TITLE

Target Detection System (TDS) for Enhancing Security in Ad hoc Network

AUTHOR(S)
Kanyal, Hoshiyar Singh; Rahamatkar, S.; Sharma, B. K.; Sharma, Bhasker
PUB. DATE
September 2013
SOURCE
International Journal of Distributed & Parallel Systems;Sep2013, Vol. 4 Issue 5, p15
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc network form part of the network's routing infrastructure. The mobility of nodes in an ad-hoc network denotes that both the public and the topology of the network are extremely active. It is very difficult to design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more feasible. A safe and sound protocol should at least include mechanisms against known assault types. In addition, it should provide a system to easily add new security features in the future. Due to the significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET routing protocols. Intrusion detection techniques for cooperation of node in MANET have been chosen as the security parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in which Reputation concerning every node is measured and will be move to every node in network. Reputation is defined as Someone's donation to network operation. CONFIDANT [23], CORE [25], OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
ACCESSION #
91517749

 

Related Articles

  • Network Layer Attacks and Defense Mechanisms in MANETS- A Survey.  // International Journal of Computer Applications;Nov2010, Vol. 9, p12 

    The article presents a study which focuses on network layer attacks and security approaches in mobile ad hoc network (MANET) communication system. It says that MANET is a self-configuring network of mobile devices connected through wireless infrastructure. It mentions that malicious attacks in...

  • REVIEW ON VARIOUS SECURITY THREATS & SOLUTIONS AND NETWORK CODING BASED SECURITY APPROACH FOR VANET. Bhatia, Jitendra; Shah, Bhumit // International Journal of Advances in Engineering & Technology;Mar2013, Vol. 6 Issue 1, p361 

    Intelligent Transport Systems (ITS) are advanced applications which, without embodying intelligence as such, aim to provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and...

  • AODV Routing Protocol in MANET based on Cryptographic Authentication Method. Srinu Padma, Thandu Naga; Ramarao, Tandu; Simhadri, Nischala // International Journal of Computer Science Engineering & Technolo;Oct2012, Vol. 2 Issue 10, p1459 

    In mobile ad-hoc wireless network (MANET),secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In...

  • A Novel MAC Layer-based Reputation System for MANETs. Monisha J., Hannah; Uthariaraj V., Rhymend // International Journal of Computer Applications;Oct2013, Vol. 80, p13 

    MANET is a self-organizing system of mobile nodes that can be connected by wireless links on an ad hoc basis. In a MANET, the nodes are free to move randomly, causing the network's topology to change dynamically. Their high mobility and ad hoc nature poses greater security threats. Moreover,...

  • A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks.  // Journal of Networks;Aug2010, Vol. 5 Issue 8, p942 

    No abstract available.

  • Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. Kathirvel, Ayyaswamy; Srinivasan, Rengaramanujam // International Journal of Communication Networks & Information Se;Jun2010, Vol. 2 Issue 2, p77 

    A mobile ad hoc network is a self-created, self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and...

  • Performance Evolution of AODV under Various Routing Attack. Nath, Rajender; Sehgal, Pankaj Kumar // International Journal on Recent Trends in Engineering & Technolo;Nov2010, Vol. 4 Issue 2, p44 

    Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These characteristics tied with the growing concerns for security attacks. This paper provides simulation experiments that describe various routing attacks that are specific to...

  • An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV). Shaktawat, Rajdeep S.; Singh, Dharm; Choudhary, Naveen // International Journal of Computer Applications;Jul2014, Vol. 97, p34 

    A MANET is a collection of independent mobile nodes with self configuring, self administrating features. In MANET initial work for routing was done addressing the path formation between nodes. A network in which any node can join and leave the network, routing protocol addressed for only...

  • SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK. DUA, DEEPIKA; MISHRA, ATUL // International Journal on Applications of Graph Theory in Wireles;Sep2014, Vol. 6 Issue 3, p7 

    Mobile ad-hoc networks(MANET) is the collection of mobile nodes which are self organizing and are connected by wireless links where nodes which are not in the direct range communicate with each other relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics