Advertisement

A Study on Intrusion Detection System of Mobile Ad-hoc Networks

  • S. SindhujaEmail author
  • R. Vadivel
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)

Abstract

Nowadays, MANET is one of the most important research topics, as the mobile users are increased every day. MANET is infrastructureless service, so it does not require any fixed infrastructure. MANET can be used for more application such as disaster management, tactical operations, and environmental monitoring, and it can provide communications in the network. In MANET, every single node acts as transmitter and also the receiver. Due to this reason, each and every node will communicate directly. The individual-configuring capability of nodes is one of the reasons to make it popular for recovery during emergency. Wireless application made it possible because of the mobility and scalability in many applications. But this flexibility has the challenged risk of security in this environment. Mobile ad hoc networks have given the low level of physical security in general. So, only the prevention mechanism is not enough to secure, thus another detection mechanism should be added. The initial line of defense for security in MANET is intrusion detection system (EDSI). It presents the challenge of designing the intrusion detection system in MANET, analyzes the existing intrusion detection techniques, and proposes further directions.

Keywords

Ad hoc networks Enhanced detection system for intrusion (EDSI) MANET Physical security 

References

  1. 1.
    Spurthi, K., Narayan Shankar, T.: A survey of intrusion detection system in manets using security algorithms. Int. J. Appl. Eng. Res. 12(24), 14408–14414. ISSN 0973-4562 (2017)Google Scholar
  2. 2.
    Rubi, A., Vairachilai, S.: A survey on intrusion detection system in mobile Adhoc networks. IJCSMC, 2(12), 389–393 (2013)Google Scholar
  3. 3.
    Kulkarni, A., Rewagad, P., Agarwal, M.: Literature survey on EDSI of MANET. Int. J. Sci. Res. Manag. (IJSRM) 3(9), 3549–3552 (2015)Google Scholar
  4. 4.
    Nadeem, A., Howarth, M.: A survey of MANET intrusion detection and prevention approaches for network layer attacks. Artic. IEEE Commun. Surv. Tutor. (2013)Google Scholar
  5. 5.
    Bhosale, R. J. Ambekar, R.K.: ASurvey on intrusion detection system for mobile Ad-hoc networks. Int. J. Comput. Sci. Inf. Technol. (IJCSIT), 5(6), 7330–7333 (2014)Google Scholar
  6. 6.
    Mandala, S., Ngadi, Md.A., Hanan Abdullah, A.: A survey on MANET intrusion detection. Int. J. Comput. Secur. 2(1), 1–11Google Scholar
  7. 7.
    Meenatchi, I., Palanivel, K.: Intrusion detection system in MANETS: a survey. Int. J. Res. Dev. Eng. Technol. www.ijrdet.vom (ISSNb2347-6433) 3(4) (2014)
  8. 8.
    Meenatchi, I., Palanivel, K.: Cross layer intrusion detection In MANET’s: a survey. Int. J. Adv. Res. Commun. Eng. Technol. (IJARCET) 4(3), 622–626 (2015)Google Scholar
  9. 9.
    Nithya Karthika, M., Raj Kumar: Survey on network based intrusion detection system in MANET. Int. J. Comput. Sci. Mob. Comput. 3(4), 660–663 (2014)Google Scholar
  10. 10.
  11. 11.
    Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. ICIMTR 2013. www.sciencedirect.com
  12. 12.
    Anand babu, G.L., Sekhar Reddy, G., Agarwal, S.: Intrusion detection techniques in mobile Ad-hoc networks. Int. J. Comput. Sci. Inf. Technol. 3(3):3867–3870 (2012)Google Scholar
  13. 13.
    Treesa Nice, P.A.: A survey on EDSI in mobile Adhoc network. Int. J. Adv. Res. Comput. Commun. Eng. 2(5), 2287–2291 (2013)Google Scholar
  14. 14.
    Muraleedharan, M.: A case study on intrusion detection technique in MANET. Int. Hournal Recent. Trends Eng. Res. (IJRTER) 03(12), (2017)Google Scholar
  15. 15.
    Mahajan, K., Singh, H.: MANET, its types, challenges, goals and approaches: a review. Int. J. Sci. Res. (IJSR) 5(5), 1591–1594 (2016)Google Scholar
  16. 16.
    Intrusion Detection: Challenges and Myths by Marcus J. RanumGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyBharathiar UniversityCoimbatoreIndia

Personalised recommendations