To see the other types of publications on this topic, follow the link: Types of MANET and IDS.

Journal articles on the topic 'Types of MANET and IDS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Types of MANET and IDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly.This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researches achievement on MANET are presented inclusively in this paper, and then the comparison among several researches achievement is evaluated based on these parameter.
APA, Harvard, Vancouver, ISO, and other styles
2

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researches achievement on MANET are presented inclusively in this paper, and then the comparison among several researches achievement is evaluated based on these parameter.
APA, Harvard, Vancouver, ISO, and other styles
3

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Full text
Abstract:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to choose the leader nodes or cluster head dynamically depending on store capacity and power support, we have described the design and testing of dynamic cluster-based intrusion detection systems (IDS) in this technical research study. Another maximum forward capacity leader node is chosen based on the aforementioned resource limits in the event that a specific organizer node abruptly leaves the transmission range. Compared to other networks, MANET is more susceptible to attacks, and different types of attacks are limited to the network's functionality. MARS4, a hybrid cryptographic technique that combines the RSA and MAJE4 algorithms, is used to securely transmit data over the MANET using the Dynamic Source Routing (DSR) routing protocol. The proposed system is implemented and analyzed using Network Simulator (NS2). In addition to offering secure transmission, our suggested hybrid cryptography lowers routing overhead, increases packet delivery ratio and throughput, and efficiently uses bandwidth.</em>
APA, Harvard, Vancouver, ISO, and other styles
4

Dixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.

Full text
Abstract:
<em>Abstract- </em>Mobile Ad-hoc network (MANET) is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. Due to problems like wireless radio, limited battery power, limited bandwidth and dynamic topology environment, nodes are susceptible for intrusion and attack. Security is an important field in this type of network. Each node in a MANET is capable of acting as a router. Routing and routing protocols are important aspects having various security concerns. The bio-inspired approach known as Particle Swarm Optimization (PSO) based on Swarm Intelligence (SI) is suggested for finding solution against attacks in the network. In this paper a survey of different types of attacks are presented and intrusion detection (ID) mechanisms based on PSO is discussed. &nbsp; <em>Keywords- Mobile Ad-Hoc Network (MANET), Intrusion Detection Systems (IDS), Swarm intelligence (SI), Particle Swarm optimization (PSO)</em>
APA, Harvard, Vancouver, ISO, and other styles
5

Javidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.

Full text
Abstract:
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and intrusion tolerance phase. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theory approaches to address the network security issues. This paper reviews some existing game theory solutions which are designed to enhance network security in the intrusion detection phase. Keywords: Mobile Ad hoc Network (MANET), Intrusion detection system (IDS), Cluster head, host based, Game theory.
APA, Harvard, Vancouver, ISO, and other styles
6

Einy, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.

Full text
Abstract:
Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks has led to many challenges, one of the most important of which is network security. In this regard, a lack of regulatory and security infrastructure in MANETs has caused some problems in sending and receiving data, where intrusion in the network has been recognized as one of the most important issues. In MANETs, wireless notes act as a link between the source and destination nodes and play the role of relays and routers in the network. Therefore, malicious node penetration and the destruction of information packages become feasible. Today, intrusion detection systems (IDSs) are used as a solution to deal with the problem through remote monitoring of the performance and behaviors of nodes existing in wireless sensor networks. In addition to detecting malicious nodes in the network, IDSs can predict the behavior of malicious nodes in the future in most cases. Therefore, the present study introduced a network IDS (NIDS) entitled MOPSO-FLN by using a combination of multiobjective particle swarm optimization algorithm- (MOPSO-) based feature subset selection (FSS) and fast-learning network (FLN). In this work, we used the KDD Cup99 and dataset to select features, train the network, and test the model. According to the simulation results, this method was able to improve the performance of the IDS in terms of evaluation criteria, compared to other previous methods, by creating a balance between the objectives of the number of representative features and training errors based on the evolutionary power of MOPSO.
APA, Harvard, Vancouver, ISO, and other styles
7

K.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.

