Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Types of MANET and IDS.

Artykuły w czasopismach na temat „Types of MANET and IDS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Types of MANET and IDS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "DESIGNING SECURE MULTICASTING ROUTING ALGORITHMS IN MANET USING IDS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 407–10. https://doi.org/10.5281/zenodo.573517.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly.This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and researche
Style APA, Harvard, Vancouver, ISO itp.
2

Mrs, Pooja Preet* Dr. Rahul Mishra Dr. Saket Agrawal. "INTRUSION DETECTION SYSTEM FOR MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 402–6. https://doi.org/10.5281/zenodo.581556.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. This paper aims to pioneer and to assort current techniques of Intrusion Detection System (IDS) aware MANET. MANET is infrastructure-less, pervasive in nature with multi-hop routing, without any centralized authority. To support these ideas, a discussion regarding attacks and research
Style APA, Harvard, Vancouver, ISO itp.
3

K.Thamizhmaran. "Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)." Journal of Optoelectronics and Communication 7, no. 1 (2025): 28–33. https://doi.org/10.5281/zenodo.15152875.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure.&nbsp; Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue.&nbsp; To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to ch
Style APA, Harvard, Vancouver, ISO itp.
4

Dixit, Shruti, Navneet Kaur, and Shalini Shahhay. "Intrusion Detection System Based on Particle Swarm Optimization in Mobile Ad-hoc Network: A Survey." International Journal on Advances in Engineering, Technology and Science (IJAETS) 5, no. 1 (2024): 89–93. https://doi.org/10.5281/zenodo.10718959.

Pełny tekst źródła
Streszczenie:
<em>Abstract- </em>Mobile Ad-hoc network (MANET) is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. Due to problems like wireless radio, limited battery power, limited bandwidth and dynamic topology environment, nodes are susceptible for intrusion and attack. Security is an important field in this type of network. Each node in a MANET is capable of acting as a router. Routing and routing protocols are important aspects having various security concerns. The bio-inspired approach known as Particle Swarm Optimization (PSO) based on Swarm Intel
Style APA, Harvard, Vancouver, ISO itp.
5

Javidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.

Pełny tekst źródła
Streszczenie:
MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and in
Style APA, Harvard, Vancouver, ISO itp.
6

Einy, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network." Wireless Communications and Mobile Computing 2021 (June 15, 2021): 1–12. http://dx.doi.org/10.1155/2021/6648351.

Pełny tekst źródła
Streszczenie:
Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANET in various fields. On the other hand, the increased popularity of these networks ha
Style APA, Harvard, Vancouver, ISO itp.
7

K.Thamizhmaran. "Non-Base-Station based Wireless Communication in MANET using Hybrid Routing." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2025): 8–14. https://doi.org/10.5281/zenodo.14718160.

Pełny tekst źródła
Streszczenie:
<em>Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that current IDS solutions cannot address, the solutions might not always be enough. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediary nodes on a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, therefore the protocol cooperates to analyze and discover malicious nodes in MANETs in a reliable way. In this study, th
Style APA, Harvard, Vancouver, ISO itp.
8

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any
Style APA, Harvard, Vancouver, ISO itp.
9

POOJA, L.CHELANI, C.KHAKE USHA, and S.LOKHANDE VANDANA. "TECHNIQUES FOR PREVENTING AND DETECTING MISBEHAVING NODES IN MANET: A SURVEY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 204–9. https://doi.org/10.5281/zenodo.1460111.

Pełny tekst źródła
Streszczenie:
A Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other throughradio waves without the aid of any stand-alone infrastructure or centralized administration. These nodes are self-organizing and self-configuring and they act as both hostas well as routers.In MANET each node is free to move independently.MANET is simple and flexible hence widely used in military communication, emergency communication and mobile conferencing. Due to dynamic nature and no certification authority, MANETs are more prone to different types of attacks. The essential
Style APA, Harvard, Vancouver, ISO itp.
10

Marepalli, Radha, and Rao C.V.Guru. "PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HOLE ATTACK:ISSUES AND CHALLENGES." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 7, no. 2 (2020): 1–8. https://doi.org/10.5281/zenodo.3980700.

Pełny tekst źródła
Streszczenie:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc. When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an insider. Among various mobility models to generate mobility patterns the Random w
Style APA, Harvard, Vancouver, ISO itp.
11

Yassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.

Pełny tekst źródła
Streszczenie:
The security issue is essential and more challenging in Mobile Ad-Hoc Network (MANET) due to its characteristics such as, node mobility, self-organizing capability and dynamic topology. MANET is vulnerable to different types of attacks. One of possible attacks is black hole attack. Black hole attack occurs when a malicious node joins the network with the aim of intercepting data packets which are exchanged across the network and dropping them which affects the performance of the network and its connectivity. This paper proposes a new dataset (BDD dataset) for black hole intrusion detection sys
Style APA, Harvard, Vancouver, ISO itp.
12

Khan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.

