An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
The self-configuring ability of nodes in MANET absolutes it admired among essential mission applications like military use or emergency recovery. The mobility and scalability carried by wireless network ended it possible in many applications. Surrounded by all the contemporary wireless net- works Mobile Ad hoc NETwork (MANET) is one of the most significant and exclusive applications. In this paper a qualified learns of Secure Intrusion- Detection Systems for determining malicious nodes and attacks on MANETs are presented. Due to some special characteristics of MANETs prevention mechanisms alone are not sufficient to handle the secure networks. One of the main advantages of wireless networks is its capability to permit data communication between different parties and still maintain their mobility. However this message is incomplete to the range of transmitters. This means that two nodes cannot converse with each other when the distance between the two nodes is further than the communication range of their own. MANET solves this difficulty by allowing intermediate parties to transmit data transmissions. This is achieved by dividing MANET into two types of networks namely single-hop and multi hop. In a single-hop network all nodes within the same radio range communicate directly with each other.
Authors and Affiliations
S. Rajeswari| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu, Tadepalligudem, A.P, India, rajimca7@gmail.com, Dr. A. Ramamurthy| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu, Tadepalligudem, A.P, India, ram111_sai@yahoo.com, K. T. V Subbarao| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu, Tadepalligudem, A.P, India, ogidi@rediffmail.com
Implementation Of “Bloom Filter†Using Cam Based Structure
Content addressable memory (CAM) utilizing a novel algorithm for associativity between the inputtag and the relating location of the output data. The proposed design depends on an as of late created meager bunched ar...
Cfd Analysis To Predict Heat Transfer Performance Of Louver Fin Radiator With Water/Eg & Al2o3 Nano Fluid
In this paper study of heat transfer in louver fin radiator and nanofluids mixing with base fluid (water+EG) has enhanced. The fins of radiator setup were made with louvers by turbulence of air flowing over it and co...
Privacy and Classification Of Analyzed Data Using EMD
In recent years many researchers issued on data publishing with recommended settings .But privacy is a key issue here. Existing techniques such as K-anonymity and L-diversity should not provide effective and sufficie...
A New Revocable IBE Scheme in the Server Aided Setting
This work going for handling the basic issue of character repudiation, we bring outsourcing calculation into IBE surprisingly and propose a revocable IBE plot in the server-supported setting. Our plan offloads the va...
Iris recognition Using Fast Walsh Hadamard Transform Based feature Space
The significance of Iris detection and recognition in area of bioinformatics and pattern recognition has been increased from last few decades. Looking at the importance of Iris detection and recognition, we propose a...