A State of an Art Survey of detect malicious nodes in MANET’s

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 898

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

BPJ02_155

تاریخ نمایه سازی: 11 آبان 1395

چکیده مقاله:

The dynamic nature of ad hoc networks presents many security challenges. Secure routing is a promising area for achieving better security for the network by protecting the routing protocols against malicious attacks. Several secure routing protocols have been proposed in the literatures that were successful in avoiding and preventing some types of security attacks in MANETs. However, MANETs are still vulnerable to other types of attacks. Hence, there is a need for introducing an efficient mechanism to detect malicious nodes. Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme. Therefore it is necessary to understand how malicious nodes can attack the MANETs. In this paper we have studied on a variety of detection malicious nodes algorithms and we have described the performance of each individual in details. Each of these algorithms have some advantages and disadvantages that we have addresses them. Then, we have shown their effect on detection time, detection rate and overhead in the network.

کلیدواژه ها:

نویسندگان

Hasan nabat

Department of Computer Engineering, tabriz Branch, Islamic Azad University, tabriz, Iran

naser nazeri asfestani

Department of Computer Engineering, tabriz Branch, Islamic Azad University, tabriz, Iran

reza karimdoost

Department of Computer Engineering, tabriz Branch, Islamic Azad University, tabriz, Iran

seyyed meisam rozekhani

Department of Computer Engineering, tabriz Branch, Islamic Azad University, tabriz, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Gowsiga, S. and M ana valasundaram, V. An Efficient and ...
  • Systems and C ommunication Technology, 2010 ...
  • Hu, Y., Johnson, D. and Maltz, D. The Dynamic Source ...
  • Belding-Royer, E., Das, S., and Perkins, C. Ad hoc on- ...
  • Kravets, R., Naldurg, P. and Yi, S. Security-aware Ad Hoc ...
  • (MobiHOC01), Long Beach, CA, 2001. ...
  • Batra, S., Goyal, P. and Singh, A. A Literature Review ...
  • 36/49, PP.202-207 _ VOL.12, Number S1, July 2007. ...
  • Johnson DB, Moltz DA, Brach J, ، The dynamic Source ...
  • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, ...
  • N. Marchang , R. Datta, "Collaborative techniques for intrusion detection ...
  • Y. Huang, W. Lee, _ cooperative intrusion detection system for ...
  • C.-Y. Tseng, P. Balasu bramanyam, C. Ko, R. Li mprasittiporn, ...
  • Commu nications Security , PP. 125-134, 2003 ...
  • Ad-hoc Networks, International Journal of Computer Applications, 11-15, 2010. ...
  • onvergence Technology, 131-140, 2006. ...
  • Haas, Z. and Zhou, L. Securing Ad Hoc Networks, IEEE ...
  • P. Michiardi and R. Molva, "Simulation- based analysis of security ...
  • D. Spiewak, T. Engel, and V. Fusenig, a threat model ...
  • Engineering Academy and Society (WSEAS), pp. 3540, 2006. ...
  • M. Just, E. Kranakis, and T. Wan, "Resisting malicious packet ...
  • A. Abdalla _ I. Saroit, "Misbehavior Nodes Detection and Isolation ...
  • C. Adjih, Th. Clausen, Ph. Jacquet, A. Laouiti, P. Muhlethaler, ...
  • G. Jianli, L. Hongwei, ،HEAD: A Hybrid Mechanism to Enforce ...
  • نمایش کامل مراجع