To see the other types of publications on this topic, follow the link: Types of MANET and IDS.

Journal articles on the topic 'Types of MANET and IDS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Types of MANET and IDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly.This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researche
APA, Harvard, Vancouver, ISO, and other styles
2

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.

Full text
Abstract:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and research
APA, Harvard, Vancouver, ISO, and other styles
3

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Full text
Abstract:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to ch
APA, Harvard, Vancouver, ISO, and other styles
4

Dixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.

Full text
Abstract:
<em>Abstract- </em>Mobile Ad-hoc network (MANET) is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. Due to problems like wireless radio, limited battery power, limited bandwidth and dynamic topology environment, nodes are susceptible for intrusion and attack. Security is an important field in this type of network. Each node in a MANET is capable of acting as a router. Routing and routing protocols are important aspects having various security concerns. The bio-inspired approach known as Particle Swarm Optimization (PSO) based on Swarm Intel
APA, Harvard, Vancouver, ISO, and other styles
5

Javidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.

Full text
Abstract:
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and in
APA, Harvard, Vancouver, ISO, and other styles
6

Einy, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.

Full text
Abstract:
Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks ha
APA, Harvard, Vancouver, ISO, and other styles
7

K.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.

Full text
Abstract:
<em>Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that current IDS solutions cannot address, the solutions might not always be enough. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediary nodes on a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, therefore the protocol cooperates to analyze and discover malicious nodes in MANETs in a reliable way. In this study, th
APA, Harvard, Vancouver, ISO, and other styles
8

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any
APA, Harvard, Vancouver, ISO, and other styles
9

POOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.

Full text
Abstract:
A Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other throughradio waves without the aid of any stand-alone infrastructure or centralized administration. These nodes are self-organizing and self-configuring and they act as both hostas well as routers.In MANET each node is free to move independently.MANET is simple and flexible hence widely used in military communication, emergency communication and mobile conferencing. Due to dynamic nature and no certification authority, MANETs are more prone to different types of attacks. The essential
APA, Harvard, Vancouver, ISO, and other styles
10

Marepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.

Full text
Abstract:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc. When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an insider. Among various mobility models to generate mobility patterns the Random w
APA, Harvard, Vancouver, ISO, and other styles
11

Yassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.

Full text
Abstract:
The security issue is essential and more challenging in Mobile Ad-Hoc Network (MANET) due to its characteristics such as, node mobility, self-organizing capability and dynamic topology. MANET is vulnerable to different types of attacks. One of possible attacks is black hole attack. Black hole attack occurs when a malicious node joins the network with the aim of intercepting data packets which are exchanged across the network and dropping them which affects the performance of the network and its connectivity. This paper proposes a new dataset (BDD dataset) for black hole intrusion detection sys
APA, Harvard, Vancouver, ISO, and other styles
12

Khan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.

Full text
Abstract:
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side,
APA, Harvard, Vancouver, ISO, and other styles
13

G., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a type of Wireless ad-hoc network that usually has a routable networking environment on top of an end-to-end Link Layer (LL) ad-hoc network. MANETs consist of a hop-to-hop, self-arrangement and self-configure network in contrast to a mobile network has a central controller. The solutions may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these IDS solutions. In the network, some active attacks un-forward capacity nodes pretend to be intermediate nodes of a route to some given targets, drop any pack
APA, Harvard, Vancouver, ISO, and other styles
14

Talukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.

Full text
Abstract:
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe
APA, Harvard, Vancouver, ISO, and other styles
15

Varule, Kavita, and Sachin Bojewar. "RWD based IDS for MANET." International Journal of Computer Applications 124, no. 13 (2015): 9–13. http://dx.doi.org/10.5120/ijca2015905722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ranjani, R., and JJayala kshmi. "Comparative Study of Ids for Manet." IOSR Journal of Computer Engineering 16, no. 2 (2014): 14–18. http://dx.doi.org/10.9790/0661-162121418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ravi, N., and G. Ramachandran. "A robust intrusion detection system using machine learning techniques for MANET." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (2020): 253–60. http://dx.doi.org/10.3233/kes-200047.

Full text
Abstract:
Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluct
APA, Harvard, Vancouver, ISO, and other styles
18

Rathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.

Full text
Abstract:
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection System (IDS). The power utilization is more in MANET as the IDS needs to be active for the whole time on each node. Considering this, we have designed a clustering-based proposal for Ad-hoc networks. To lower the communication overhead, the CH detection
APA, Harvard, Vancouver, ISO, and other styles
19

Vikas and Dr Shashiraj Teotia. "Optimization of Graph Neural Networks for Real-Time Intrusion Detection in Dynamic Mobile Ad-Hoc Networks." International Journal of Environmental Sciences 11, no. 11s (2025): 740–48. https://doi.org/10.64252/79452g17.

Full text
Abstract:
AD-HOC Mobile Networks (Manets) face significant security challenges due to their dynamic topology and vulnerability to sophisticated cyber threats. Traditional IDS detection (IDS) systems usually cease to provide real -time adaptive protection against evolutionary attacks on these resource restriction environments. This article presents an optimized graphic neural network IDS (GNN-IDS IDS) that addresses these limitations through three main innovations: dynamic graphs representation learning, light architecture design and online adaptation mechanisms. Our approach reaches 93.2%detection accur
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, Young-Dong. "IDS Performance on MANET with Packet Aggregation Transmissions." Journal of the Korea institute of electronic communication sciences 9, no. 6 (2014): 695–701. http://dx.doi.org/10.13067/jkiecs.2014.9.6.695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Anilkumar, Prajeena, and Dr S. Malathy. "An Energy Efficient Acknowledgement Based Ids For Manet." IOSR Journal of Electronics and Communication Engineering 9, no. 3 (2014): 100–106. http://dx.doi.org/10.9790/2834-0933100106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Garg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.

Full text
Abstract:
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report.
APA, Harvard, Vancouver, ISO, and other styles
23

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-rec
APA, Harvard, Vancouver, ISO, and other styles
24

Suganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.

Full text
Abstract:
In recent years, wireless networks are the key concern in communication field. Mobile Ad Hoc NETwork (MANET) comprised number of wireless nodes to communicate with each other for information exchange. MANET is temporary network constructed for particular purpose and no need of any pre-established infrastructure. MANET became well-liked technology due to its flexibility for various applications. The flexibility brings new security threats in MANET. Intrusion detection system used to identify and prevent the security attacks at different levels. IDS needed continuous monitoring which resulted in
APA, Harvard, Vancouver, ISO, and other styles
25

Ali Zardari, Zulfiqar, Jingsha He, Nafei Zhu, et al. "A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs." Future Internet 11, no. 3 (2019): 61. http://dx.doi.org/10.3390/fi11030061.

Full text
Abstract:
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t cooperate with other nodes and disturb the network through false routing information. In this paper, we propose a prominent technique, called dual attack detection for black and gray hole attacks (DDBG), for MANETs. The proposed DDBG technique selects the intrusion detection system (IDS) node using the connected dominating set (CDS) technique with two additi
APA, Harvard, Vancouver, ISO, and other styles
26

Gandage, S. C., and A. Kumar. "DESIGN AND DEVELOPMENT OF IDS IN MANET USING PSO." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 5001–9. http://dx.doi.org/10.37418/amsj.9.7.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kim, Young-Dong. "Performance Evaluation of IDS on MANET under Grayhole Attack." Journal of the Korea institute of electronic communication sciences 11, no. 11 (2016): 1077–82. http://dx.doi.org/10.13067/jkiecs.2016.11.11.1077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

CHENG, B. C., H. CHEN, and R. Y. TSENG. "A Good IDS Response Protocol of MANET Containment Strategies." IEICE Transactions on Communications E91-B, no. 11 (2008): 3657–66. http://dx.doi.org/10.1093/ietcom/e91-b.11.3657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jain, Akanksha, and Abhishek Mathur. "Secure IDS against Sybil Attacker Routing Misbehavior in MANET." International Journal of Computer Applications 131, no. 11 (2015): 36–42. http://dx.doi.org/10.5120/ijca2015907488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
APA, Harvard, Vancouver, ISO, and other styles
31

Amouri, Amar, Salvatore Morgera, Mohamed Bencherif, and Raju Manthena. "A Cross-Layer, Anomaly-Based IDS for WSN and MANET." Sensors 18, no. 2 (2018): 651. http://dx.doi.org/10.3390/s18020651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

R., Mangayarkarasi, and Manikandan R. "Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2217–21. https://doi.org/10.35940/ijeat.D6704.049420.

Full text
Abstract:
Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are ene
APA, Harvard, Vancouver, ISO, and other styles
33

T., Priyanka. "Detect and Correct Misbehavior Nodes in MANET Using ACK Algorithm." Journal of Advancement in Communication System 5, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.7128381.

Full text
Abstract:
<em>MANET does not have a fixed infrastructure. Every single node in the MANET works as both receiver and transmitter. Each node directly communicates with others when they are both within their communication ranges. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. In this paper proposed a new routing algorithm named Enhanced Adaptive 3 Acknowledgement (EA3ACK) using EAACK with hybrid cryptography is (MARS4) specially designed for MANET? This hybrid cryptography a two key method namely MARS4 which is a combination of RSA and MAJE4 em
APA, Harvard, Vancouver, ISO, and other styles
34

Laqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.

Full text
Abstract:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Net
APA, Harvard, Vancouver, ISO, and other styles
35

Safaa, Laqtib, El Yassini Khalid, and Lahcen Hasnaoui Moulay. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701–9. https://doi.org/10.11591/ijece.v10i3.pp2701-2709.

Full text
Abstract:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Net
APA, Harvard, Vancouver, ISO, and other styles
36

Sunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.