Pełny tekst źródła
Streszczenie:
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side,
Style APA, Harvard, Vancouver, ISO itp.
13

G., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Networks (MANETs) are a type of Wireless ad-hoc network that usually has a routable networking environment on top of an end-to-end Link Layer (LL) ad-hoc network. MANETs consist of a hop-to-hop, self-arrangement and self-configure network in contrast to a mobile network has a central controller. The solutions may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these IDS solutions. In the network, some active attacks un-forward capacity nodes pretend to be intermediate nodes of a route to some given targets, drop any pack
Style APA, Harvard, Vancouver, ISO itp.
14

Talukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.

Pełny tekst źródła
Streszczenie:
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe
Style APA, Harvard, Vancouver, ISO itp.
15

Varule, Kavita, and Sachin Bojewar. "RWD based IDS for MANET." International Journal of Computer Applications 124, no. 13 (2015): 9–13. http://dx.doi.org/10.5120/ijca2015905722.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Ranjani, R., and JJayala kshmi. "Comparative Study of Ids for Manet." IOSR Journal of Computer Engineering 16, no. 2 (2014): 14–18. http://dx.doi.org/10.9790/0661-162121418.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Ravi, N., and G. Ramachandran. "A robust intrusion detection system using machine learning techniques for MANET." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (2020): 253–60. http://dx.doi.org/10.3233/kes-200047.

Pełny tekst źródła
Streszczenie:
Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluct
Style APA, Harvard, Vancouver, ISO itp.
18

Rathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.

Pełny tekst źródła
Streszczenie:
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection System (IDS). The power utilization is more in MANET as the IDS needs to be active for the whole time on each node. Considering this, we have designed a clustering-based proposal for Ad-hoc networks. To lower the communication overhead, the CH detection
Style APA, Harvard, Vancouver, ISO itp.
19

Vikas and Dr Shashiraj Teotia. "Optimization of Graph Neural Networks for Real-Time Intrusion Detection in Dynamic Mobile Ad-Hoc Networks." International Journal of Environmental Sciences 11, no. 11s (2025): 740–48. https://doi.org/10.64252/79452g17.

Pełny tekst źródła
Streszczenie:
AD-HOC Mobile Networks (Manets) face significant security challenges due to their dynamic topology and vulnerability to sophisticated cyber threats. Traditional IDS detection (IDS) systems usually cease to provide real -time adaptive protection against evolutionary attacks on these resource restriction environments. This article presents an optimized graphic neural network IDS (GNN-IDS IDS) that addresses these limitations through three main innovations: dynamic graphs representation learning, light architecture design and online adaptation mechanisms. Our approach reaches 93.2%detection accur
Style APA, Harvard, Vancouver, ISO itp.
20

Kim, Young-Dong. "IDS Performance on MANET with Packet Aggregation Transmissions." Journal of the Korea institute of electronic communication sciences 9, no. 6 (2014): 695–701. http://dx.doi.org/10.13067/jkiecs.2014.9.6.695.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Anilkumar, Prajeena, and Dr S. Malathy. "An Energy Efficient Acknowledgement Based Ids For Manet." IOSR Journal of Electronics and Communication Engineering 9, no. 3 (2014): 100–106. http://dx.doi.org/10.9790/2834-0933100106.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Garg, Monika, Karanvir Kaur, and Simerpreet Kaur. "Using 3GPP- A Secure IDS for MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 518–21. http://dx.doi.org/10.24297/ijct.v4i2b2.3312.

Pełny tekst źródła
Streszczenie:
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report.
Style APA, Harvard, Vancouver, ISO itp.
23

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Pełny tekst źródła
Streszczenie:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-rec
Style APA, Harvard, Vancouver, ISO itp.
24

Suganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.

Pełny tekst źródła
Streszczenie:
In recent years, wireless networks are the key concern in communication field. Mobile Ad Hoc NETwork (MANET) comprised number of wireless nodes to communicate with each other for information exchange. MANET is temporary network constructed for particular purpose and no need of any pre-established infrastructure. MANET became well-liked technology due to its flexibility for various applications. The flexibility brings new security threats in MANET. Intrusion detection system used to identify and prevent the security attacks at different levels. IDS needed continuous monitoring which resulted in
Style APA, Harvard, Vancouver, ISO itp.
25

Ali Zardari, Zulfiqar, Jingsha He, Nafei Zhu, et al. "A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs." Future Internet 11, no. 3 (2019): 61. http://dx.doi.org/10.3390/fi11030061.