Full text
Abstract:
<em>Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that current IDS solutions cannot address, the solutions might not always be enough. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediary nodes on a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, therefore the protocol cooperates to analyze and discover malicious nodes in MANETs in a reliable way. In this study, they suggest black-hole assaults as an analysis approach to detect malicious nodes. In order to validate our created method, we used the Modified-Zone based Hierarchical Link State (M-ZHLS) hybrid routing protocol with mobile nodes in Network Simulations 2 (NS2). When mobility speed and topology size change, it is found that the Zone based Hierarchical Link State (ZHLS) routing protocol has a very good detection rate for black holes and malicious nodes, a lower average delay, and an increased packet delivery ratio. </em>
APA, Harvard, Vancouver, ISO, and other styles
8

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, so the protocol cooperates to analyze and detect malicious nodes in MANETs in a reliable way. In this paper, they propose black-hole attacks as an analysis method to detect malicious nodes. In order to validate our developed scheme, we used the Modified-Zone based Hierarchical Link State (M-ZHLS) hybrid routing protocol with mobile nodes in Network Simulations 2 (NS2). When mobility speed and topology size change, it is found that the Zone based Hierarchical Link State (ZHLS) routing protocol has a very good detection rate for black holes and malicious nodes, a lower average delay, and an increased packet delivery ratio.</em>
APA, Harvard, Vancouver, ISO, and other styles
9

POOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.

Full text
Abstract:
A Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other throughradio waves without the aid of any stand-alone infrastructure or centralized administration. These nodes are self-organizing and self-configuring and they act as both hostas well as routers.In MANET each node is free to move independently.MANET is simple and flexible hence widely used in military communication, emergency communication and mobile conferencing. Due to dynamic nature and no certification authority, MANETs are more prone to different types of attacks. The essential requirement for the establishment of communication among different nodes in MANET is that, nodes should cooperate with each other. If misbehaving nodes are present, it may lead to serious security concerns. This paper reviews various techniques available for detecting and preventing malicious node behaviour. Each paper is reviewed with the metrics like type of misbehaviour, detection mechanism, advantages and limitations. Based on our review we are proposing the improved bait detection mechanism.(IBDS), for the detection of misbehaving node that combines the advantages of both proactive and reactive defense schemes. https://journalnx.com/journal-article/20150315
APA, Harvard, Vancouver, ISO, and other styles
10

Marepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.

Full text
Abstract:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc. When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an insider. Among various mobility models to generate mobility patterns the Random waypoint mobility model is used .To solve these issues an IDPS framework for MANET using image processing techniques under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like authentication and confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
11

Yassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.

Full text
Abstract:
The security issue is essential and more challenging in Mobile Ad-Hoc Network (MANET) due to its characteristics such as, node mobility, self-organizing capability and dynamic topology. MANET is vulnerable to different types of attacks. One of possible attacks is black hole attack. Black hole attack occurs when a malicious node joins the network with the aim of intercepting data packets which are exchanged across the network and dropping them which affects the performance of the network and its connectivity. This paper proposes a new dataset (BDD dataset) for black hole intrusion detection systems which contributes to detect the black hole nodes in MANET. The proposed dataset contains a set of essential features to build an efficient learning model where these features are selected carefully using one of the feature selection techniques which is information gain technique J48 decision tree, Naïve Bayes (NB) and Sequential Minimal Optimization (SMO) classifiers are learned using training data of BDD dataset and the performance of these classifiers is evaluated using a learning machine tool Weka 3.7.11. The obtained performance results indicate that using the proposed dataset features succeeded in build an efficient learning model to train the previous classifiers to detect the black hole attack.
APA, Harvard, Vancouver, ISO, and other styles
12

Khan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.

Full text
Abstract:
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.
APA, Harvard, Vancouver, ISO, and other styles
13

G., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a type of Wireless ad-hoc network that usually has a routable networking environment on top of an end-to-end Link Layer (LL) ad-hoc network. MANETs consist of a hop-to-hop, self-arrangement and self-configure network in contrast to a mobile network has a central controller. The solutions may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these IDS solutions. In the network, some active attacks un-forward capacity nodes pretend to be intermediate nodes of a route to some given targets, drop any packet that subsequently goes through it, is one of the main types of attack. In this paper, they propose black-hole attacks an analysis method to detect malicious nodes in MANETs, the mechanism is cooperative hence the protocol work cooperatively together so that they can analyze, detect malicious nodes in a reliable manner. To verify our developed scheme by running through Network Simulations 2 (NS2) with mobile nodes using hybrid routing protocol namely, Modified - </em><em>Zone based Hierarchical Link State (M-ZHLS) routing protocol. It is observed that the black hole and malicious node detection rate is very good, reduced average delay and also increased packet delivery ratio compare Zone based Hierarchical Link State (ZHLS) routing protocol when there is a change of mobility speed and varying topology size. </em>
APA, Harvard, Vancouver, ISO, and other styles
14

Talukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.

Full text
Abstract:
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe that black holes acutely degrade the performance of networks. We have detected the black hole attacks within the networks using two techniques: (1) intrusion detection system (IDS) and (2) encryption technique (digital signature) with the concept of prevention. Moreover, normal AODV, BH_AODV, and D_BH_AODV protocols are investigated for various quality of service (QoS) parameters, i.e., packet delivery ratio (PDR), delay, and overhead with varying the number of nodes, packet sizes, and simulation times. The NS2 software has been used as a simulation tool to simulate existing network topologies, but it does not contain any mechanism to simulate malicious protocols by itself; therefore, we have developed and implemented a D_BH_AODV routing protocol. The outcomes show that the proposed D_BH_AODV approach for the PDR value delivers around 40 to 50% for varying nodes and packets. In contrast, the delay decreases from 300 to 100 ms and 150 to 50 ms with an increase in the number of nodes and packets, respectively. Furthermore, the overhead changes from 1 to 3 for various nodes and packet values. The outcome of this research proves that the black hole attack degrades the overall performance of the network, while the D_BH_AODV enhances the QoS performance since it detects the black hole nodes and avoids them to establish the communication between nodes.
APA, Harvard, Vancouver, ISO, and other styles
15

Varule, Kavita, and Sachin Bojewar. "RWD based IDS for MANET." International Journal of Computer Applications 124, no. 13 (2015): 9–13. http://dx.doi.org/10.5120/ijca2015905722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ranjani, R., and JJayala kshmi. "Comparative Study of Ids for Manet." IOSR Journal of Computer Engineering 16, no. 2 (2014): 14–18. http://dx.doi.org/10.9790/0661-162121418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ravi, N., and G. Ramachandran. "A robust intrusion detection system using machine learning techniques for MANET." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (2020): 253–60. http://dx.doi.org/10.3233/kes-200047.

Full text
Abstract:
Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
18

Rathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.

Full text
Abstract:
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection System (IDS). The power utilization is more in MANET as the IDS needs to be active for the whole time on each node. Considering this, we have designed a clustering-based proposal for Ad-hoc networks. To lower the communication overhead, the CH detection is called upon for establishing the path Weighted Clustering Algorithm (DCA) that is utilized to construct path. The proposed Distributed Clustering Algorithm dependent Invader Detection System (DCAIDS) is designed such that it reduces the overall delay during transmission in a network. The intruder attacks are identified by IDS and that particular nodes are detached from the cluster. When the particular target node receives the packets, it acknowledges its reception by sending RREP message so that the sender can send the intended data packets thereafter. Thus, an efficient and delay tolerant path is established which in turn intensifies the certainty of MANET.
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Young-Dong. "IDS Performance on MANET with Packet Aggregation Transmissions." Journal of the Korea institute of electronic communication sciences 9, no. 6 (2014): 695–701. http://dx.doi.org/10.13067/jkiecs.2014.9.6.695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Anilkumar, Prajeena, and Dr S. Malathy. "An Energy Efficient Acknowledgement Based Ids For Manet." IOSR Journal of Electronics and Communication Engineering 9, no. 3 (2014): 100–106. http://dx.doi.org/10.9790/2834-0933100106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Garg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.

