A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System

被引:0
作者
Tamilarasan, S. [1 ]
Aramudan [2 ]
机构
[1] LITAM, Dept Informat Technol, Sattenpalli, AP, India
[2] PKIET, Dept Informat Technol, Karaikal, Tamilnadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 05期
关键词
Mobile Ad hoc Network (MANET); misbehaving node; encryption; authentication; Intrusion Detection System (IDS); decentralized property;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a logical survey on to detect the misbehaving node in Mobile Ad hoc Network (MANET) using Intrusion Detection System (IDS). Mobile ad hoc networks have a different characteristic from wired networks and even from standard wireless networks. A mobile ad hoc network is an infrastructure less network, which is self-configuring mobile nodes connected by wireless links. There are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Most of proposed MANET protocols do not address security issues. Furthermore, Mobile Ad hoc Networks (MANETs) are highly vulnerable for passive and active attacks. The Intrusion Detection is one of the possible ways in recognizing a possible attacks before the system could be penetrated. The encryption and authentication solution, which are considered as the first line of defense, are no longer sufficient to protect MANETs. Therefore, Intrusion Detection Systems (IDSs) is needed to be the second line of defense to protect the network from security problem.
引用
收藏
页码:258 / 264
页数:7
相关论文
共 33 条
[1]  
[Anonymous], 2000, P 6 ANN INT C MOB CO
[2]  
Bansal S., OBSERVATION BASED CO
[3]   Self-organization in mobile ad hoc networks:: The approach of terminodes [J].
Blazevic, L ;
Buttyán, L ;
Capkun, S ;
Giordano, S ;
Hubaux, JP ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (06) :166-174
[4]   Challenges in intrusion detection for wireless ad-hoc networks [J].
Brutch, P ;
Ko, C .
2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, :368-373
[5]  
BUCHEGGER S, 2002, P MOBIHOC JUN
[6]  
BUTTYAN L, 2000, P MOBIHOC AUG
[7]  
BUTTYAN L., 2003, MONET 5, V5, P8
[8]  
Hasswa A, 2005, WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, P336
[9]  
He Q., P IEEE WCN2004 MAR 0
[10]  
Hu YC, 2003, IEEE INFOCOM SER, P1976