Pełny tekst źródła
Streszczenie:
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t cooperate with other nodes and disturb the network through false routing information. In this paper, we propose a prominent technique, called dual attack detection for black and gray hole attacks (DDBG), for MANETs. The proposed DDBG technique selects the intrusion detection system (IDS) node using the connected dominating set (CDS) technique with two additi
Style APA, Harvard, Vancouver, ISO itp.
26

Gandage, S. C., and A. Kumar. "DESIGN AND DEVELOPMENT OF IDS IN MANET USING PSO." Advances in Mathematics: Scientific Journal 9, no. 7 (2020): 5001–9. http://dx.doi.org/10.37418/amsj.9.7.65.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Kim, Young-Dong. "Performance Evaluation of IDS on MANET under Grayhole Attack." Journal of the Korea institute of electronic communication sciences 11, no. 11 (2016): 1077–82. http://dx.doi.org/10.13067/jkiecs.2016.11.11.1077.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

CHENG, B. C., H. CHEN, and R. Y. TSENG. "A Good IDS Response Protocol of MANET Containment Strategies." IEICE Transactions on Communications E91-B, no. 11 (2008): 3657–66. http://dx.doi.org/10.1093/ietcom/e91-b.11.3657.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Jain, Akanksha, and Abhishek Mathur. "Secure IDS against Sybil Attacker Routing Misbehavior in MANET." International Journal of Computer Applications 131, no. 11 (2015): 36–42. http://dx.doi.org/10.5120/ijca2015907488.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Pełny tekst źródła
Streszczenie:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
Style APA, Harvard, Vancouver, ISO itp.
31

Amouri, Amar, Salvatore Morgera, Mohamed Bencherif, and Raju Manthena. "A Cross-Layer, Anomaly-Based IDS for WSN and MANET." Sensors 18, no. 2 (2018): 651. http://dx.doi.org/10.3390/s18020651.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

R., Mangayarkarasi, and Manikandan R. "Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2217–21. https://doi.org/10.35940/ijeat.D6704.049420.

Pełny tekst źródła
Streszczenie:
Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are ene
Style APA, Harvard, Vancouver, ISO itp.
33

T., Priyanka. "Detect and Correct Misbehavior Nodes in MANET Using ACK Algorithm." Journal of Advancement in Communication System 5, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.7128381.

Pełny tekst źródła
Streszczenie:
<em>MANET does not have a fixed infrastructure. Every single node in the MANET works as both receiver and transmitter. Each node directly communicates with others when they are both within their communication ranges. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. In this paper proposed a new routing algorithm named Enhanced Adaptive 3 Acknowledgement (EA3ACK) using EAACK with hybrid cryptography is (MARS4) specially designed for MANET? This hybrid cryptography a two key method namely MARS4 which is a combination of RSA and MAJE4 em
Style APA, Harvard, Vancouver, ISO itp.
34

Laqtib, Safaa, Khalid El Yassini, and Moulay Lahcen Hasnaoui. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701. http://dx.doi.org/10.11591/ijece.v10i3.pp2701-2709.

Pełny tekst źródła
Streszczenie:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Net
Style APA, Harvard, Vancouver, ISO itp.
35

Safaa, Laqtib, El Yassini Khalid, and Lahcen Hasnaoui Moulay. "A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2701–9. https://doi.org/10.11591/ijece.v10i3.pp2701-2709.

Pełny tekst źródła
Streszczenie:
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Net
Style APA, Harvard, Vancouver, ISO itp.
36

Sunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.

Pełny tekst źródła
Streszczenie:
An efficient Intrusion Detection System (IDS) is essential to secure Mobile Ad-hoc Networks (MANETs) against malevolent attacks. The present IDS still faces challenges in enhancing detection accuracy and in decreasing the false alarm rate. To overcome the above issues, a secure routing protocol for intrusion detection in MANET has been proposed here. In the proposed model, initially, MANET is simulated, which is followed by routing based on Dynamic Source Routing (DSR) routing protocol. Then, intrusion detection is done at Base Station (BS). At the BS, the log files are acquired from the datas
Style APA, Harvard, Vancouver, ISO itp.
37

Thamizhmaran, K. "Different parameters of topology-based wireless acknowledgements in MANETS." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 1. http://dx.doi.org/10.26634/jwcn.10.2.18933.

Pełny tekst źródła
Streszczenie:
The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed syst
Style APA, Harvard, Vancouver, ISO itp.
38

K, Palanisamy, and Manikannan M. "Energy Efficiency and Prevention of Packet Dropping Attacks Using IDS Scheme in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 41–46. https://doi.org/10.5281/zenodo.1410961.