Full text
Abstract:
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.
APA, Harvard, Vancouver, ISO, and other styles
22

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-reconfiguration nature of the system which does not depend on any settled infrastructure-based foundation. There is dynamic change in its topology because of rapidly moving versatile nodes. This article features few security issues emerging because of network matter among robots and proposes a lively MANET-based automated convention called PD-ROBO with a committed Intrusion Detection System (IDS) structure that utilizations portable operator method to stay away from replay assault in mechanical based MANET.
APA, Harvard, Vancouver, ISO, and other styles
23

Suganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.

Full text
Abstract:
In recent years, wireless networks are the key concern in communication field. Mobile Ad Hoc NETwork (MANET) comprised number of wireless nodes to communicate with each other for information exchange. MANET is temporary network constructed for particular purpose and no need of any pre-established infrastructure. MANET became well-liked technology due to its flexibility for various applications. The flexibility brings new security threats in MANET. Intrusion detection system used to identify and prevent the security attacks at different levels. IDS needed continuous monitoring which resulted in fast exhaustion of node battery life. Many researchers introduced different intrusion detection techniques for detecting the attacks variants. But, the energy consumption and intrusion detection performance was not improved. In order to address these problems, the existing intrusion detection techniques are reviewed.
APA, Harvard, Vancouver, ISO, and other styles
24

Ali Zardari, Zulfiqar, Jingsha He, Nafei Zhu, et al. "A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs." Future Internet 11, no. 3 (2019): 61. http://dx.doi.org/10.3390/fi11030061.

Full text
Abstract:
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t cooperate with other nodes and disturb the network through false routing information. In this paper, we propose a prominent technique, called dual attack detection for black and gray hole attacks (DDBG), for MANETs. The proposed DDBG technique selects the intrusion detection system (IDS) node using the connected dominating set (CDS) technique with two additional features; the energy and its nonexistence in the blacklist are also checked before putting the nodes into the IDS set. The CDS is an effective, distinguished, and localized approach for detecting nearly-connected dominating sets of nodes in a small range in mobile ad hoc networks. The selected IDS nodes broadcast a kind of status packet within a size of the dominating set for retrieving the complete behavioral information from their nodes. Later, IDS nodes use our DDBG technique to analyze the collected behavioral information to detect the malicious nodes and add them to the blacklist if the behavior of the node is suspicious. Our experimental results show that the quality of the service parameters of the proposed technique outperforms the existing routing schemes.
APA, Harvard, Vancouver, ISO, and other styles
25

Gandage, S. C., and A. Kumar. "DESIGN AND DEVELOPMENT OF IDS IN MANET USING PSO." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 5001–9. http://dx.doi.org/10.37418/amsj.9.7.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Young-Dong. "Performance Evaluation of IDS on MANET under Grayhole Attack." Journal of the Korea institute of electronic communication sciences 11, no. 11 (2016): 1077–82. http://dx.doi.org/10.13067/jkiecs.2016.11.11.1077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

CHENG, B. C., H. CHEN, and R. Y. TSENG. "A Good IDS Response Protocol of MANET Containment Strategies." IEICE Transactions on Communications E91-B, no. 11 (2008): 3657–66. http://dx.doi.org/10.1093/ietcom/e91-b.11.3657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jain, Akanksha, and Abhishek Mathur. "Secure IDS against Sybil Attacker Routing Misbehavior in MANET." International Journal of Computer Applications 131, no. 11 (2015): 36–42. http://dx.doi.org/10.5120/ijca2015907488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Amouri, Amar, Salvatore Morgera, Mohamed Bencherif, and Raju Manthena. "A Cross-Layer, Anomaly-Based IDS for WSN and MANET." Sensors 18, no. 2 (2018): 651. http://dx.doi.org/10.3390/s18020651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

R., Mangayarkarasi, and Manikandan R. "Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2217–21. https://doi.org/10.35940/ijeat.D6704.049420.

Full text
Abstract:
Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are energy depletion, link disconnection, mobility and coverage. Hence the selection of monitoring nodes plays an important role in IDS. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks. In this technique, the whole network is virtually divided in smaller grid like zones. In each grid, the nodes with higher stability and better coverage are assigned a reward value. A cost metric is derived in terms of energy consumption and computational delay. Then the nodes with minimum cost and high reward are selected as monitoring nodes. By simulation results, it is shown that the proposed technique has reduced detection delay, energy consumption and detection overhead.
APA, Harvard, Vancouver, ISO, and other styles
32

T., Priyanka. "Detect and Correct Misbehavior Nodes in MANET Using ACK Algorithm." Journal of Advancement in Communication System 5, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.7128381.

