##plugins.themes.academic_pro.article.main##

Abstract

The technology of networks is shifted to non-wired networks which are widely accepted in the recent years. Addition of components to the wireless network a varied uses in many areas and one such use is found in mobile ad hoc network (MANET).All the hosts in the network have a dual functionality of both sending and receiving messages within Transmission range. Any failure of single node in the network will not harm the network functionality, has the capacity of rebuilding itself, and therefore its finds its use in defense and many other applications. but  still there exists threat of location of nodes is not centralized .Any attack of a virus or any other threats to the network which can be self-replicating is called as an intrusion and such intrusion must be detected and also prevented .This is required in case of MANETS’S are use in various commercial applications. This intrusion detection system is named as RAMND for MANET’S with which higher security can be achieved.

Keywords— Elliptic Curve Cryptography, Mobile Ad hoc Network, Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S

##plugins.themes.academic_pro.article.details##

Author Biographies

Vittal S, GIT, Gooty, Anantapur

M.Tech Student, Dept. of CSE

B. Nagalakshm, GIT, Gooty, Anantapur

Asst. Prof, Dept. of CSE

Venkatesh .D, GIT, Gooty, Anantapur

Prof. & Dean, Dept. of CSE

How to Cite
S, V., Nagalakshm, B., & .D, V. (2014). Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S. International Journal of Emerging Trends in Science and Technology, 1(08). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/373

References

1. Djahel, S. , Nait-abdesselam, F. , Zonghua Zhang ” Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges” Communications Surveys & Tutorials, IEEE , Volume: 13 , Issue: 4,pp 658 - 672 ,2011
2. J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, 1835–1841, Apr. 2008.
3. Badie, A.M. “Responding to intrusions in mobile ad hoc networks”Inf.Syst. Security Manage., Concordia Univ. Coll. of Alberta, Internet Security(World CIS), 2013 World Congress , pp 30 – 34, 2013
4. A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wire-less Conf., 2003, pp. 75–78.
5. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence of misbehaving nodes in MANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.4
6. Sowmiya Hariharan, Jothi Precia, Suriyakala. C.D, Prayla Shyry “A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs”ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011
7. Kok-Poh Ng ; Tsimenidis, C. “Energy-balanced dynamic sorce routing protocol for wireless sensor network” Wireless Sensor (ICWISE), 2013 IEEE Conference, pp 36-41, 2013
8. Bahuguna Renu, Mandoria Hardwari lal, Tayal Pranavi “Routing Protocols in Mobile Ad-Hoc Network: A Review”, the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 115, 2013, pp 52-60
9. Boppana, R.V. , Xu Su “On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks” IEEE Trans. Mobile Comput., vol. 10, issue 8, pp 1162 - 1174 , 2011
10. A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator,” IEEETrans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010.
11. N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.
12. R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
13. A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010.