A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 0, Issue 0
Abstract
Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System in the context of MANETs. We investigate existing Intrusion Detection Architecture design Issues, challenges and proposed a novel architecture based on a conceptual model for an IDS agent that lead to a secure collaboration environment integrating mobile ad hoc network and the wired backbone. In wireless/mobile ad hoc network, the limited power, weak computation capabilities of mobile nodes, and restricted bandwidth of the open media impede the establishment of a secure collaborative environment.
Authors and Affiliations
Atul Patel, Ruchi Kansara, Dr. Paresh Virparia
Design of Reversible Counter
This article presents a research work on the design and synthesis of sequential circuits and flip-flops that are available in digital arena; and describes a new synthesis design of reversible counter that is optimized in...
Improved Face Recognition with Multilevel BTC using Kekre’s LUV Color Space
The theme of the work presented in the paper is Multilevel Block Truncation Coding based Face Recognition using the Kekre’s LUV (K’LUV) color space. In [1], Multilevel Block Truncation Coding was applied on the RGB...
Block Wise Data Hiding with Auxilliary Matrix
This paper introduces a novel method based on auxiliary matrix to hide a text data in an RGB plane. To hide the data in RGB planes of image via scanning, encryption and decryption. To enhance the security, the scanning t...
A New E-Health Tool for Early Identification of Voice and Neurological Pathologies by Speech Processing
The objective of this study is to develop a non-invasive method of early identification and classification of voice pathologies and neurological diseases by speech processing. We will present a new automatic medical diag...
English-Arabic Hybrid Machine Translation System using EBMT and Translation Memory
The availability of a machine translation to translate from English-to-Arabic with high accuracy is not available because of the difficult morphology of the Arabic Language. A hybrid machine translation system between Ex...