The rapid proliferation of Mobile ad hoc network has changed the landscape of network security. The recent DOS attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology and cooperative algorithms, lack of centralized monitoring and management point and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.
There are many intrusion detection techniques have been developed on Ad hoc network but have been turned to be inapplicable in this new environment. Here we need to search for new architecture and mechanisms to protect Mobile Ad hoc network. In the above all technique of intrusion detection is applied on the only one layer and that is probably on routing layer. But here we apply this intrusion detection system in the MAC layer for the more security, efficiency and high speed compare to other technique those whose apply in the network layer.
TABLE OF CONTENTS
I. Declaration
II. Approved Research Topic
III. Abstract
IV. Certificate
V. Acknowledgement
VI. Table Of Content
VII. List Of Figures
VIII. List Of Abbreviations
Chapter 1. Introduction
1.1 Mobile Adhoc Network.
1.1.1 History of Mobile Adhoc Networks
1.1.2 Overview Of Mobile Adhoc Networks
1.1.3 Adhoc Routing Protocols for MANET
1.1.3.1 Table Driven Protocols
· DestinationSequenced DistanceVector Routing (DSDV)
· Cluster head Gateway Switch Routing (CGSR)
· Wireless Routing Protocol (WRP)
1.1.3.2 On demand Protocols.
· AdHoc OnDemand Distance Vector Routing (AODV)
· Dynamic Source Routing (DSR).
1.1.3.3 Hybrid Protocols
· Zone Routing Protocol.
1.2 Overview of intrusion detection
1.3 Intrusion Detection System
1.3.1 Host based intrusion detection system
1.3.2 Network based intrusion detection system.
1.4 Why we need IDS.
1.5 IDS Techniques.
1.5.1 Anomaly Detection.
1.5.2 Misuse Detection or Signature Detection
1.5.3 Target Monitoring
1.5.4 Stealth Probes..
1.6 Overview of wormhole attacks
Chapter 2. Review of literature
Chapter 3. Present work
3.1 Scope of Study
3.2 Problem Formulation
3.3 Objective
Chapter 4.Research Methodology
Chapter 5. Result and Discussion
Chapter 6. Conclusion and Future works
Chapter 7. References
-
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X.