Open Access   Article Go Back

A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

S. Sathiyavani1

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 71-75, Mar-2018

Online published on Mar 31, 2018

Copyright © S. Sathiyavani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sathiyavani , “A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.71-75, 2018.

MLA Style Citation: S. Sathiyavani "A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 06.02 (2018): 71-75.

APA Style Citation: S. Sathiyavani , (2018). A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 06(02), 71-75.

BibTex Style Citation:
@article{Sathiyavani_2018,
author = {S. Sathiyavani },
title = {A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {71-75},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=208},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=208
TI - A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sathiyavani
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 71-75
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Mobile Ad hoc Networks (MANET) are self configuring, transportation less, dynamic wireless networks in which the nodes are resource constrained. Intrusion Detection Systems (IDS) are used in MANETs to monitor actions so as to detect any intrusion in the otherwise vulnerable network. In this paper, we present efficient schemes for analyzing and optimizing the time length for which the intrusion detection systems require to remain active in a mobile ad hoc network. A probabilistic model is proposed that makes use of help between IDSs among neighbourhood nodes to reduce their unit active time. Usually, an IDS has to run all the time on every join to oversee the network behaviour.

Key-Words / Index Term

References

[1] S. Zeadally, R. Hunt, Y-S. Chen, A. Irwin and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217-241, 2012.
[2] S. K. Bhoi and P. M. Khilar, ”Vehicular communication: a survey”, IET Networks, vol. 3, no. 3, pp. 204 - 217, 2014.
[3] S. Marti, T. J. Giuli, K. La and M. Baker, ”Mitigating Routing Misbehavior in a Mobile Ad-hoc Environment,” Proc. 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255- 265, August 2000.
[4] C. Manikopoulos and L. Ling, ”Architecture of the Mobile Ad-hoc Network Security (MANS) System,” Proc. IEEE International Conference on Systems, Man and Cybernetics, vol. 4, pp. 3122- 3127, October 2003.
[5] K. Nadkarni and A. Mishra, ”Intrusion Detection in MANETs - The Second Wall of Defense,” Proc. IEEE Industrial Electronics Society Conference ’2003, pp. 1235-1239, Roanoke, Virginia, USA, Nov. 2-6, 2003.
[6] A. Partwardan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, ”Secure Routing and Intrusion Detection in Ad-hoc Networks,” Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, Hawaii Island, Hawaii, March 8-12, 2005.
[7] N. Marchang and R. Datta, ”Lightweight Trust-based Routing Protocol for Mobile Ad Hoc Networks,” IET Information Security, vol. 6, no. 4, pp. 77-83, 2012.
[8] M. Hadded, R. Zagrouba, A. Laouiti, P. Muhlethaler, and L. A. Saidane, “A multi-objective genetic algorithm-based adaptive weighted clustering protocol in vanet,” in Evolutionary Computation (CEC), 2015 IEEE Congress on, 2015, pp. 994–1002.
[9] Y. Peng, Z. Abichar, and J. M. Chang, “Roadside-aided routing (RAR) in vehicular networks,” in IEEE International Conference on Communications, 2006, pp. 3602–3607.
[10] N. Wisitpongphan, O. K. Tonguz, J. S. Parikh, P. Mudalige, F. Bai, and V. Sadekar, “Broadcast storm mitigation techniques in vehicular ad hoc networks,” IEEE Wireless Communications, vol. 14, no. 6, pp. 84–94, 2007.
[11] I. Tal and G.-M. Muntean, “User-oriented cluster-based solution for multimedia content delivery over vanets,” in IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2012, pp. 1–5.
[12] Y. Shi, L. H. Zou, and S. Z. Chen, “A mobility pattern aware clustering mechanism for mobile vehicular networks,” in Applied Mechanics and Materials, vol. 130, 2012, pp. 317–320.
[13] C. S. Jensen, D. Lin, and B. C. Ooi, “Continuous Clustering of Moving Objects,” IEEE Transactions on Knowledge & Data Engineering, vol. 19, no. 9, pp. 1161–1174, 2007.
[14] J. Bernsen and D. Manivannan, “Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification,” Pervasive and Mobile Computing, vol. 5, no. 1, pp. 1–18, 2009.
[15] K. Jagadeesh, S. S. Sathya, G. B. Laxmi, and B. B. Ramesh, “A survey on routing protocols and its issues in vanet,” International Journal of Computer Applications, vol. 28, no. 4, pp. 38–44, 2011.
[16] S. Singh and S. Agrawal, “Vanet routing protocols: Issues and challenges,” in Engineering and Computational Sciences (RAECS), 2014 Recent Advances in, 2014, pp. 1–5.