Full text
Abstract:
<em>MANET does not have a fixed infrastructure. Every single node in the MANET works as both receiver and transmitter. Each node directly communicates with others when they are both within their communication ranges. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. In this paper proposed a new routing algorithm named Enhanced Adaptive 3 Acknowledgement (EA3ACK) using EAACK with hybrid cryptography is (MARS4) specially designed for MANET? This hybrid cryptography a two key method namely MARS4 which is a combination of RSA and MAJE4 employed to reduce the routing overhead. The proposed EA3ACK algorithm provides efficient secured transmission compare to existing EAACK algorithm.</em>
APA, Harvard, Vancouver, ISO, and other styles
33

Laqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.

Full text
Abstract:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network Inception-CNN, Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning methods in MANET.
APA, Harvard, Vancouver, ISO, and other styles
34

Safaa, Laqtib, El Yassini Khalid, and Lahcen Hasnaoui Moulay. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701–9. https://doi.org/10.11591/ijece.v10i3.pp2701-2709.

Full text
Abstract:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
APA, Harvard, Vancouver, ISO, and other styles
35

Sunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.

Full text
Abstract:
An efficient Intrusion Detection System (IDS) is essential to secure Mobile Ad-hoc Networks (MANETs) against malevolent attacks. The present IDS still faces challenges in enhancing detection accuracy and in decreasing the false alarm rate. To overcome the above issues, a secure routing protocol for intrusion detection in MANET has been proposed here. In the proposed model, initially, MANET is simulated, which is followed by routing based on Dynamic Source Routing (DSR) routing protocol. Then, intrusion detection is done at Base Station (BS). At the BS, the log files are acquired from the dataset at first and it is normalized using Quintile normalization to transform the data into a structured form. Then, the desired features are selected in the feature selection phase using Wave–Hedges metrics for removing redundant and irrelevant data. Finally, intrusion detection is performed using the proposed hybrid SqueezenetFQuantum Neural Network (SqueezenetFQuantumNN) which is devised by the fusion of Squeeze Net and Quantum Neural Network (QuantumNN). The effectiveness of the proposed SqueezenetFQuantumNN is measured depending on evaluation metrics and is found to attain accuracy of 95.72%, True Positive Rate (TPR) of 93.42%, and True Negative Rate (TNR) of 91.39%.
APA, Harvard, Vancouver, ISO, and other styles
36

Thamizhmaran, K. "Different parameters of topology-based wireless acknowledgements in MANETS." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 1. http://dx.doi.org/10.26634/jwcn.10.2.18933.

Full text
Abstract:
The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed system. Different topology sizes and node sets were used, and the results were compared to those of some closely related IDS mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
37

K, Palanisamy, and Manikannan M. "Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 41–46. https://doi.org/10.5281/zenodo.1410961.

Full text
Abstract:
A mobile ad-hoc network is an autonomous system, no infrastructure and mobile&nbsp;nodes connected by wireless network. Every mobile nodes in the MANET network&nbsp;is free to move any place and any time any direction in independently. It will change&nbsp; its links to other node continuously. Link and malicious packet dropping are two&nbsp;sources for packet losses in MANET. In the insider-attack case where by malicious&nbsp;nodes that are part of the routing their knowledge of the communication context to&nbsp;selectively drop a small amount of packets less to the network performance. The&nbsp;proposed solution is efficient way to detect and prevention of various packet dropping&nbsp;attacks using Intrusion Detection System (IDS). Sleep scheduling algorithm is used&nbsp;nodes to be awake in a given period same time remaining nodes are in sleep position&nbsp;to minimize energy consumption and enhance the energy efficiency with high&nbsp;performance
APA, Harvard, Vancouver, ISO, and other styles
38

Visumathi, J., and K. L. Shunmuganathan. "An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms." Procedia Engineering 38 (2012): 2816–23. http://dx.doi.org/10.1016/j.proeng.2012.06.330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Addula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.

