Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some good security solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network.
Authors and Affiliations
Nisha Dang , Pooja Mittal
WOMEN IN FAMILY BUSINESS
The role of women in family businesses is explored in the paper. Although recognized as generally very important players, the role of women is often defined as invisible in business decision-making, supportive in men’s t...
SWOT Analysis of Foreign Direct Investment on Indian Retail Industry
The requirement of space is one of the biggest demands, so the real estate has also grown over the last years. In the years to come Indian economy will also see the real estate sector climbing the steps of organized reta...
Securing Route Discovery in MANETs: Analysis and Improvement
In this paper, we show that the security proof for the route discovery algorithm end air A is flawed, and moreover, this algorithm is vulnerable to a hidden channel attack. We also analyze the security framework that was...
Strengthening the Role of Women in Indian society by Women Empowerment
Women constitute around half of the total world population so as in India also. They are therefore regarded as the better half of the society. In the past, there was a great distinction between men and women. Women were...