FRAMEWORK OF SECURE WIRELESS NETWORK
1
Author(s):
KHUSHBU KALRA
Vol - 6, Issue- 4 ,
Page(s) : 119 - 123
(2015 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Ad-hoc network is a basically a collection of multiple mobile nodes which are capable of forming dynamically a temporary network without any centralized fixed infrastructure’s support. Data exchange take place in between these mobile nodes of the network. Hence, all participating nodes in data transmission should be co-operative nodes to ensure that the data transmission process does not fail. Data transmission process fails due to many different types of attacks which can take place at any intermediate node and convert it into malicious node.
- Zhang,Y; and Lee, W.(2000). Intrusion Detection in wireless Ad hoc networks.Proceedings of the 6th Annual International Conference on mobile computing and networking, 275-283).
- K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc communications
- in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323, 2004.
- G.jayakumar and G. Gopinath, “ModerAd hoc mobile wireless networks routing protocol—A review,” J.comput. Sci, , vol. 3,no. 8, pp.574-582, 2007.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in proc. 6th Annu.int. conf. Mobile Comput. Netw., Boston, MA,2000, pp. 255-265.
- B.Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX,2004.
- A. Tabesh and L.G.Frechette,”A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840-849, Mar.2010.
- K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgement-based approach for the detection of routing misbehavior in MANETs.” . IEEE Trans. Mobile Comput.,vol. 6, no. 4, pp. 536-550, May 2007.
- T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video
- transmission enhancement in presence of misbehaving nodes in MANETs,”
- Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
- R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network
- Security,” in Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012, pp. 659–666.
- IEEE Transactions on industrial electronic, VOL. 60, NO. 3, MARCH 2013
- J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection
- and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf.
- Perform., Comput., Commun., 2004, pp. 747–752.
|