Detecting and Responding to Malicious Misbehavior in MANETs
1968 Words8 Pages
Owing to the developed technology and cheap prices, wireless networks have increased more preferences over wired networks in the previous few decades.Mobile Ad hoc Network (MANET) is agroup of mobile nodes armed with both a wirelesstransmitter and a receiver that connect with each othervia bidirectional wireless links either directly or indirectly.One of themajor benefits of wireless networks is it allows data to be communicated between different parties and still maintaintheir movement. The main factor in this type of communication is range of transmitters.That is the node which is outside the range of one node cannot communicate with the other node which is outside its range.This difficulty in MANET is resolved by letting the nodes which are in between to relay transmissions.To achieve this MANET is divided into two types of networks like single hop network and multihop network. In a single-hop network, all nodes inside the sameradio range communicate directly with each other. But, in a multi-hop network, nodes depend on other nodes which are in between the path to transmit if the destination node is out of their radiorange.MANET has a distributed network organizationall nodes are free to movearbitrarily. MANET ready to be used in spareconditions wherean infrastructure is unobtainable or impracticable to mount in situationslike normal or human-induced tragedies, armedbattles,and medicinalsparecircumstances.Considering the fact that MANET is commonamong serious task applications, network security is ofdynamic significance.The exposed medium and distantspreading of MANET make it susceptible to numerous types ofattacks. It is vital to develop an intrusion-detection system (IDS)
A.CLASSIFICATION OF IDS
1) REAL TIME ...
... middle of paper ...
...h,” IEEE Trans. Ind.Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
 A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, “Securerouting and intrusion detection in ad hoc networks,” in Proc. 3rd Int. Conf.PervasiveComput. Commun., 2005, pp. 191–199.
 N. Nasser and Y. Chen, “Enhanced intrusion detection systems for discoveringmalicious nodes in mobile ad hoc network,” in Proc. IEEE Int.Conf.Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.
 L. Zhou and Z. Haas, “Securing ad-hoc networks,” IEEE Netw., vol. 13,no. 6, pp. 24–30, Nov./Dec. 1999.
 A. Patcha and A. Mishra, “Collaborative security architecture for blackhole attack prevention in mobile ad hoc networks,” in Proc. Radio WirelessConf., 2003, pp. 75–78.
 M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” in Proc.ACM Workshop Wireless Secur., 2002, pp. 1–10.