earticle

논문검색

AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS

초록

영어

Networks are protected using many firewalls and encryption software’s. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for Intrusion Detection and Response Systems, for Ad hoc networks. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability, to mobile users. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We propose an mIDS (Mobile Intrusion Detection System) suitable for multi-hop ad-hoc wireless networks, which detects nodes misbehavior, anomalies in packet forwarding, such as intermediate nodes dropping or delaying packets. mIDS does rely on overhearing packet transmissions of neighboring nodes. Simple rules are designed to identify the misbehavior nodes. A special node called a monitor node carries out the process of identifying the misbehavior node.

목차

Abstract
 1. Introduction
 2. Challenges
 3. mIDS Attack
  3.1.1 Unfair use of the transmission channel (ATTACK1)
  3.1.2. Anomalies in packet forwarding (ATTACK2)
 4. Intrusion detection methods and related work.
  4.1 Detection methods.
  4.2. Detecting attack1
  4.3 Detecting attack2.
  4.4. Detecting attack2b
 5. Monitor identification method.
  5.1 Monitor Election Protocol
 6. Reactions .
  6.1. Responding to attack1
  6.2 Responding to attack2.
 7. Conclusion .
 8. References

저자정보

  • S.Madhavi Research Scholar, Dept of Computer, Science & Engineering, Acharya Nagarjuna University, India.
  • Tai Hoon Kim Professor , Dept. of Multimedia, Hannam University, Korea.

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.