Open Access   Article Go Back

A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks

T.Ravichandran 1 , G.lalithadevi 2 , M.Sughasini 3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 406-411, Mar-2018

Online published on Mar 31, 2018

Copyright © T.Ravichandran, G.lalithadevi, M.Sughasini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T.Ravichandran, G.lalithadevi, M.Sughasini, “A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.406-411, 2018.

MLA Style Citation: T.Ravichandran, G.lalithadevi, M.Sughasini "A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 06.02 (2018): 406-411.

APA Style Citation: T.Ravichandran, G.lalithadevi, M.Sughasini, (2018). A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 06(02), 406-411.

BibTex Style Citation:
@article{_2018,
author = {T.Ravichandran, G.lalithadevi, M.Sughasini},
title = {A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {406-411},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=276},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=276
TI - A Novel Approach for Efficient Usage of Intrusion Detection System In Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - T.Ravichandran, G.lalithadevi, M.Sughasini
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 406-411
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Due to the lack process of wireless links, it is hard to decide if small package losses are due to wireless induced belongings or from spiteful discarding. Many prior pains on detecting malicious packet drops rely on proof collected via passive monitoring by neighbor nodes; however, they do not examine the cause of packet losses. In this paper, we ask: Given certain macroscopic parameters of the system similar to traffic strength and node mass what is the probability that data exists with admiration to a broadcast and, How can these parameters be used to do a forensic analysis of the cause for the losses. Towards answering the above questions, primary build an logical framework that computes the probability that evidence call this transmission evidence or TE for short exists with high opinion to transmissions, in terms of a set of system parameters. Here, validate our logical framework via both simulations as well as real-world experiments on two dissimilar wireless test beds. The analytical structure is then used as a basis for a procedure within a forensic analyzer to assess the cause of pack losses and decide the likelihood of forwarding misbehaviors.

Key-Words / Index Term

MANET Networks

References

[1] S. Zeadally , R. Hunt, Y-S. Chen, A. Irwin and A. Hassan, ”Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217-241, 2012.
[2] S. K. Bhoi and P. M. Khilar, ”Vehicular communication: a survey”, IET Networks, vol. 3, no. 3, pp. 204 - 217, 2014.
[3] S. Marti, T. J. Giuli, K. La and M. Baker, ”Mitigating Routing Misbehavior in a Mobile Ad-hoc Environment,” Proc. 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255- 265, August 2000.
[4] C. Manikopoulos and L. Ling, ”Architecture of the Mobile Ad-hoc Network Security (MANS) System,” Proc. IEEE International Conference on Systems, Man and Cybernetics, vol. 4, pp. 3122- 3127, October 2003.
[5] K. Nadkarni and A. Mishra, ”Intrusion Detection in MANETs - The Second Wall of Defense,” Proc. IEEE Industrial Electronics Society Conference ’2003, pp. 1235-1239, Roanoke, Virginia, USA, Nov. 2-6, 2003.
[6] A. Partwardan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, ”Secure Routing and Intrusion Detection in Ad-hoc Networks,” Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, Hawaii Island, Hawaii, March 8-12, 2005.
[7] N. Marchang and R. Datta, ”Lightweight Trust-based Routing Protocol for Mobile Ad Hoc Networks,” IET Information Security, vol. 6, no. 4, pp. 77-83, 2012.
[8] N. Marchang and R. Datta, ”Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 4, pp. 508-523, June 2008.
[9] D. Dong, X. Liao, Y. Liu, C. Shen and X. Wang, ”Edge Self-Monitoring for Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems,” vol. 22, no. 3, March 2011, pp. 514-527.
[10] I. Khalil, S. Bagchi and N. B. Shroff, ”SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks,” Proc. 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007 (DSN 2007), 565-574.