Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks
Mr. Naveed Zishan, Ashwini Meshram
Mobile ad hoc networks (MANETs) have emerged as a tremendous wireless networking technology. MANETs are scalable and does not require a fixed architecture.nodes of the network plays the dual role as the transmitter and as the receiver. The self configuring ability has made MANETs useful in various applications such as military use and emergency recovery. Within the same communication range nodes communicate with each other directly.otherwise they rely on others for message passing. The open medium and the wide distribution of nodes made MANETs vulnerable to malicious attackers. As MANETs have limited resources so a technique should be applied that is efficient in finding intrusions and it should provide security simultaneously. Keeping in mind that network overhead and flooding of packets should not occur.
Keywords: MANET Intrusion Detection System, Digital Signature, Malicious nodes, Misbehavior report, Acknowledgement
Edition: Volume 4 Issue 1, January 2015
Pages: 2631 - 2633
How to Cite this Article?
Mr. Naveed Zishan, Ashwini Meshram, "Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15853, Volume 4 Issue 1, January 2015, 2631 - 2633
103 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'Digital Signature'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1936 - 1939Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way
D. Hemalatha, R. Arunudaya
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1140 - 1143Intrusion-Detection System for MANETs
S. Srihari Reddy, S. Z. Parveen
Similar Articles with Keyword 'Malicious nodes'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1292 - 1295To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection
Sanghavi Parkhi, Hemlata Dakhore
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1148 - 1153ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Similar Articles with Keyword 'Acknowledgement'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2550 - 2556Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme
Anil Rathod, Sherly Noel
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3225 - 3227NCPR: Plummeting Direction-Finding Overhead In MANETs
S. R. Pawar, P. A. Jadhav
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2105 - 2111EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks
H. Syed Siddiq, M. Hymavathi