A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 0, Issue 0
Abstract
Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System in the context of MANETs. We investigate existing Intrusion Detection Architecture design Issues, challenges and proposed a novel architecture based on a conceptual model for an IDS agent that lead to a secure collaboration environment integrating mobile ad hoc network and the wired backbone. In wireless/mobile ad hoc network, the limited power, weak computation capabilities of mobile nodes, and restricted bandwidth of the open media impede the establishment of a secure collaborative environment.
Authors and Affiliations
Atul Patel, Ruchi Kansara, Dr. Paresh Virparia
Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking
Watermark is used to protect copyright and to authenticate images. In digital media, today’s world images are in electronic form available in the internet. For its protection and authentication invisible watermarking in...
Challenges of Future R&D in Mobile Communications
This paper provides a survey for the main challenges of future research and development (R&D) for next generation mobile networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigur...
LQR Robust Control for Active and Reactive Power Tracking of a DFIG based WECS
This research work sets forward a new formulation of Linear Quadratic Regulator problem (LQR) applied to a Wind Energy Conversion System (WECS). A new necessary and sufficient condition of Lyapunov asymptotic stability i...
SLA for E-Learning System Based on Cloud Computing
The Service Level Agreement (SLA) becomes an important issue especially over the Cloud Computing and online services that based on the ‘pay-as-you-use’ fashion. Establishing the Service level agreements (SLAs), which can...
Mitigating Address Spoofing Attacks in Hybrid SDN
Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator com...