Research Journal of Applied Sciences

Year: 2015
Volume: 10
Issue: 7
Page No. 256 - 263

Identifying Intruder in Mobile Ad Hoc Network Using AIHAODV Protocol

Authors : S. Hemalatha and Paul Rodrigues

References

Anjum, F., D. Subhadrabandhu and S. Sarkar, 2003. Signature based intrusion detection for wireless Ad-Hoc networks: A comparative study of various routing protocols. Proceedings of the IEEE 58th Conference on Vehicular Technology, Oct. 6-9, Morristown, New Jersey, USA., pp: 2152-2156.

Chang, H.Y., S.F. Wu and Y.F. Jou, 2001. Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Trans. Inf. Syst. Secur., 4: 1-36.
Direct Link  |  

Gangwar, S., 2012. Mobile ad hoc network: A comprehensive study and survey on intrusion detection. Int. J. Eng. Res. Appl., 2: 607-612.
Direct Link  |  

Huang, Y. and W. Lee, 2003. A cooperative intrusion detection system for ad hoc networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, October 31, 2003, New York, USA., pp: 135-147.

Islam, M.S. and S.A. Rahman, 2011. Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches. Int. J. Adv. Sci. Technol., 36: 1-8.
Direct Link  |  

Kachirski, O. and R. Guha, 2003. Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Volume 2, January 6-9, 2003, Hawaii, USA -.

Lee, W. and S. Stolfo, 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. J., 3: 227-261.
CrossRef  |  Direct Link  |  

Marchang, N. and R. Datta, 2008. Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6: 508-523.
CrossRef  |  Direct Link  |  

Mukherjee, B., T.L. Hebedein and K.N. Levitt, 2004. Network intrusion detection. IEEE Network, 8: 26-41.
CrossRef  |  Direct Link  |  

Murthy, C.S.R. and B.S. Manoj, 2004. Ad Hoc Wireless Networks: Architectures and Protocols. Pearson Education India, New Delhi, India, ISBN-13: 9788131706886, Pages: 878.

Ning, P. and S. Jajodia, 2003. Intrusion detection techniques. Internet Encycl., 10.1002/047148296X.tie097

Pei, J., S.J. Upadhyaya, F. Farooq and V. Govindaraju, 2004. Data mining for intrusion detection: Techniques, applications and systems. Proceedings of the 20th International Conference on Data Engineering, March 30-April 2, 2004, Boston, MA., USA -.

Perkins, C.E. and E.M. Royer, 1999. Ad hoc on demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 25-26, 1999, New Orleans, LA., USA., pp: 90-100.

Rajaram, A. and D.S. Palaniswami, 2010. Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inform. Technol., 1: 77-85.
Direct Link  |  

Rajaram, M. and R. Ranjana, 2007. Detecting intrusion attacks in ADHOC networks. Asia J. Inform. Technol., 6: 758-761.
Direct Link  |  

Sharma, S. and R. Gupta, 2009. Simulation study of blackhole attack in the mobile ad hoc networks. J. Eng. Sci. Technol., 4: 243-250.
Direct Link  |  

Sun, B., K. Wu and U.W. Pooch, 2003. Zone-based intrusion detection for mobile ad hoc networks. Int. J. Ad Hoc Sensor Wireless Networks, Vol. 2, No. 3.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved