[go: up one dir, main page]

Nayyar, 2013 - Google Patents

Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS

Nayyar, 2013

View PDF
Document ID
15311044029534268886
Author
Nayyar A
Publication year
Publication venue
International Journal of Computer Science and Mobile Computing

External Links

Snippet

Mobile Ad hoc network (MANET) is a kind of wireless network which has no infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes. Due to unique characteristic of MANETs, it creates a …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • H04W40/14Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information

Similar Documents

Publication Publication Date Title
Nakayama et al. A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks
Liu et al. A dynamic trust model for mobile ad hoc networks
Yamini et al. Improving routing disruption attack detection in MANETs using efficient trust establishment
Kumar et al. An empirical critique of on-demand routing protocols against rushing attack in MANET
Arul Selvan et al. Malicious node identification using quantitative intrusion detection techniques in MANET
Kousar et al. A Secure Data Dissemination in a DHT‐Based Routing Paradigm for Wireless Ad Hoc Network
Upadhyay et al. Avoiding Wormhole attack in MANET using statistical analysis approach
Vijayakumar et al. Study on reliable and secure routing protocols on manet
Kolade et al. Performance analysis of black hole attack in MANET
Panos et al. A novel intrusion detection system for MANETs
Sumit et al. Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
CN106412888B (en) Appearance based on performance feedback invades method for routing
Nayyar Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS
Veerasamy et al. Angle and context free grammar based precarious node detection and secure data transmission in MANETs
Kasiran et al. Throughput performance analysis of the wormhole and sybil attack in AODV
Kurosawa et al. A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks
Chandan et al. Performance analysis of AODV under black hole attack
Vadhana Kumari et al. RTO‐TV: Routed Tree Optimization and Trust‐Value‐Based Security Scheme to Prevent Black Hole Attack in MANET
Fujita et al. An effective ids against routing attacks on mobile ad-hoc networks
Yadav et al. An authenticated enrolment scheme of nodes using blockchain and prevention of collaborative blackhole attack in WSN
Mobinunnisa et al. Detection of multiple malicious nodes in MANETS in a single query
Roy et al. BHIDS: a new, cluster based algorithm for black hole IDS
Sangeetha et al. Detection of malicious node in mobile ad-hoc network
Reddy et al. An effective analysis on intrusion detection systems in wireless mesh networks
Roy et al. Prevention against internal attack via trust-based detection for wireless mesh networks