• DocumentCode
    678488
  • Title

    Intrusion detection system on MAC layer for attack prevention in MANET

  • Author

    Gondaliya, Tapan P. ; Singh, Monika

  • Author_Institution
    Dept. of Comput. Sci., Lovely Prof. Univ., Rajkot, India
  • fYear
    2013
  • fDate
    4-6 July 2013
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices
  • Keywords
    access protocols; mobile ad hoc networks; Ad-hoc network; MAC layer; MANET; MANET network; ad-hoc on demand distance vector protocol; attack prevention; flood affected areas; insider attacks; intrusion detection system; malicious activities; military operations; mobile ad-hoc devices; mobile ad-hoc networks; mobile devices; reactive protocols; remote area; Intrusion detection; Mobile ad hoc networks; Mobile communication; Routing; Routing protocols; Ad-hoc On Demand Distance Vector Protocol; Insider Attack; Intrusion Detection System; Mobile Ad-hoc Network; Route Reply; Route Request; Routing Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
  • Conference_Location
    Tiruchengode
  • Print_ISBN
    978-1-4799-3925-1
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2013.6726538
  • Filename
    6726538