A Survey on Intrusion Detection System in Mobile Ad-Hoc Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 9
Abstract
Mobile Ad-hoc Network (MANET) is an Emerging Technology. MANET is a great strong point to be applied in dangerous situations like battlefields and commercial applications such as construction, traffic surveillance. Each device in a MANET is without free to move in any direction and its changes the connections to other devices frequently. Mobile Ad-hoc network is faces several challenges such as Energy, Routing, Security, Quality of services, Memory and etc... But the flexibility in such atmosphere has the challenged in risk of security. The main Intrusion Detection is one of the possible ways in recognizing possible attacks before the system could be penetrate. The encryption and authentication solution are consider as the first line of protection, are no longer enough to protect MANETs. This paper defines several MANET security threats and focuses on MANET intrusion detection methods.
Authors and Affiliations
T. Ramesh*1
ULTRA WIDEBAND PULSE GENERATION USING MUL TIPLE ACCESS MODULATION SCHEMES
An Ultra - wideband (UWB) employs very narrow pulses, of the order of a few nano - seconds, in order to provide high data rate communications .These narrow pulses spread the energy over a wide...
EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E - BANKING IN SUDAN
T[b]This study aimed to measure the application of security requirements for e - banking, according to a series of ISO 27000 standards in Sudanese banks. The study is based on a set of hypotheses; planning for the cr...
Improved Round Robin Algorithm for Data Center Selection in Cloud Computing
In cloud computing, the main factor to achieve a high user satisfaction and increased resource utilization ratio by ensuring an efficient and fair allocation of every computing resource is effective load balancing...
Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...
AN ALGORITHM FOR INVESTIGATING THE CLOSED CYCLE ORE GRINDING TECHNOLOGICAL SCHEME
The efficiency of the ore grinding technological process is mainly conditioned by implementation of separate operations ensuring it. The sequence of carrying out those operations is determined by the technological sch...