Pełny tekst źródła
Streszczenie:
A mobile ad-hoc network is an autonomous system, no infrastructure and mobile&nbsp;nodes connected by wireless network. Every mobile nodes in the MANET network&nbsp;is free to move any place and any time any direction in independently. It will change&nbsp; its links to other node continuously. Link and malicious packet dropping are two&nbsp;sources for packet losses in MANET. In the insider-attack case where by malicious&nbsp;nodes that are part of the routing their knowledge of the communication context to&nbsp;selectively drop a small amount of packets less to the network performance. The&nb
Style APA, Harvard, Vancouver, ISO itp.
39

Visumathi, J., and K. L. Shunmuganathan. "An Effective IDS for MANET Using Forward Feature Selection and Classification Algorithms." Procedia Engineering 38 (2012): 2816–23. http://dx.doi.org/10.1016/j.proeng.2012.06.330.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Addula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.

Pełny tekst źródła
Streszczenie:
Recent developments in healthcare security and network intrusion detection have seen the domain of Artificial Intelligence (AI) act as a decisive presence due to its increased adaptability and more resilient level of resistance towards emerging cyber threats. Due to decentralized nature and its cost-effective communication, mobile ad hoc networks (MANETs) are widely used in healthcare applications and present security vulnerabilities like access from unauthorized nodes, node mobility and the bandwidth constraint. In general, traditional encryption and authentication alone will not eliminate th
Style APA, Harvard, Vancouver, ISO itp.
41

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Pełny tekst źródła
Streszczenie:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulner
Style APA, Harvard, Vancouver, ISO itp.
42

Shrivastava, Sonal, Chetan Agrawal, and Anurag Jain. "An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET." International Journal on AdHoc Networking Systems 5, no. 1 (2015): 1–13. http://dx.doi.org/10.5121/ijans.2015.5101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

K., Thamizhmaran. "Dynamic Source Reactive Routing Protocol for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 25–30. https://doi.org/10.5281/zenodo.15210161.

Pełny tekst źródła
Streszczenie:
<em>As the nodes are mobile so topology changes frequently that leads to link failure and lack of infrastructure support and resource constraint is the key issue that causes dishonest and non co-operative nodes. As the nodes&nbsp;square measure&nbsp;mobile&nbsp;thus&nbsp;topology changes&nbsp;oft&nbsp;that&nbsp;ends up in&nbsp;link failure and lack of infrastructure support and resource constraint&nbsp;is that the&nbsp;key issue that causes dishonest and non co-operative nodes. There&nbsp;square measure&nbsp;finding a route to destination, new route discovery is initiated. The frequent discove
Style APA, Harvard, Vancouver, ISO itp.
44

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Pełny tekst źródła
Streszczenie:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have
Style APA, Harvard, Vancouver, ISO itp.
45

Sahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.

Pełny tekst źródła
Streszczenie:
Abstract: The Mobile Ad hoc Network (MANET) is a wireless network component that offers a variety of applications in numerous industries. Perhaps the biggest problem with networks was the security of MANET. MANET is defenceless against many attacks that affect its availability and functionality. The black hole attack is one of the most dangerous dynamic assaults since it prevents the network from being presented and reliable because the malicious node drops all incoming data packets. By ensuring that it always has the best path to the target node, the black hole attack aims to trick every node
Style APA, Harvard, Vancouver, ISO itp.
46

P, Wanda. "A Survey of Intrusion Detection System." International Journal of Informatics and Computation 1, no. 1 (2020): 1. http://dx.doi.org/10.35842/ijicom.v1i1.7.

Pełny tekst źródła
Streszczenie:
Nowadays, the evolution of the internet and the use of computer systems has resulted in the huge electronic transformation of data that experienced multiple problems such as security, privacy, and confidentiality of information. Significant progress has been made in terms of improving computer systems security. However, security, privacy, and confidentiality of electronic systems are potentially major problems in computer systems. In this paper, we presented a survey on intrusion detection systems (IDS) in several areas. It consists of Web Application, Cloud Environment, Internet of Things (Io
Style APA, Harvard, Vancouver, ISO itp.
47

Khaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.

Pełny tekst źródła
Streszczenie:
One of the media to secure computers is to apply Intrusion Detection System (IDS) technology. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the types and types of computer network attacks. Logs on the IDS will be analyzed in depth to be used as an effort
Style APA, Harvard, Vancouver, ISO itp.
48

Yousra, Abdul Alsahib S. Aldeen, and Mohammed Abdulhadi Haider. "Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 5 (2020): 2401~2411. https://doi.org/10.12928/TELKOMNIKA.v18i5.14859.

Pełny tekst źródła
Streszczenie:
Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection
Style APA, Harvard, Vancouver, ISO itp.
49

Arudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.

Pełny tekst źródła
Streszczenie:
Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MAN
Style APA, Harvard, Vancouver, ISO itp.
50

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Pełny tekst źródła
Streszczenie:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!