International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015


Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan | Ashwini Meshram


Abstract: Mobile ad hoc networks (MANETs) have emerged as a tremendous wireless networking technology. MANETs are scalable and does not require a fixed architecture. nodes of the network plays the dual role as the transmitter and as the receiver. The self configuring ability has made MANETs useful in various applications such as military use and emergency recovery. Within the same communication range nodes communicate with each other directly. otherwise they rely on others for message passing. The open medium and the wide distribution of nodes made MANETs vulnerable to malicious attackers. As MANETs have limited resources so a technique should be applied that is efficient in finding intrusions and it should provide security simultaneously. Keeping in mind that network overhead and flooding of packets should not occur.


Keywords: MANET Intrusion Detection System, Digital Signature, Malicious nodes, Misbehavior report, Acknowledgement


Edition: Volume 4 Issue 1, January 2015,


Pages: 2631 - 2633


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mr. Naveed Zishan, Ashwini Meshram, "Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 2631-2633, https://www.ijsr.net/get_abstract.php?paper_id=SUB15853

Similar Articles with Keyword 'Digital Signature'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022

Pages: 962 - 966

Blockchain Based Certificate Validation

Srilatha Puli | Kandhi Vaman Reddy | Kankanala Vinay | Mughaisa Fatima

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article
Top