http://www.ijrcct.org/index.php/ojs/article/download/170/137
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET presents serious vulnerabilities to security attacks. In this paper, I propose an intrusion detection scheme based on extended finite state machines. I provide formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. I chose the standard proactive routing protocol OLSR as a case study and show that my approach allows detecting several kinds of attacks as well as conformance anomalies.
Authors and Affiliations
Umesh Prasad Rout
A secure indexing method for privacy- preserving keyword search
E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once...
Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploi...
High Efficiency and Less Pollutant Power PlantsUsing Biomass Mixed with Municipal Solid Waste and coal Dust
This paper deals with the new component of fuel which is used to generate the power with higher efficiency and lesser pollutants. The new component is the mixture of biomass (husk) and MSW and coal dust in the ratio o...
Issues and Dependencies on Affect Data Models For Assessment of Disorders- A Survey
Analysis of free-form data has always been a challenge. In that, data depicting affects in hidden form and/or in various modes complicates the task of mining to identify and analyze relevant affects from the input. A...
Live Activity Index To Gather Effective Live Traffic Broadcasting To Users
A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...