(18.97.9.173)
[ij] [ij] [ij] 
Email id
 

JIMS8I International Journal of Information Communication and Computing Technology
Year : 2024, Volume : 12, Issue : 1
First page : ( 710) Last page : ( 722)
Online ISSN : 2347-7202.
Article DOI : 10.5958/2347-7202.2024.00002.1

Methodology of intrusion detection of network layer attack for MANET

Verma Vanita*, Jha Vijay Kumar**

Department of Computer Science, Birla Institute of Technology, Mesra, Ranchi-835215, India

*Email id: vanitaaa.12@gmail.com

**vkjha@bitmesra.ac.inCopyright

Online published on 20 August, 2024.

Abstract

MANET (Mobile ad-hoc network) is an assembly of nodes which are movable, limited energy, self-routing proficient and handling the nodes without any centralized authority. Since its network topology (Security and obstruction) is not certain hence various challenges are faced by MANETs. Because of the MANET’s battery constraint, extending the lifetime of MANET is of utmost priority. Due to dynamic topology and mobility of the nodes MANETs are very much vulnerable to several kinds of attacks like eavesdropping, modification of packets, routing, etc. and MANET’s security under these circumstances is quite challenging. In this paper we have briefly discussed about MANET, types of MANET, attack categorization in MANET, Literature review on some network layer attacks briefly discussed about vampire attack and lastly proposed an algorithm for detection and prevention of any network layer attack in MANET with flow chart and highlighting some of the open research areas for MANETs.

Top

Keywords

WSN, MANET, Vampire attack, Network layer attack, Encapsulated transaction, OTP.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
852,317,535 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.