Full text
Abstract:
An efficient Intrusion Detection System (IDS) is essential to secure Mobile Ad-hoc Networks (MANETs) against malevolent attacks. The present IDS still faces challenges in enhancing detection accuracy and in decreasing the false alarm rate. To overcome the above issues, a secure routing protocol for intrusion detection in MANET has been proposed here. In the proposed model, initially, MANET is simulated, which is followed by routing based on Dynamic Source Routing (DSR) routing protocol. Then, intrusion detection is done at Base Station (BS). At the BS, the log files are acquired from the datas
APA, Harvard, Vancouver, ISO, and other styles
37

Thamizhmaran, K. "Different parameters of topology-based wireless acknowledgements in MANETS." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 1. http://dx.doi.org/10.26634/jwcn.10.2.18933.

Full text
Abstract:
The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed syst
APA, Harvard, Vancouver, ISO, and other styles
38

K, Palanisamy, and Manikannan M. "Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 41–46. https://doi.org/10.5281/zenodo.1410961.

Full text
Abstract:
A mobile ad-hoc network is an autonomous system, no infrastructure and mobile&nbsp;nodes connected by wireless network. Every mobile nodes in the MANET network&nbsp;is free to move any place and any time any direction in independently. It will change&nbsp; its links to other node continuously. Link and malicious packet dropping are two&nbsp;sources for packet losses in MANET. In the insider-attack case where by malicious&nbsp;nodes that are part of the routing their knowledge of the communication context to&nbsp;selectively drop a small amount of packets less to the network performance. The&nb
APA, Harvard, Vancouver, ISO, and other styles
39

Visumathi, J., and K. L. Shunmuganathan. "An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms." Procedia Engineering 38 (2012): 2816–23. http://dx.doi.org/10.1016/j.proeng.2012.06.330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Addula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.

Full text
Abstract:
Recent developments in healthcare security and network intrusion detection have seen the domain of Artificial Intelligence (AI) act as a decisive presence due to its increased adaptability and more resilient level of resistance towards emerging cyber threats. Due to decentralized nature and its cost-effective communication, mobile ad hoc networks (MANETs) are widely used in healthcare applications and present security vulnerabilities like access from unauthorized nodes, node mobility and the bandwidth constraint. In general, traditional encryption and authentication alone will not eliminate th
APA, Harvard, Vancouver, ISO, and other styles
41

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulner
APA, Harvard, Vancouver, ISO, and other styles
42

Shrivastava, Sonal, Chetan Agrawal, and Anurag Jain. "An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET." International Journal on AdHoc Networking Systems 5, no. 1 (2015): 1–13. http://dx.doi.org/10.5121/ijans.2015.5101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

K., Thamizhmaran. "Dynamic Source Reactive Routing Protocol for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 25–30. https://doi.org/10.5281/zenodo.15210161.

Full text
Abstract:
<em>As the nodes are mobile so topology changes frequently that leads to link failure and lack of infrastructure support and resource constraint is the key issue that causes dishonest and non co-operative nodes. As the nodes&nbsp;square measure&nbsp;mobile&nbsp;thus&nbsp;topology changes&nbsp;oft&nbsp;that&nbsp;ends up in&nbsp;link failure and lack of infrastructure support and resource constraint&nbsp;is that the&nbsp;key issue that causes dishonest and non co-operative nodes. There&nbsp;square measure&nbsp;finding a route to destination, new route discovery is initiated. The frequent discove
APA, Harvard, Vancouver, ISO, and other styles
44

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have
APA, Harvard, Vancouver, ISO, and other styles
45

Sahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.

Full text
Abstract:
Abstract: The Mobile Ad hoc Network (MANET) is a wireless network component that offers a variety of applications in numerous industries. Perhaps the biggest problem with networks was the security of MANET. MANET is defenceless against many attacks that affect its availability and functionality. The black hole attack is one of the most dangerous dynamic assaults since it prevents the network from being presented and reliable because the malicious node drops all incoming data packets. By ensuring that it always has the best path to the target node, the black hole attack aims to trick every node
APA, Harvard, Vancouver, ISO, and other styles
46

P, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.

Full text
Abstract:
Nowadays, the evolution of the internet and the use of computer systems has resulted in the huge electronic transformation of data that experienced multiple problems such as security, privacy, and confidentiality of information. Significant progress has been made in terms of improving computer systems security. However, security, privacy, and confidentiality of electronic systems are potentially major problems in computer systems. In this paper, we presented a survey on intrusion detection systems (IDS) in several areas. It consists of Web Application, Cloud Environment, Internet of Things (Io
APA, Harvard, Vancouver, ISO, and other styles
47

Khaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.

Full text
Abstract:
One of the media to secure computers is to apply Intrusion Detection System (IDS) technology. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the types and types of computer network attacks. Logs on the IDS will be analyzed in depth to be used as an effort
APA, Harvard, Vancouver, ISO, and other styles
48

Yousra, Abdul Alsahib S. Aldeen, and Mohammed Abdulhadi Haider. "Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 5 (2020): 2401~2411. https://doi.org/10.12928/TELKOMNIKA.v18i5.14859.

Full text
Abstract:
Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection
APA, Harvard, Vancouver, ISO, and other styles
49

Arudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.

Full text
Abstract:
Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MAN
APA, Harvard, Vancouver, ISO, and other styles
50

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Full text
Abstract:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!