INTRUSION DETECTION SYSTEM TO DETECT MALICIOUS MISBEHAVIOUR NODES IN MANET

被引:0
|
作者
Vijay, M. [1 ]
Sujatha, R. [1 ]
机构
[1] M Kumarasamy Coll Engg Karur, Karur, Tamil Nadu, India
关键词
Enhanced Adaptive ACKnowledgment (EAACK); Digital Signature; Digital Signature Algorithm (DSA); Mobile Ad hoc NETwork (MANET); Ad-hoc On demand Distance Vector (AODV); Advanced Encryption Standard (AES); Routing Overhead (RO);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Computing is a technology that allows users with portable computers still have network connections while they move. In Mobile computing, mobility and scalability should be possible in many applications. Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. In MANET infrastructure does not need a fixed network. Every node act as a transmitter and receiver. Communication occurs within their same communication range only, and communicate directly each other. Otherwise, they should relay on their neighbors to send relay messages. In open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new instruction-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. In existing system RSA and Digital Signature are used. In this paper to reduce the network overhead caused by digital signature by using AES public key cryptography system and AODV routing protocol. To develop efficient instruction-detection mechanisms, protect MANET from attacks. It detects malicious misbehavior nodes more efficiently.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Singh, Opinder
    Singh, Jatinder
    Singh, Ravinder
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 51 - 63
  • [2] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Opinder Singh
    Jatinder Singh
    Ravinder Singh
    Cluster Computing, 2018, 21 : 51 - 63
  • [3] Trust Based Malicious Nodes Detection in MANET
    Gong, Wei
    You, Zhiyang
    Chen, Danning
    Zhao, Xibin
    Gu, Ming
    Lam, Kwok-Yan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 205 - +
  • [4] Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks
    Singh, Rupinder
    Singh, Jatinder
    Singh, Ravinder
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017, : 1 - 14
  • [5] Intrusion Detection System for MANET
    Zalte, S. S.
    Ghorpade, V. R.
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [6] A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET
    Dhanalakshmi, S.
    Rajaram, M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 184 - 190
  • [7] Trust Based Certificate Authority for Detection of Malicious Nodes in MANET
    Manoj, V.
    Raghavendiran, N.
    Aaqib, M.
    Vijayan, R.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 392 - 401
  • [8] A Multipath Reliable Routing for Detection and Isolation of Malicious Nodes in MANET
    Somasundaram, Dhanalakshmi
    Marimuthu, Rajaram
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 176 - +
  • [9] An Approach for Determining Conditions for Monitoring of Critical Nodes for MANET Intrusion Detection System
    Mhala, Nitiket N.
    Choudhari, N. K.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2011, 4 (01): : 55 - 59
  • [10] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419