ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The study of Intrusion Detection Techniques for Cooperation of Node

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.1, No. 11)

Publication Date:

Authors : ;

Page : 505-513

Keywords : Keywords: MANET; Watchdog; Path rater; DSR.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Since there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose punishment as well. It is very difficult to design once-for strategy may be more feasible. A secure protocol should at least include addition, it should provide a scheme to easily add new security features in the future. Due to the importance of MANET routing protocols, we focus on the detection of attacks targeted at MANET routing protocols Thi WatchDog and Pathrater approach. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A path rater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defi message through intermediate nodes until it reaches the destination

Last modified: 2014-11-15 22:34:48