Full text
Abstract:
Recent developments in healthcare security and network intrusion detection have seen the domain of Artificial Intelligence (AI) act as a decisive presence due to its increased adaptability and more resilient level of resistance towards emerging cyber threats. Due to decentralized nature and its cost-effective communication, mobile ad hoc networks (MANETs) are widely used in healthcare applications and present security vulnerabilities like access from unauthorized nodes, node mobility and the bandwidth constraint. In general, traditional encryption and authentication alone will not eliminate these threats, and thus, advanced intrusion detection systems (IDS) based on deep learning (DL) are necessary. In this paper, we propose an AIIDS for secure healthcare networks in MANET using deep neural networks (DNN) to enhance the threat detection and alleviating the cyberattacks. In particular, the model is to integrate Cascading Back Propagation Neural Network (CBPNN), Feedforward Neural Network (FFNN), and Convolution Neural Network (CNN) in order to detect malicious activity, increase the detection accuracy and meet the robust security standards. Experimental results show that the average receiving packet (ARP) and end-to-end (E2E) delay of the proposed model is 74% (CBPNN), 82% (FFNN) and 85% (CNN) detection accuracies with 27s, 18s, and 17s of response time respectively. They suggest that incorporating AI in IDS can help enhance healthcare MANET environments’ security against emerging threats.
APA, Harvard, Vancouver, ISO, and other styles
40

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulnerable to numerous attacks that wreak havoc on their performance than any network. Traditional cryptography techniques cannot entirely defend MANETs in terms of fresh attacks and vulnerabilities due to the distributed architecture of MANETs; however, these issues can be overcome by using machine learning approaches-based intrusion detection systems (IDS). IDS, typically screening system processes and identifying intrusions, are commonly employed to supplement existing security methods because preventative techniques are never enough. Because MANETs are continually evolving, their highly limited nodes, and the lack of central observation stations, intrusion detection is a complex and tough process. Conventional IDSs are difficult to apply to them. Existing methodologies must be updated for MANETs or new approaches must be created. This paper aims to present a novel concept founded on deep belief networks (DBN) and long shortterm memory (LSTM) for MANET attack detection. The experimental analysis was performed on the probe, root to local, user to root, and denial of service (DoS) attacks. In the first phase of this paper, particle swarm optimization was used for feature selection, and subsequently, the DBN and LSTM were used for the classification of attacks in the MANET. The experimental results gave an accuracy reaching 99.46%, a sensitivity of 99.52%, and a recall of 99.52% for DBN and LSTM accuracy reaching 99.75%, a sensitivity of 99.79%, and a recall of 99.79%.
APA, Harvard, Vancouver, ISO, and other styles
41

Shrivastava, Sonal, Chetan Agrawal, and Anurag Jain. "An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET." International Journal on AdHoc Networking Systems 5, no. 1 (2015): 1–13. http://dx.doi.org/10.5121/ijans.2015.5101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

K., Thamizhmaran. "Dynamic Source Reactive Routing Protocol for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 25–30. https://doi.org/10.5281/zenodo.15210161.

Full text
Abstract:
<em>As the nodes are mobile so topology changes frequently that leads to link failure and lack of infrastructure support and resource constraint is the key issue that causes dishonest and non co-operative nodes. As the nodes&nbsp;square measure&nbsp;mobile&nbsp;thus&nbsp;topology changes&nbsp;oft&nbsp;that&nbsp;ends up in&nbsp;link failure and lack of infrastructure support and resource constraint&nbsp;is that the&nbsp;key issue that causes dishonest and non co-operative nodes. There&nbsp;square measure&nbsp;finding a route to destination, new route discovery is initiated. The frequent discoveries&nbsp;result in&nbsp;a lot of&nbsp;network congestion. To avoid this multipath routing protocols&nbsp;are&nbsp;planned&nbsp;to seek out&nbsp;multiple routes to destination and&nbsp;put on&nbsp;to alternate secondary path&nbsp;just in case&nbsp;of route broken and its&nbsp;offer&nbsp;higher&nbsp;routing performance and security. In this developed research paper attempt to compare the performance of two reactive routing protocols for MANETs that is Secure Dynamic Source Routing (SDSR) and Dynamic Source Routing (DSR), on-demand gateway discovery protocol where a mobile device of MANET gets connected to gateway. SDSR using the Intrusion Detection system (IDS) and trust based routing, the performance results are analysed by varying simulation time. Furthermore, all the above mentioned protocols are compared based on several important performance metrics which are packet delivery ratio, end-to-end delay and average energy.</em>
APA, Harvard, Vancouver, ISO, and other styles
43

