http://www.ijrcct.org/index.php/ojs/article/download/170/137

Abstract

Mobile ad hoc networks offer excellent perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET presents serious vulnerabilities to security attacks. In this paper, I propose an intrusion detection scheme based on extended finite state machines. I provide formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. I chose the standard proactive routing protocol OLSR as a case study and show that my approach allows detecting several kinds of attacks as well as conformance anomalies.

Authors and Affiliations

Umesh Prasad Rout

Keywords

Related Articles

A secure indexing method for privacy- preserving keyword search

E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once...

Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure

In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploi...

High Efficiency and Less Pollutant Power PlantsUsing Biomass Mixed with Municipal Solid Waste and coal Dust

This paper deals with the new component of fuel which is used to generate the power with higher efficiency and lesser pollutants. The new component is the mixture of biomass (husk) and MSW and coal dust in the ratio o...

Issues and Dependencies on Affect Data Models For Assessment of Disorders- A Survey

Analysis of free-form data has always been a challenge. In that, data depicting affects in hidden form and/or in various modes complicates the task of mining to identify and analyze relevant affects from the input. A...

Live Activity Index To Gather Effective Live Traffic Broadcasting To Users

A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...

Download PDF file
  • EP ID EP27539
  • DOI -
  • Views 342
  • Downloads 6

How To Cite

Umesh Prasad Rout (2013). http://www.ijrcct.org/index.php/ojs/article/download/170/137. International Journal of Research in Computer and Communication Technology, 2(2), -. https://europub.co.uk/articles/-A-27539