Enhancing Security with Intrusion Detection Methods in Multihop MANETs

نویسندگان

  • G. M. Rajasekar
  • Mr. T. Parameswaran
چکیده

1G.M. Rajasekar , 2Mr.T.Parameswaran 1&2 Dept. of CSE, Anna University Regional Centre, Coimbatore, India. 1. [email protected] 2. [email protected] Abstract— MANET plays a major role in next generation wireless networking technology. Information exchange in a mobile network without any infrastructure support, such networks are called Adhoc networks. This plays a major platform and used in important applications. A Mobile Adhoc Network is a mobile multihop wireless network, which is capable of autonomous operation. Because of the open medium and wide distribution of nodes make MANET harm to malicious attackers. It is crucial to develop efficient intrusion detection mechanisms to protect MANET from attacks. We present a various types of attacks in the network layer and Intrusion Detection mechanisms are used for protecting multihop MANET. To overcome the attacks, enhancing security method called Hybrid Cryptography and a comparison of various types of attacks with different IDs mechanisms is made. We classify, a single type of attack can be achieved by point detection algorithm (PDA) and range of attacks can be achieved by intrusion detection systems (IDs). Our survey is based on various types of attacks on multihop MANET and investigation of problems caused through malicious nodes by various types of Active and Passive group.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Security Issues and Its Challenges for Host Based Mobile Ad Hoc Networks to Protect Intrusion

Providing security to mobile ad hoc network is itself a great challenge for the researcher. Since mobile ad hoc network is highly vulnerable to face different attacks due to its self organizing behavior, infrastructure less architecture and multihop network characteristics. The strength of ad hoc network infrastructure (due to wireless and distributed nature of MANETs) also becomes the point of...

متن کامل

Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches

In the last few years, the performances of wireless technologies have increased tremendously thus opening new fields of application in the domain of networking. One of such fields concerns mobile ad hoc networks (MANETs) in which mobile nodes organise themselves in a network without the help of any predefined infrastructure. Securing MANETs is just as important, if not more, as securing traditi...

متن کامل

A Survey on Intrusion Detection in Mobile Ad Hoc Networks

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an att...

متن کامل

Analysis of Fuzzy Logic Based Intrusion Detection Systems in Mobile Ad Hoc Networks

Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015