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. A reason behind this is because people make use of security mechanisms applicable to wired networks in MANET and overlook the security measures that apply to MANET. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This paper addresses the mentioned gap by providing a proper definition and categorization of Sybil attacks in MANET. The whole simulation will take place in MATLAB environment. In the end performance is measured by using the parameters like network load and throughput.
APA, Harvard, Vancouver, ISO, and other styles
44

Sahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.

Full text
Abstract:
Abstract: The Mobile Ad hoc Network (MANET) is a wireless network component that offers a variety of applications in numerous industries. Perhaps the biggest problem with networks was the security of MANET. MANET is defenceless against many attacks that affect its availability and functionality. The black hole attack is one of the most dangerous dynamic assaults since it prevents the network from being presented and reliable because the malicious node drops all incoming data packets. By ensuring that it always has the best path to the target node, the black hole attack aims to trick every node in the network that wants to communicate with another node. A black hole attack into the network cannot be detected or prevented by the responsive routing protocol AODV. In this study, we improved the AODV routing protocol by using a different, more lightweight technique that recognises and detects single and multiple black hole attacks using hop count and trolling. In this study, we present a security method for MANET against solitary and group black hole attacks. The blackhole attack is a packet-dropping attack that acts like a regular node during connection formation and drops all data packets after forwarding a bogus reply from the destination to the sender. With the help of other regular nodes, one or more malicious nodes in this assault establish a safe environment. The proposed IDS (Intrusion Detection System) locates nodes that are not continually forwarding data packets but are still present in the network and offers secure communication in a dynamic network.
APA, Harvard, Vancouver, ISO, and other styles
45

P, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.

Full text
Abstract:
Nowadays, the evolution of the internet and the use of computer systems has resulted in the huge electronic transformation of data that experienced multiple problems such as security, privacy, and confidentiality of information. Significant progress has been made in terms of improving computer systems security. However, security, privacy, and confidentiality of electronic systems are potentially major problems in computer systems. In this paper, we presented a survey on intrusion detection systems (IDS) in several areas. It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP)
APA, Harvard, Vancouver, ISO, and other styles
46

Khaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.

Full text
Abstract:
One of the media to secure computers is to apply Intrusion Detection System (IDS) technology. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the types and types of computer network attacks. Logs on the IDS will be analyzed in depth to be used as an effort to improve computer network security. The research method that will be used is applied research. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS provides alerts to administrators because there are activities that violate the rules on the IDS.
APA, Harvard, Vancouver, ISO, and other styles
47

Yousra, Abdul Alsahib S. Aldeen, and Mohammed Abdulhadi Haider. "Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 5 (2020): 2401~2411. https://doi.org/10.12928/TELKOMNIKA.v18i5.14859.

Full text
Abstract:
Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection system (IDS) is adopted. However, the existing IDS system are not able to fulfill the security requirements. This paper proposes an intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm-based min-max feature selection (NIGA-MFS). The proposed solution designs for wireless advertising system for business/advertising data security and other transactions using independent reconfigurable architecture. This approach supports the wireless advertising portals to manage the data delivery by using 4G standard. The proposed reconfigurable architecture is validated by using applications specific to microcontrollers with multiple fusion IoT sensors.
APA, Harvard, Vancouver, ISO, and other styles
48

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Full text
Abstract:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
APA, Harvard, Vancouver, ISO, and other styles
49

Arudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.

Full text
Abstract:
Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process
APA, Harvard, Vancouver, ISO, and other styles
50

Ahlawat, Rashmi, and Setu K Chaturvedi. "A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET." International Journal of Computer Applications 80, no. 1 (2013): 34–38. http://dx.doi.org/10.5120/13827-1577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography