By Topic

Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Agarwal, P. ; CS&IT Dept., Moradabad Inst. of Technol., India ; Yadav, B.S. ; Chandra, J.

MANET has been a hot research topic for quite a few years. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. Applications for MANET range from military operations and emergency disaster relief, to community networking and interaction between attendees at a meeting. The challenge of MANETs is to design dequate security schemes for these innovative networks. A challenging MANET security problem is the issue of the presence of malicious nodes; and these malicious nodes can disrupt the network traffic, choke the bandwidth, cause network congestion and consume unnecessary resources like the limited CPU processing capacity, memory and battery power of individual nodes by making byzantine type attacks. In this paper, we propose a comprehensive security scheme by which these malicious nodes can be easily detected. Here, we use our statistical mechanism that uses the statistics of the activities of the nodes and use a decentralized approach to detect these kinds of malicious nodes. Here, we also simulate our decentralized statistical analysis based intrusion detection scheme over routing protocol for detecting malicious node(s) and analyze the performance and efficiency of our algorithm over previous routing protocol.

Published in:

Networks, 2008. ICON 2008. 16th IEEE International Conference on

Date of Conference:

12-14 Dec. 2008