Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/2478
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Paryani, Sunil k. | - |
dc.date.accessioned | 2011-07-06T11:44:14Z | - |
dc.date.available | 2011-07-06T11:44:14Z | - |
dc.date.issued | 2011-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/2478 | - |
dc.description.abstract | An intrusion detection mechanism that uses collaborative e orts of the nodes in a neighbourhood to detect aberrant behaviour in a mobile ad hoc network. A node showing this kind of behaviour is termed as a malicious node. The technique is de- signed for detection of malicious nodes in a neighbourhood in which each pair of nodes are within radio range of each other. Such a neighbourhood of nodes is known as a clique. This technique uses message passing between the nodes.The procedure for monitor node election is invoked and is aimed to reduce the computation and com- munication costs. The monitor node, operating in dual power mode, connects the clusters which help in routing messages from a node to any other node. The monitor node initiates the detection process. The monitor node sends data packets to two other nodes, called target nodes, through the node which has to be tested for mali- cious behaviour. The monitor node then requests each of these two nodes to return back the data packets that have been sent to them by the node under consideration. The monitor node compares this data with the one it had sent out. Based on this, the monitor determines which of the nodes are secure and which of them are suspicious. Finally, the monitor node, with the help of secure nodes, separates malicious nodes from the suspicious nodes. This technique is aimed to reduce the computation and communication costs to se- lect a monitor node and reduces the message passing between the nodes to detect a malicious node from the cluster hence there very less traffic and less chances of a collision. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 08MCES59 | en_US |
dc.subject | Split | en_US |
dc.subject | Split 2008 | en_US |
dc.subject | CE Split | en_US |
dc.subject | CE Split 2008 | en_US |
dc.subject | Computer 2008 | - |
dc.subject | Project Report 2008 | - |
dc.subject | Computer Project Report | - |
dc.subject | Project Report | - |
dc.subject | 08MCES | - |
dc.subject | 08MCES59 | - |
dc.title | Collaborative Anomaly-based Intrusion Detection in Mobile Ad Hoc Networks | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
08MCES59.pdf | 08MCES59 | 1.16 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.