Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some good security solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network.
Authors and Affiliations
Nisha Dang , Pooja Mittal
ADAPTABILITY OF TOTAL QUALITY MANAGEMENT TO SERVICE SECTOR
This Research paper underlines the dominance of service quality and adaptability of TQM in the service sector. It explains that with the growing maturity of society with respect to education, culture and standards of liv...
EXPLORING NEWER TECHNOLOGIES IN DISTANCE LEARNING
Education plays significant role in shaping the life of an individual and building a knowledge society. Disseminating knowledge among masses is major concern for teachers and policy makers over the years. It is particula...
OPTIMISATION OF CHANNEL SHARING STRATEGIES IN HIERACHICAL CELLULAR SYSTEMS USING QUEUING
The primary goal of future cellular mobile communication networks is to provide efficient and cost effective services to mobile users under all environments. The major issues that affects the quality of service and perf...
Effect of Line-Width Variation in Radio over Fiber System Based On Optical Single Side Band for Short Haul Communication
Carrier to Noise Ratio (CNR) has been investigated for radio over fiber systems including the effects of variation in the RF oscillator linewidth in this paper. Optical Single sideband signal is studied as it has tolera...
Implementation of IMAGE STEGANOGRAPHY Based on Random LSB
Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete...