9,678 research outputs found

    Security in Ad hoc Network through Intrusion Detection Techniques

    Get PDF
    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile wireless networks, ad hoc networks do not depend on any fixed infrastructure. Rather, hosts depend on one another to keep the network associated. Security is the main concern in ad-hoc networks. Owe to the vulnerable nature of the mobile ad hoc network, there are various security threats that upset its improvement. There examine the fundamental vulnerabilities in the mobile ad hoc networks, which have made it a lot simpler to experience the effects of attacks than the conventional wired system. At that point examine the security criteria of the mobile ad hoc network and present the primary attack types that exist in it. At long last study the present security solutions through Intrusion Detection Technique for the mobile ad hoc network. There are two technique cluster based Intrusion Detection Technique for the mobile ad hoc network and misbehaviour Detection through Cross-layer Analysis are described

    Real valued negative selection for anomaly detection in wireless ad hoc networks

    Get PDF
    Wireless ad hoc network is one of the network technologies that have gained lots of attention from computer scientists for the future telecommunication applications. However it has inherits the major vulnerabilities from its ancestor (i.e., the fixed wired networks) but cannot inherit all the conventional intrusion detection capabilities due to its features and characteristics. Wireless ad hoc network has the potential to become the de facto standard for future wireless networking because of its open medium and dynamic features. Non-infrastructure network such as wireless ad hoc networks are expected to become an important part of 4G architecture in the future. In this paper, we study the use of an Artificial Immune System (AIS) as anomaly detector in a wireless ad hoc network. The main goal of our research is to build a system that can learn and detect new and unknown attacks. To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network

    Distributed Hierarchical IDS For MANET Over AODV+.

    Get PDF
    In this paper, we introduce background knowledge of wireless ad hoc networking mobile ad hoc network (MANET) as well as intrusion detection system (IDS) and mobile agents. This research study surveys, studies and compares the existing intrusion detection based on mobile agent for mobile ad hoc networks. Based on our best knowledge from previous researches we design distributed hierarchical /D^S inclusive of network-based and host-based intrusion detection system with due consideration to their characteristics on ad hoc on4emand distance vector routing protocol (AODV+)

    Challenges of Misbehavior Detection in Industrial Wireless Networks

    Get PDF
    In recent years, wireless technologies are increasingly adopted in many application domains that were either unconnected before or exclusively used cable networks. This paradigm shift towards - often ad-hoc - wireless communication has led to significant benefits in terms of flexibility and mobility. Alongside with these benefits, however, arise new attack vectors, which cannot be mitigated by traditional security measures. Hence, mechanisms that are orthogonal to cryptographic security techniques are necessary in order to detect adversaries. In traditional networks, such mechanisms are subsumed under the term "intrusion detection system" and many proposals have been implemented for different application domains. More recently, the term "misbehavior detection" has been coined to encompass detection mechanisms especially for attacks in wireless networks. In this paper, we use industrial wireless networks as an exemplary application domain to discuss new directions and future challenges in detecting insider attacks. To that end, we review existing work on intrusion detection in mobile ad-hoc networks. We focus on physical-layer-based detection mechanisms as these are a particularly interesting research direction that had not been reasonable before widespread use of wireless technology.Peer Reviewe
    corecore