International Research Journal of Commerce , Arts and Science

 ( Online- ISSN 2319 - 9202 )     New DOI : 10.32804/CASIRJ

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 5    Submit Your Rating     Cite This   Download        Certificate

CONFIDANT INTRUSION DETECTION SYSTEM IN MANETS: PROTOCOL AND ISSUES

    2 Author(s):  PREETI SOLANKI , DR.DEEPAK DHULL

Vol -  5, Issue- 2 ,         Page(s) : 448 - 452  (2014 ) DOI : https://doi.org/10.32804/CASIRJ

Abstract

Confidant intrusion detection systems are the most preferable intrusion detection system in MANETs. This protocol resolves the watchdog and Pathrater problem that it does punish misbehaving nodes by not using them in routing and not forwarding packets through them. Although importance of this mechanism is clear, it has some issues related to false reports. In this work we demonstrate that an extra effort must be done to solve drawbacks that are still present when using them in MANET.

order online

  1. Kejun lin, Jing Deng. Member, IEEE, Pramod K .Varshney, fellow, IEEE, and Kashyap Balakrishnan, member IEEE, “an acknowledgment-based approach for the detection of routing misbehavior in MANETs”, IEEE transactions on mobile computing , vol.6 no.5,may 2007
  2. S.Buchegger and J-Y Le Boudee “Performance analysis of the CONFIDANT Protocol : cooperation of nodes, fairness in dynamic ad- hoc networks,” Proc. Mobile loc , jun 2002 
  3. S. Bansal and M.Baker, “observation ,based cooperation enforcement in ad hoc networks, “Research Report cs. NI 10307012, Stanford University 2003.
  4. S.Marti,T.J. Giuli, K. Lai and M.Baker “Mitigating routing misbehavior in mobile ad hoc networks, “ in proc. 6th annual int. conf. on mobile computing and networking (mobicom’00),Boston, MA august 2000,pp.255-265
  5. USC/ISI UC Berkeley, LBL and Xerox PARC researchers, network simulator. Ns (version 2). Available at http ://www.isi.edu/nsnam/ns/,1998
  6. Zan Kai Chong1, Moh Lim Sim1, Hong Tat Ewe 2, and Su Wei Tan,” Separation of Detection authorities (SDA) approach for misbehavior detection in wireless AD Hoc network, “PIERS ONLINE, vol 4,no.8,2008.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details