International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


Intrusion Detection Techniques in MANET: A Review

Navneet Dhillon | Dr Amardeep Singh


Abstract: In today's world; wireless communication has rapid enhancement as demand for wireless network goes on increasing. It is one of the most popular and growing network i. e. Mobile AdHoc Network as no of mobile users are incremented day by day. Mobile AdHoc Network (MANET) is infrastructure-less network i. e. It doesn't require any central (base) station; so it is applicable in various fields for communications such as rescue operations and in critical situations like battlefields. To secure such demanding network is itself a big challenge. Due to some unique characteristics of MANETs like lack of infrastructure and central authority; node mobility and change of dynamic topology; prevention methods alone are not sufficient to make them secure therefore; detection should be added as another defense line before the system could be penetrated. To secure network we have to detect the attacks and take appropriate action on it. This paper reviews the performances of various detection techniques used to detect the malicious/selfish node in the network.


Keywords: MANET, IDS, TWOACK, EAACK


Edition: Volume 3 Issue 5, May 2014,


Pages: 358 - 363


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Navneet Dhillon, Dr Amardeep Singh, "Intrusion Detection Techniques in MANET: A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 358-363, https://www.ijsr.net/get_abstract.php?paper_id=20131809

Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top