http://www.ijrcct.org/index.php/ojs/article/download/170/137
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET presents serious vulnerabilities to security attacks. In this paper, I propose an intrusion detection scheme based on extended finite state machines. I provide formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. I chose the standard proactive routing protocol OLSR as a case study and show that my approach allows detecting several kinds of attacks as well as conformance anomalies.
Authors and Affiliations
Umesh Prasad Rout
Internet of things (IoT), Gives life to Non living
IoT alludes to the organized interconnection of regular items in practice, which are frequently furnished with pervasive knowledge [1]. IoT will expand the pervasiveness of the Internet by incorporating each item for...
To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)
Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized....
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...
Survey on Suspicious URL Detection Schemes in Twitter Stream
Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets whi...