Malicious node identification using quantitative intrusion detection techniques in MANET

被引:0
|
作者
M. Arul Selvan
S. Selvakumar
机构
[1] Bharath Institute of Higher Education and Research,Department of Computer Science & Engineering
[2] G.K.M. College of Engineering & Technology,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
MANET; Malicious nodes; Intrusion; Proliferation;
D O I
暂无
中图分类号
学科分类号
摘要
Due to rapid proliferation of WSN, the application of wireless devices or nodes and usage of mobile computing devices changed the shape of network security. One of the field which need the most security is Mobile Ad hoc Network (MANET). The term ad hoc itself ensures that there is no central entity in order to govern the nodes. The issue of security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. The traditional method of firewall and encryption is not sufficient to protect the network. Therefore an intrusion detection system must be added to the mobile ad hoc network. One of the different kinds of misbehavior a node may exhibit is selfishness. A indiscipline or selfish or node wants to protect own resources when using the services of others and consuming their resources. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we de-scribe different method for detecting indiscipline or malicious nodes in mobile ad hoc network.
引用
收藏
页码:7069 / 7077
页数:8
相关论文
共 50 条
  • [1] Malicious node identification using quantitative intrusion detection techniques in MANET
    Selvan, M. Arul
    Selvakumar, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7069 - S7077
  • [2] Identification and eradication of malicious node in MANET
    Gayathri, V.M.
    Nedunchelian, R.
    [J]. International Journal of Networking and Virtual Organisations, 2019, 21 (03) : 351 - 362
  • [3] Detection and avoidance of malicious node in MANET
    Patel, Kajal S.
    Shah, J. S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [4] ZIDS: Zonal-based Intrusion Detection System for Studying the Malicious Node Behaviour in MANET
    Sangeetha, V
    Kumar, S. Swapna
    [J]. 2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 276 - 281
  • [5] A Survey on Intrusion Detection Techniques in MANET
    20163702795437
    [J]. (1) Department of Computer Science and Engineering, University Institute of Technology, Bhopal, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [6] A Survey on Intrusion Detection Techniques in MANET
    Soni, Mohit
    Ahirwar, Manish
    Agrawal, Shikha
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1027 - 1032
  • [7] INTRUSION DETECTION SYSTEM TO DETECT MALICIOUS MISBEHAVIOUR NODES IN MANET
    Vijay, M.
    Sujatha, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [8] Performance analysis of malicious node detection in MANET using ANFIS classification approach
    A. Kumaravel
    M. Chandrasekaran
    [J]. Cluster Computing, 2019, 22 : 13445 - 13452
  • [9] Performance analysis of malicious node detection in MANET using ANFIS classification approach
    Kumaravel, A.
    Chandrasekaran, M.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13445 - 13452
  • [10] A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System
    Tamilarasan, S.
    Aramudan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 258 - 264