Cart (Loading....) | Create Account
Close category search window
 

Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Agarwal, P. ; CS&IT Dept., Moradabad Inst. of Technol., India ; Yadav, B.S. ; Chandra, J.

MANET has been a hot research topic for quite a few years. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. Applications for MANET range from military operations and emergency disaster relief, to community networking and interaction between attendees at a meeting. The challenge of MANETs is to design dequate security schemes for these innovative networks. A challenging MANET security problem is the issue of the presence of malicious nodes; and these malicious nodes can disrupt the network traffic, choke the bandwidth, cause network congestion and consume unnecessary resources like the limited CPU processing capacity, memory and battery power of individual nodes by making byzantine type attacks. In this paper, we propose a comprehensive security scheme by which these malicious nodes can be easily detected. Here, we use our statistical mechanism that uses the statistics of the activities of the nodes and use a decentralized approach to detect these kinds of malicious nodes. Here, we also simulate our decentralized statistical analysis based intrusion detection scheme over routing protocol for detecting malicious node(s) and analyze the performance and efficiency of our algorithm over previous routing protocol.

Published in:

Networks, 2008. ICON 2008. 16th IEEE International Conference on

Date of Conference:

12-14 Dec. 2008

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.