CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secured Intrusion Detection System in Mobile Ad Hoc Network using RAODV

Published on February 2013 by S. Sasikala, M. Vallinayagam
International Conference on Research Trends in Computer Technologies 2013
Foundation of Computer Science USA
ICRTCT - Number 2
February 2013
Authors: S. Sasikala, M. Vallinayagam
cf6760fd-dae5-498c-a753-1e1decfa323f

S. Sasikala, M. Vallinayagam . Secured Intrusion Detection System in Mobile Ad Hoc Network using RAODV. International Conference on Research Trends in Computer Technologies 2013. ICRTCT, 2 (February 2013), 10-14.

@article{
author = { S. Sasikala, M. Vallinayagam },
title = { Secured Intrusion Detection System in Mobile Ad Hoc Network using RAODV },
journal = { International Conference on Research Trends in Computer Technologies 2013 },
issue_date = { February 2013 },
volume = { ICRTCT },
number = { 2 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/icrtct/number2/10809-1021/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Research Trends in Computer Technologies 2013
%A S. Sasikala
%A M. Vallinayagam
%T Secured Intrusion Detection System in Mobile Ad Hoc Network using RAODV
%J International Conference on Research Trends in Computer Technologies 2013
%@ 0975-8887
%V ICRTCT
%N 2
%P 10-14
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless Mobile ad-hoc network (MANET) is an emerging technology and has great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance. MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing by sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. The Intrusion Detection is one of the possible ways in recognizing a possible attacks before the system could be penetrated. The encryption and authentication solution, which are considered as the first line of defense, are no longer sufficient to protect MANETs. Therefore, Intrusion Detection Systems (IDSs) is needed to be the second line of defense to protect the network from security problem. There are many security attacks in MANET and DDoS (Distributed Denial of service) is one of them. In this paper we discussed some attacks on MANET and DDOS also and provide the security against the DDOS attack.

References
  1. IEEE Std 802-2002, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, page 1, section 1. 2: "Key Concepts Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  2. Gary A. Donahue (2007-06). Network Warrior. O'Reilly. Page No 5.
  3. Toby Skandier, Groth, David; (2005). Network Study Guide, Fourth Edition . Sybex, Inc. 0-7821-4406-3. ISBN.
  4. S. A. Arunmozhi, Y. Venkataramani "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks" International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011, DOI: 10. 5121/ijnsa. 2011. 3312.
  5. Gaurav Kumar Gupt1, Mr. Jitendra Singh2, "Truth of D-DoS Attacks in MANET" in Global Journal of Computer science and technology,Vol. 10 Issue 15 (Ver. 1. 0) December 2010 P a g e-15.
  6. Kathole A. B, Pardakhe N. V, Kute D. S. and Patil A. S, "A review paper on comparison and analysis of different attack and intrusion detection system", International Journal of Cryptography and SecurityISSN: 2249-7013 & E-ISSN: 2249-7021, Volume 2, Issue 1, 2012, pp. -18-21.
  7. F. Anjum, D. Subhadrabandhu and S. Sarkar, "Signature based intrusion detection for wireless Ad-hoc networks," Proceedings of Vehicular Technology Conference, vol. 3, pp. 2152-2156, USA, Oct. 2003.
  8. D. E. Denning, "An Intrusion Detection Model," IEEE Transactions in Software Engineering, vol. 13, no. 2, pp. 222- 232, USA, 1987.
  9. Wei-Shen Lai, Chu-HsingLin , Jung-Chun Liu , Hsun-Chi Huang, Tsung-Che Yang," Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks", International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, pp. 61-72 (2008).
  10. Mirjana Stojanovic1, Valentina Timcenko2, SlavicaBoštjancicRakas, "Intrusion Detection against Denial of Service Attacks in Manet Environment" in XXIX Simpozijum , December 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Intrusion Detection Distributed Denial Of Service