Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review
Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective...
Saved in:
Published in | International Journal of Emerging Science and Engineering Vol. 10; no. 6; pp. 1 - 3 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
30.05.2022
|
Online Access | Get full text |
ISSN | 2319-6378 2319-6378 |
DOI | 10.35940/ijese.D2527.0510622 |
Cover
Loading…
Abstract | Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective network intrusion detection system (NIDS) must be installed and maintained. A system's data should be protected against access by anyone without authorization. Structures that have interruption detection procedures may be able to estimate future interrupts as well as current interruptions with a high degree of accuracy. There have been artificial intelligence approaches for organizing interruption locations for more than two decades, and there are numerous approaches. A reliable interruption detection system will probably remain a subject of debate for some time. The number of digital assaults and the volume of system information continue to grow at an alarming rate, forcing companies to devise better methods for keeping their systems and information secure. |
---|---|
AbstractList | Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective network intrusion detection system (NIDS) must be installed and maintained. A system's data should be protected against access by anyone without authorization. Structures that have interruption detection procedures may be able to estimate future interrupts as well as current interruptions with a high degree of accuracy. There have been artificial intelligence approaches for organizing interruption locations for more than two decades, and there are numerous approaches. A reliable interruption detection system will probably remain a subject of debate for some time. The number of digital assaults and the volume of system information continue to grow at an alarming rate, forcing companies to devise better methods for keeping their systems and information secure. |
Author | Gite, Dr. Pratik Khan, Imran |
Author_xml | – sequence: 1 givenname: Imran surname: Khan fullname: Khan, Imran – sequence: 2 givenname: Dr. Pratik surname: Gite fullname: Gite, Dr. Pratik |
BookMark | eNp9kM1KAzEUhYNUsNa-gYu8wNTk5m_iQiitf9BWEF0PmfRGo-NEJqPFt7fULsSFq3sW9zsHvmMyaFOLhJxyNhHKSnYWXzDjZA4KzIQpzjTAARmC4LbQwpSDX_mIjHOO9fbLGlECDMnFHHv0fWyf6NI10cf0kekqrTHT2NJlqmODdLqmz8nTFfab1L1mWtApvcfPiJsTchhck3G8vyPyeHX5MLspFnfXt7PpovBcAhQhBKO3m2WtnbGAdShFyVEZK2pwci2g5MwpHqxTQXvNtFQBg7QAzAtpxIic__T6LuXcYah87F0fU9t3LjYVZ9VORrWTUe1kVHsZW1j-gd-7-Oa6r_-xb_ieZH0 |
CitedBy_id | crossref_primary_10_54105_ijdcn_B5034_03040623 |
Cites_doi | 10.17576/apjitm-2019-0802-01 10.17485/ijst/2014/v7i4.10 10.1016/j.procs.2016.03.092 10.1016/j.protcy.2013.12.391 10.1016/S1570-8705(03)00008-8 10.5120/19195-0809 |
ContentType | Journal Article |
CorporateAuthor | Associate Professor, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India Research Scholar, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India |
CorporateAuthor_xml | – name: Research Scholar, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India – name: Associate Professor, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India |
DBID | AAYXX CITATION |
DOI | 10.35940/ijese.D2527.0510622 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2319-6378 |
EndPage | 3 |
ExternalDocumentID | 10_35940_ijese_D2527_0510622 |
GroupedDBID | AAYXX CITATION M~E |
ID | FETCH-LOGICAL-c1422-fff761978b6a792ebf8381e5793b2a4d32810a51f9a5f6c60645fef49220c3473 |
ISSN | 2319-6378 |
IngestDate | Tue Jul 01 04:28:39 EDT 2025 Thu Apr 24 22:58:25 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c1422-fff761978b6a792ebf8381e5793b2a4d32810a51f9a5f6c60645fef49220c3473 |
OpenAccessLink | https://doi.org/10.35940/ijese.d2527.0510622 |
PageCount | 3 |
ParticipantIDs | crossref_citationtrail_10_35940_ijese_D2527_0510622 crossref_primary_10_35940_ijese_D2527_0510622 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-05-30 |
PublicationDateYYYYMMDD | 2022-05-30 |
PublicationDate_xml | – month: 05 year: 2022 text: 2022-05-30 day: 30 |
PublicationDecade | 2020 |
PublicationTitle | International Journal of Emerging Science and Engineering |
PublicationYear | 2022 |
References | ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref10 ref0 ref2 ref1 |
References_xml | – ident: ref1 – ident: ref0 doi: 10.17576/apjitm-2019-0802-01 – ident: ref4 doi: 10.17485/ijst/2014/v7i4.10 – ident: ref6 – ident: ref8 doi: 10.1016/j.procs.2016.03.092 – ident: ref7 – ident: ref9 – ident: ref2 doi: 10.1016/j.protcy.2013.12.391 – ident: ref5 doi: 10.1016/S1570-8705(03)00008-8 – ident: ref10 – ident: ref3 doi: 10.5120/19195-0809 |
SSID | ssib051973822 |
Score | 2.1844606 |
Snippet | Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard... |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 1 |
Title | Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELZYuHBZgQDB8pAP3Cp3EzuJmwtSRHlK7QkkblEc26Kw26K2XDjw25lxHnVXFYK9RJGVjOLMl8m8h5DTUlrFI62Y4gKbaocpAztEMC2DVFoZJzLE2uHBMLm-j24fYi_Q7qpL5qpbvq2sK_kfrsIa8BWrZL_B2ZYoLMA58BeOwGE4fonHfYMhADT2B6BOly6ddTjRLscKvlYFX3wn053HSYmFvZiCNeuwTuYHBJ4WmezLjsFaS0WnlZtj1AgBdLR7TQxbgf1YeVJv_k4XeLuqh-_1p11sjDQfPftOBrBPMT4eLGQRx1qnRFTTdrpmxVojTAMPNL5kDL1frFglu0WcRpjtOHoyM9Pt85hjT1WwWKu65eVW2f_8wtrEQjBpHJ3cUckdlbym8oNscLAlcL7H4P2iETpYuCt6LtrUbqgqsXSEfq94HE-F8XSRuy3ys2YPzSpEbJM1M94hZy0aaIsG6tBAR2NaoYFmmgIaaIMGymhGKzTskvvLi7vza1ZPx2Al-u2YtRZdULKnkkKm3CjbA-3LxCBwFS8iLXgvDIo4tGkR26RMsDGhNTZKOQ9KEUmxR9bHk7HZJ9Rqm0itQmNBWeE6LLgVSSxQNwV5H5oDIpoN52XdOh4nmPzJP3vfB4S1d71UrVM-vf7XN68_JJsLqB6R9fn01RyDhjhXJ47DH_bUYBg |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Malicious+Nodes+in+Mobile+Ad+hoc+Networks+-+A+Review&rft.jtitle=International+Journal+of+Emerging+Science+and+Engineering&rft.au=Khan%2C+Imran&rft.au=Gite%2C+Dr.+Pratik&rft.date=2022-05-30&rft.issn=2319-6378&rft.eissn=2319-6378&rft.volume=10&rft.issue=6&rft.spage=1&rft.epage=3&rft_id=info:doi/10.35940%2Fijese.D2527.0510622&rft.externalDBID=n%2Fa&rft.externalDocID=10_35940_ijese_D2527_0510622 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2319-6378&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2319-6378&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2319-6378&client=summon |