Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach

Abstract

Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical  applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some good security solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in  the network.

Authors and Affiliations

Nisha Dang , Pooja Mittal

Keywords

Related Articles

ADAPTABILITY OF TOTAL QUALITY MANAGEMENT TO SERVICE SECTOR

This Research paper underlines the dominance of service quality and adaptability of TQM in the service sector. It explains that with the growing maturity of society with respect to education, culture and standards of liv...

EXPLORING NEWER TECHNOLOGIES IN DISTANCE LEARNING

Education plays significant role in shaping the life of an individual and building a knowledge society. Disseminating knowledge among masses is major concern for teachers and policy makers over the years. It is particula...

OPTIMISATION OF CHANNEL SHARING STRATEGIES IN HIERACHICAL CELLULAR SYSTEMS USING QUEUING

The primary goal of future cellular mobile communication networks is to provide efficient and cost effective services to mobile users under all environments. The major issues that affects the quality of service and perf...

Effect of Line-Width Variation in Radio over Fiber System Based On Optical Single Side Band for Short Haul Communication

Carrier to Noise Ratio (CNR) has been investigated for radio over fiber systems including the effects of variation in the RF oscillator linewidth in this paper. Optical Single sideband signal is studied as it has tolera...

Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete...

Download PDF file
  • EP ID EP125119
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Nisha Dang, Pooja Mittal (2012). Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(0), 36-42. https://europub.co.uk/articles/-A-125119