Secure Intrusion Detection System for Mobile Adhoc Networks

被引:0
|
作者
Bharati, Taran Singh [1 ]
Kumar, R. [1 ]
机构
[1] Jamia Millia Islamia, Dept Comp Sci, New Delhi, India
关键词
Adhoc Network; Attacks; Intrusion Detection Systems; Security; ACCESS-CONTROL; AUTHENTICATION; FRAMEWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These are the networks which are formed by Mobile hand held devices like cell phones, laptops etc. Nodes in these networks are mobile in nature. Mobile adhoc networks are very useful in the situations such as military operations, disaster management etc. These networks do not require special additional fixed infrastructure but with the existing infrastructure all mobile nodes can cooperate and reach on some consensus about the intrusion into the systems. Since data moves in open wireless environment, nodes are frequently joining and going away and they are used in very crucial situations, so there security is of major concerns.
引用
收藏
页码:1257 / 1261
页数:5
相关论文
共 50 条
  • [21] Intrusion detection and prevention system using secure mobile agents
    Shibli, Muhammad Awais
    Muftic, Sead
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 107 - +
  • [22] AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK USING RSA AND BLOCK BASED ALGORITHM
    Venkatesan, S.
    Ramakrishnan, M.
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 949 - 956
  • [23] Triple referee incentive mechanism for secure mobile adhoc networks
    Vedhavathy, T. R.
    Manikandan, M. S. K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 255 - 264
  • [24] Triple referee incentive mechanism for secure mobile adhoc networks
    T. R. Vedhavathy
    M. S. K. Manikandan
    Cluster Computing, 2019, 22 : 255 - 264
  • [25] SECURE ZONE BASED ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
    Devi, B. A. S. Roopa
    Murthy, J. V. R.
    Narasimha, G.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 839 - 846
  • [26] A hybrid CNN-GRU-based intrusion detection system for secure communication in vehicular adhoc network
    Kothai, G.
    Poovammal, E.
    INFORMATION SECURITY JOURNAL, 2025, 34 (02): : 115 - 125
  • [27] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    Zou Futai
    Jiang Xinghao
    Li Jianhua
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2007, 18 (04) : 785 - 794
  • [28] A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
    Shrestha, Rakesh
    Sung, Jong-Yeop
    Lee, Sang-Duck
    Sik-Yun, Pyung
    Choi, Dong-You
    Han, Seung-Jo
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 759 - 762
  • [29] Cooperative Network Intrusion Detection System (CNIDS) in Mobile Adhoc Network based on DSR Protocol
    Adhikari, Sougato
    Setua, S. K.
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 929 - 935
  • [30] Multi-agent cooperative intrusion response in mobile adhoc networks
    Yi Ping
    State Key Lab. of Information Security
    JournalofSystemsEngineeringandElectronics, 2007, (04) : 785 - 794