Proceeding of

NCAICN National Conference 2013



Advances in

Computing & Networking


A Special Issue of

International Journal of Computer Science and Applications



Hon. Shri Sundeepji Meghe

(Chairman, Vidarbha Youth Welfare Society, Amravati)



Dr. V.T. Ingole (FIE, FIETE, Professor Emeritus)


Organizing Committee


Dr. D.T. Ingole (FIE, FIETE)

(Principal PRMIT & R, Badnera and  Chairman IEI  Amravati Center).


 Er. A.W. Jawanjal

(Honorary Secretary IEI, Amravati Center)


Dr. G.R. Bamnote ((FIE, FIETE)

(H.O.D. Computer Science & Engineering)

Dr. A.S. Alvi (MIE)

(H.O.D. Information Technology))

Prof. Mrs. M.D. Ingole (FIE.MIETE)

(H.O.D. Electronics & Telecommunication)


Prof. S.V. Dhopte ((FIE, FIETE)

Prof. Ms. V.M. Deshmukh (FIE, FIETE)

Dr. S.W. Mohod  (FIE,FIETE)


Dr. S.R. Gupta (MIE, MIETE)

Prof. S.V. Pattalwar ((FIE, FIETE)

Prof. M.D. Damahe


Prof. Mrs. M.S. Joshi                

Dr. S.M. Deshmukh

Prof. V.U. Kale

Prof. S.S. Kulkarni

Prof. Ms. R.R. Tuteja

Prof. Ms. J.N. Ingole

Prof. V.R. Raut

Prof. C.N. Deshmukh

Prof. Ms. M.S. Deshmukh

Prof. S.P. Akarte

Prof. Mrs. A.P. Deshmukh

Prof. Mrs. S.S. Sikchi

Prof. N.N. Khalsa

Department of Information and Computer Science and Engineering

Prof. Ram Meghe Institute of Technology and Research, Badnera Distt. Amravati



Prof. K. H. Walse





IJCSA ISSN: 0974-1011 (Online) >>    

Technical Analysis of Intrusion Detection in Routing Protocol for Mobile Ad Hoc Network

S.V.Shirbhate, Dr. S.S.Sherekar and Dr. V.M.Thakare


Mobile computing environment are vulnerable to malicious attacks ranging from passive eavesdropping to an active interfering. In  wireless network attacks can come  from  all  the  directions  and  target  at  any  node. Compensation  can  include  leaking  secret  information, message corruption and node masquerade.  In mobile ad hoc networks security is hard due to the dynamic nature of the relationships between the  participating nodes as well as the vulnerabilities and limitations of the wireless transmissions    medium.    In    order    to    avoid    such circumstance, there is need to develop new  architecture and  mechanisms  to  protect  thwireless  networks  and mobile  computing  applications. All  nodes  in  MANET must function as routers that discover and maintain routes to   othe nodes  in  the  network.  Due  to   MANETís characteristics, it is a complicated job  for IDS to detect routing  attacks.  Intrusio detection  system  plays  an imperative  role  in  network  environment  for security. Routing attacks may be launched by the malicious node since node acts as a router in multi hopping.

This paper focuses on various vulnerabilities in  routing protocol  and security  methods  an analyzes  various parameters  which  plays important  role   in   orde to increase the throughput.

©2013 International Journal of Computer Science and Applications 

Published by Research Publications, India