An Improved Intrusion Detection Technique for Mobile Adhoc Networks | SpringerLink
Skip to main content

An Improved Intrusion Detection Technique for Mobile Adhoc Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3816))

  • 881 Accesses

Abstract

In this paper, we propose a Distributed Intrusion Detection System to protect Mobile Adhoc Networks from intruder-induced attacks. The highly dynamic, decentralized nature of these networks and a lack of infrastructure means that these networks are exposed to various kinds of security threats like spoofing, DOS attacks etc. We propose a new procedure to circumvent the intruder node and a technique to detect the intruder node in a co-operative manner based on the history of the failed paths due to intrusion. The experimental setup and the obtained results are presented discussing the various performance and security issues in the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Prasanna, S., Vetriselvi, V. (2005). An Improved Intrusion Detection Technique for Mobile Adhoc Networks. In: Chakraborty, G. (eds) Distributed Computing and Internet Technology. ICDCIT 2005. Lecture Notes in Computer Science, vol 3816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604655_42

Download citation

  • DOI: https://doi.org/10.1007/11604655_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30999-4

  • Online ISBN: 978-3-540-32429-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics