Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review

Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Emerging Science and Engineering Vol. 10; no. 6; pp. 1 - 3
Main Authors Khan, Imran, Gite, Dr. Pratik
Format Journal Article
LanguageEnglish
Published 30.05.2022
Online AccessGet full text
ISSN2319-6378
2319-6378
DOI10.35940/ijese.D2527.0510622

Cover

Loading…
Abstract Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective network intrusion detection system (NIDS) must be installed and maintained. A system's data should be protected against access by anyone without authorization. Structures that have interruption detection procedures may be able to estimate future interrupts as well as current interruptions with a high degree of accuracy. There have been artificial intelligence approaches for organizing interruption locations for more than two decades, and there are numerous approaches. A reliable interruption detection system will probably remain a subject of debate for some time. The number of digital assaults and the volume of system information continue to grow at an alarming rate, forcing companies to devise better methods for keeping their systems and information secure.
AbstractList Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective network intrusion detection system (NIDS) must be installed and maintained. A system's data should be protected against access by anyone without authorization. Structures that have interruption detection procedures may be able to estimate future interrupts as well as current interruptions with a high degree of accuracy. There have been artificial intelligence approaches for organizing interruption locations for more than two decades, and there are numerous approaches. A reliable interruption detection system will probably remain a subject of debate for some time. The number of digital assaults and the volume of system information continue to grow at an alarming rate, forcing companies to devise better methods for keeping their systems and information secure.
Author Gite, Dr. Pratik
Khan, Imran
Author_xml – sequence: 1
  givenname: Imran
  surname: Khan
  fullname: Khan, Imran
– sequence: 2
  givenname: Dr. Pratik
  surname: Gite
  fullname: Gite, Dr. Pratik
BookMark eNp9kM1KAzEUhYNUsNa-gYu8wNTk5m_iQiitf9BWEF0PmfRGo-NEJqPFt7fULsSFq3sW9zsHvmMyaFOLhJxyNhHKSnYWXzDjZA4KzIQpzjTAARmC4LbQwpSDX_mIjHOO9fbLGlECDMnFHHv0fWyf6NI10cf0kekqrTHT2NJlqmODdLqmz8nTFfab1L1mWtApvcfPiJsTchhck3G8vyPyeHX5MLspFnfXt7PpovBcAhQhBKO3m2WtnbGAdShFyVEZK2pwci2g5MwpHqxTQXvNtFQBg7QAzAtpxIic__T6LuXcYah87F0fU9t3LjYVZ9VORrWTUe1kVHsZW1j-gd-7-Oa6r_-xb_ieZH0
CitedBy_id crossref_primary_10_54105_ijdcn_B5034_03040623
Cites_doi 10.17576/apjitm-2019-0802-01
10.17485/ijst/2014/v7i4.10
10.1016/j.procs.2016.03.092
10.1016/j.protcy.2013.12.391
10.1016/S1570-8705(03)00008-8
10.5120/19195-0809
ContentType Journal Article
CorporateAuthor Associate Professor, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India
Research Scholar, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India
CorporateAuthor_xml – name: Research Scholar, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India
– name: Associate Professor, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India
DBID AAYXX
CITATION
DOI 10.35940/ijese.D2527.0510622
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2319-6378
EndPage 3
ExternalDocumentID 10_35940_ijese_D2527_0510622
GroupedDBID AAYXX
CITATION
M~E
ID FETCH-LOGICAL-c1422-fff761978b6a792ebf8381e5793b2a4d32810a51f9a5f6c60645fef49220c3473
ISSN 2319-6378
IngestDate Tue Jul 01 04:28:39 EDT 2025
Thu Apr 24 22:58:25 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 6
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1422-fff761978b6a792ebf8381e5793b2a4d32810a51f9a5f6c60645fef49220c3473
OpenAccessLink https://doi.org/10.35940/ijese.d2527.0510622
PageCount 3
ParticipantIDs crossref_citationtrail_10_35940_ijese_D2527_0510622
crossref_primary_10_35940_ijese_D2527_0510622
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-05-30
PublicationDateYYYYMMDD 2022-05-30
PublicationDate_xml – month: 05
  year: 2022
  text: 2022-05-30
  day: 30
PublicationDecade 2020
PublicationTitle International Journal of Emerging Science and Engineering
PublicationYear 2022
References ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref10
ref0
ref2
ref1
References_xml – ident: ref1
– ident: ref0
  doi: 10.17576/apjitm-2019-0802-01
– ident: ref4
  doi: 10.17485/ijst/2014/v7i4.10
– ident: ref6
– ident: ref8
  doi: 10.1016/j.procs.2016.03.092
– ident: ref7
– ident: ref9
– ident: ref2
  doi: 10.1016/j.protcy.2013.12.391
– ident: ref5
  doi: 10.1016/S1570-8705(03)00008-8
– ident: ref10
– ident: ref3
  doi: 10.5120/19195-0809
SSID ssib051973822
Score 2.1844606
Snippet Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard...
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 1
Title Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELZYuHBZgQDB8pAP3Cp3EzuJmwtSRHlK7QkkblEc26Kw26K2XDjw25lxHnVXFYK9RJGVjOLMl8m8h5DTUlrFI62Y4gKbaocpAztEMC2DVFoZJzLE2uHBMLm-j24fYi_Q7qpL5qpbvq2sK_kfrsIa8BWrZL_B2ZYoLMA58BeOwGE4fonHfYMhADT2B6BOly6ddTjRLscKvlYFX3wn053HSYmFvZiCNeuwTuYHBJ4WmezLjsFaS0WnlZtj1AgBdLR7TQxbgf1YeVJv_k4XeLuqh-_1p11sjDQfPftOBrBPMT4eLGQRx1qnRFTTdrpmxVojTAMPNL5kDL1frFglu0WcRpjtOHoyM9Pt85hjT1WwWKu65eVW2f_8wtrEQjBpHJ3cUckdlbym8oNscLAlcL7H4P2iETpYuCt6LtrUbqgqsXSEfq94HE-F8XSRuy3ys2YPzSpEbJM1M94hZy0aaIsG6tBAR2NaoYFmmgIaaIMGymhGKzTskvvLi7vza1ZPx2Al-u2YtRZdULKnkkKm3CjbA-3LxCBwFS8iLXgvDIo4tGkR26RMsDGhNTZKOQ9KEUmxR9bHk7HZJ9Rqm0itQmNBWeE6LLgVSSxQNwV5H5oDIpoN52XdOh4nmPzJP3vfB4S1d71UrVM-vf7XN68_JJsLqB6R9fn01RyDhjhXJ47DH_bUYBg
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Malicious+Nodes+in+Mobile+Ad+hoc+Networks+-+A+Review&rft.jtitle=International+Journal+of+Emerging+Science+and+Engineering&rft.au=Khan%2C+Imran&rft.au=Gite%2C+Dr.+Pratik&rft.date=2022-05-30&rft.issn=2319-6378&rft.eissn=2319-6378&rft.volume=10&rft.issue=6&rft.spage=1&rft.epage=3&rft_id=info:doi/10.35940%2Fijese.D2527.0510622&rft.externalDBID=n%2Fa&rft.externalDocID=10_35940_ijese_D2527_0510622
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2319-6378&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2319-6378&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2319-6378&client=summon