272

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10


     

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram


Abstract: Mobile ad hoc networks (MANETs) have emerged as a tremendous wireless networking technology. MANETs are scalable and does not require a fixed architecture. nodes of the network plays the dual role as the transmitter and as the receiver. The self configuring ability has made MANETs useful in various applications such as military use and emergency recovery. Within the same communication range nodes communicate with each other directly. otherwise they rely on others for message passing. The open medium and the wide distribution of nodes made MANETs vulnerable to malicious attackers. As MANETs have limited resources so a technique should be applied that is efficient in finding intrusions and it should provide security simultaneously. Keeping in mind that network overhead and flooding of packets should not occur.


Keywords: MANET Intrusion Detection System, Digital Signature, Malicious nodes, Misbehavior report, Acknowledgement


Edition: Volume 4 Issue 1, January 2015


Pages: 2631 - 2633



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mr. Naveed Zishan, Ashwini Meshram, "Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 2631-2633, https://www.ijsr.net/getabstract.php?paperid=SUB15853, DOI: https://www.doi.org/10.21275/SUB15853



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022

Pages: 962 - 966

Blockchain Based Certificate Validation

Srilatha Puli, Kandhi Vaman Reddy, Kankanala Vinay, Mughaisa Fatima

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3225 - 3227

NCPR: Plummeting Direction-Finding Overhead In MANETs

S. R. Pawar, P. A. Jadhav

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article
Top