Academic Journals Database
Disseminating quality controlled scientific knowledge

Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach

ADD TO MY LIST
 
Author(s): Nisha Dang | Pooja Mittal

Journal: International Journal of Computer Science and Management Studies
ISSN 2231-5268

Volume: 12;
Start page: 36;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: IDS | MANET | Detection Systems.

ABSTRACT
Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. To secure Manets many traditional security solutions like encryption are used but not find to be promising. Intrusion detection system is one of the technologies that provide some goodsecurity solutions. IDS provide monitoring and auditing capabilities to detect any abnormality in security of the system. IDS can be used with clustering algorithms to protect entire cluster from malicious code. Existing clustering algorithms have a drawback of consuming more power and they are associated with routes. The routeestablishment and route renewal affects the clusters and asa consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore IDS cannot be run on all the nodes. A trusted monitoring node can be deployed to detect and respond against intrusions in time. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes inthe network.

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions