Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Optimal Combined Intrusion Detection and Continuous Authentication in High Security Mobile Adhoc Network


Affiliations
1 SKR Engg. College, Chennai, T.N, India
2 Dept. of CSE, SKR Engg. College, Chennai, T.N, India
     

   Subscribe/Renew Journal


Wireless sensor network consisting of a large number of small sensors is effective for gathering various data (physical phenomena) in a variety of environments. The measured data from WSN can be sending to the MANET through sensor node. This project implements the security in MANET using authentications scheme such as password, various biomedical authentications, etc.
The physical data can be captured by sensor node and that is validating to the server in the network, this can be done by routing. The physical data (Packet) can be sent to the mobile ad hoc networks from sensor node by using routing of wireless data. In recent years, mobile ad hoc networks (MANETs) have become a popular research subject due to their self-configuration and self-maintenance capabilities. Wireless nodes can establish a dynamic network without the need of a fixed infrastructure. This type of network is very useful in tactical operations where there is no communication infrastructure. However, security is a major concern for providing trusted communications in a potentially hostile environment. This concern is mainly due to the peer-to-peer architecture in MANETs, system resource constraints, shared wireless medium, and highly dynamic network topology. Two complementary classes of approaches exist to protect high security MANETs, prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection.

Keywords

Mobile Ad Hoc Networks, Intrusion Detection, Passive Monitoring, False Positives, Analytical Models, Noise Modeling.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 142

PDF Views: 2




  • Optimal Combined Intrusion Detection and Continuous Authentication in High Security Mobile Adhoc Network

Abstract Views: 142  |  PDF Views: 2

Authors

S. Muthumariammal
SKR Engg. College, Chennai, T.N, India
S. Muthumariappan
Dept. of CSE, SKR Engg. College, Chennai, T.N, India

Abstract


Wireless sensor network consisting of a large number of small sensors is effective for gathering various data (physical phenomena) in a variety of environments. The measured data from WSN can be sending to the MANET through sensor node. This project implements the security in MANET using authentications scheme such as password, various biomedical authentications, etc.
The physical data can be captured by sensor node and that is validating to the server in the network, this can be done by routing. The physical data (Packet) can be sent to the mobile ad hoc networks from sensor node by using routing of wireless data. In recent years, mobile ad hoc networks (MANETs) have become a popular research subject due to their self-configuration and self-maintenance capabilities. Wireless nodes can establish a dynamic network without the need of a fixed infrastructure. This type of network is very useful in tactical operations where there is no communication infrastructure. However, security is a major concern for providing trusted communications in a potentially hostile environment. This concern is mainly due to the peer-to-peer architecture in MANETs, system resource constraints, shared wireless medium, and highly dynamic network topology. Two complementary classes of approaches exist to protect high security MANETs, prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection.

Keywords


Mobile Ad Hoc Networks, Intrusion Detection, Passive Monitoring, False Positives, Analytical Models, Noise Modeling.