A Survey on Acknowledgment-Based IDS in Mobile Ad hoc Network (MANET)?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Y.Gowsika; R.Pugazendi;
Page : 404-410
Keywords : Mobile Ad hoc Network (MANET); Intrusion Detection System (IDS); Enhanced Adaptive ACKnowledgement (EAACK) and malicious or misbehaving nodes;
Abstract
The progress to wireless network beginning with wired network has been a universal development model in the past years. The capability to move one place to another and adopt the infinite number of nodes brought by wireless network prepared it feasible in many applications. Between all the modern wireless networks, MANET is one of the main significant and unique applications. On the different to traditional network design, MANET does not engage a predetermined network framework; each single node works as uniformly a transmitter and a receiver. Nodes communicate straight with each other when they are both within the related communication range or else, they depend on their neighbours to broadcast the messages. The self-configuring capability of nodes in the MANET through it admired between important mission applications related to military utilize and emergency recovery. They are generally formed in the conditions of emergency and non-permanent operations or basically if there are no resources to set up involved networks. The results for traditional networks are usually not sufficient to offer efficient Ad-hoc operations. Both the infrastructure less network and disseminated nature lead the Mobile ad hoc network defenceless to malicious attackers. In this situation it is important to build up efficient intrusion detection processes to preserve MANET from attacks. Different level of security problems are raised by the wireless environment of communication and requirement of any security infrastructure. This manuscript aims of the relative learning of intrusion detection system known as Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. The most important aim has been situated on study of EAACK method and its restriction.
Other Latest Articles
- Survey on Dynamic Resource Allocation Techniques in Cloud Environment?
- Secured Access Control Driven Pay per Usage and Logging of Cloud Resources
- A CASE OF ACUTE INTESTINAL OBSTRUCTION FOLLOWING INGESTION OF UNUSUAL FOREIGN BODY : A CASE REPORT
- SPONTANEOUS RUPTURE OF SPLEEN: A RARE CASE REPORT
- GIANT FIBROADENOMA OF BREAST: A CASE REPORT
Last modified: 2014-08-24 02:48:41