A SURVEY OF INTRUSION DETECTION FOR AD-HOC NETWORK

Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET does not require a fixed network formation, since every single node works as both a sending and a receiving messeges and it communicate with each other. Nodes communicate directly with each other when they are both within the same communication range. we implement a new intrusion detection system named Enhanced Adaptive ACKnowledgement (EAACK) designed for MANETs.

[1]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[2]  Tarek R. Sheltami,et al.  Detecting Forged Acknowledgements in MANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[3]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[4]  Andreas Timm-Giel,et al.  Mobile ad-hoc communications in AEC industry , 2004, J. Inf. Technol. Constr..

[5]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[6]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[7]  Jin-Shyan Lee,et al.  A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.

[8]  Tejashree Kokate,et al.  Mobile Ad Hoc Network Security Issues , 2014 .

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[10]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[11]  Khaldoun Al Agha,et al.  Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology , 2009, IEEE Transactions on Industrial Electronics.

[12]  Luca Benini,et al.  Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.

[13]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[14]  Tarek R. Sheltami,et al.  Detecting misbehaving nodes in MANETs , 2010, iiWAS.

[15]  Geetha Jayakumar,et al.  Ad Hoc Mobile Wireless Networks Routing Protocols - A Review , 2007 .

[16]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.