Proceeding of

NCAICN National Conference 2013

(NCAICN-2013)

on

Advances in

Computing & Networking

as

A Special Issue of

International Journal of Computer Science and Applications

(ISSN:0974-1011)

Patron

Hon. Shri Sundeepji Meghe

(Chairman, Vidarbha Youth Welfare Society, Amravati)

 

Advisor

Dr. V.T. Ingole (FIE, FIETE, Professor Emeritus)

 

Organizing Committee

Chairman

Dr. D.T. Ingole (FIE, FIETE)

(Principal PRMIT & R, Badnera and  Chairman IEI  Amravati Center).

Secretary

 Er. A.W. Jawanjal

(Honorary Secretary IEI, Amravati Center)

Conveners

Dr. G.R. Bamnote ((FIE, FIETE)

(H.O.D. Computer Science & Engineering)

Dr. A.S. Alvi (MIE)

(H.O.D. Information Technology))

Prof. Mrs. M.D. Ingole (FIE.MIETE)

(H.O.D. Electronics & Telecommunication)

Coordinators

Prof. S.V. Dhopte ((FIE, FIETE)

Prof. Ms. V.M. Deshmukh (FIE, FIETE)

Dr. S.W. Mohod  (FIE,FIETE)

Co-Coordinators

Dr. S.R. Gupta (MIE, MIETE)

Prof. S.V. Pattalwar ((FIE, FIETE)

Prof. M.D. Damahe

Members

Prof. Mrs. M.S. Joshi                

Dr. S.M. Deshmukh

Prof. V.U. Kale

Prof. S.S. Kulkarni

Prof. Ms. R.R. Tuteja

Prof. Ms. J.N. Ingole

Prof. V.R. Raut

Prof. C.N. Deshmukh

Prof. Ms. M.S. Deshmukh

Prof. S.P. Akarte

Prof. Mrs. A.P. Deshmukh

Prof. Mrs. S.S. Sikchi

Prof. N.N. Khalsa

Department of Information and Computer Science and Engineering

Prof. Ram Meghe Institute of Technology and Research, Badnera Distt. Amravati

 

Editor

Prof. K. H. Walse

M.S.India

 

 

 

   
   
   
   
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
IJCSA ISSN: 0974-1011 (Online) >>    
Title:

Technical Analysis of Intrusion Detection in Routing Protocol for Mobile Ad Hoc Network

Author:
S.V.Shirbhate, Dr. S.S.Sherekar and Dr. V.M.Thakare
 

Abstract

Mobile computing environment are vulnerable to malicious attacks ranging from passive eavesdropping to an active interfering. In  wireless network attacks can come  from  all  the  directions  and  target  at  any  node. Compensation  can  include  leaking  secret  information, message corruption and node masquerade.  In mobile ad hoc networks security is hard due to the dynamic nature of the relationships between the  participating nodes as well as the vulnerabilities and limitations of the wireless transmissions    medium.    In    order    to    avoid    such circumstance, there is need to develop new  architecture and  mechanisms  to  protect  thwireless  networks  and mobile  computing  applications. All  nodes  in  MANET must function as routers that discover and maintain routes to   othe nodes  in  the  network.  Due  to   MANET’s characteristics, it is a complicated job  for IDS to detect routing  attacks.  Intrusio detection  system  plays  an imperative  role  in  network  environment  for security. Routing attacks may be launched by the malicious node since node acts as a router in multi hopping.

This paper focuses on various vulnerabilities in  routing protocol  and security  methods  an analyzes  various parameters  which  plays important  role   in   orde to increase the throughput.



©2013 International Journal of Computer Science and Applications 

Published by Research Publications, India