A Review Paper on Intrusion Detection System in MANETs

Authors(2) :-Farhin Shaikh, Chandresh Parekh

The MANETs is one type of Ad Hoc network that is used for mobile communication. The Mobile Ad Hoc NETworks (MANETS) are used when the user is moving. Because MANET does not depend on fixed infrastructure. In MANETs Wireless networks are used to connect with different networks. surrounded by all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. The self-configuring ability of nodes in MANET absolutes it admired among essential mission applications like military use or emergency recovery. The mobility and scalability carried by wireless network ended it possible in many applications. Surrounded by all the contemporary wireless net- works Mobile Ad hoc NETwork (MANET) is one of the most significant and exclusive applications. In this review paper a qualified learns of Secure Intrusion- Detection Systems for determining malicious nodes and attacks on MANETs are presented. One of the main advantages of wireless networks is its capability to permit data communication between different parties and still maintain their mobility.

Authors and Affiliations

Farhin Shaikh
M.Tech, Raksha Shakti University, Ahmedabad, Gujarat, India
Chandresh Parekh
Assistant Professor, Raksha Shakti University, Ahmedabad, Gujarat, India

Mobile Ad Hoc NETworks, Attacks on MANETs, Intrusion Detection System

  1. D. Mudzingwa and R. Agrawal, “A study of methodologies used in intrusion detection and prevention systems (IDPS)," IEEE, pp. 1-6, March 2012.
  2. R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
  3. Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE “EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013.
  4. B. Sindhu1 M.E, Karpagam University, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks Using Enhanced Adaptive Acknowledgment”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014.
  5. S.Rajeswari, Dr. A.Ramamurthy, K.T.V Subbarao, “An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks” , International Journal of Science Engineering and Advance Technology, IJSEAT, Vol 2, Issue 12, December – 2014.
  6. Adnan Nadeem, Member, IEEE and Michael P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION.
  7. Ram Kishore Singh, Parma Nand, “Literature Review of Routing Attacksin MANET”, international Conference on Computing, Communication and Automation (ICCCA2016).
  8. Dr Sanjeev Yadav, Rachna Jain, Mohd Faisal, “Attacks in MANET”, International Journal of Latest Trends in Engineering and Technology (IJLTET), ISSN: 2278-621X, Vol. 1 Issue 3 September 2012.
  9. P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh, “ROUTING ATTACKS IN MOBILE AD HOC NETWORKS”, IJCSMC, Vol. 2, Issue. 5, May 2013, pg.360 – 367.
  10. I. Meenatchi , K. Palanivel, “Intrusion Detection System in MANETS: A Survey”, International Journal of Recent Development in Engineering and Technology, ISSN 2347 – 6435, Volume 3, Issue 4, October 2014. José Helano Matos Nogueira The International Journal of FORENSIC COMPUTER SCIENCE IJoFCS (2006) 1, 28-32.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 715-719
Manuscript Number : CSEIT11726188
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Farhin Shaikh, Chandresh Parekh, "A Review Paper on Intrusion Detection System in MANETs ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.715-719, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT11726188

Article Preview