2014 International Conference on Computer Communication and Informatics 2014
DOI: 10.1109/iccci.2014.6921748
|View full text |Cite
|
Sign up to set email alerts
|

Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA)

Abstract: A Mobile Ad-Hoc Network (MANET) is a arrangement of wireless mobile nodes which forms a temporary network for the communication without the access point, high availability of wireless devices in everyday is a measure factor in the success of infrastructure-less networks. MANET is dealing with both kinds of attacks, active and passive attacks at all the layers of network model. The lack in security measures of their routing protocols is alluring a number of attackers to intrude the network. A particular type of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Aarfa Khan et al [6] proposes NWLIDS calculation to alleviate the disadvantages in Local Intrusion Detection (LID) security directing instrument. Also, propose new component called Normalized Wormhole Detection System (NWLIDS) security directing instrument to permit the discovery of the aggressor to be locally; In this when the suspected middle of the road hub unicast the RREP towards the source hub the past hub to the transitional hub performs the procedure of location and not the source hub as appeared.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Aarfa Khan et al [6] proposes NWLIDS calculation to alleviate the disadvantages in Local Intrusion Detection (LID) security directing instrument. Also, propose new component called Normalized Wormhole Detection System (NWLIDS) security directing instrument to permit the discovery of the aggressor to be locally; In this when the suspected middle of the road hub unicast the RREP towards the source hub the past hub to the transitional hub performs the procedure of location and not the source hub as appeared.…”
Section: Related Workmentioning
confidence: 99%
“…Wormhole attack is a more concentrating seeking attack in order to detect and isolate the wormhole nodes in IOV is a challenge issue. Here we propose WPWP algorithm, which is an efficient method to detect and isolate wormhole [6]. In this approach we don't require any special kind of hardware just by using one special packet (WPWP), hop-count and delay per hop to detect wormhole nodes.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Security MANET. It has an intermediate neighbor node discovery mechanism, packet drop calculator, individual node receiving packet estimator followed by isolation technique for the confirmed Wormhole nodes [3]. Neighbor node analysis is an approach to providing a solution for secure transmission in MANET and to identify wormhole attack and removes wormhole link in MANET [7].…”
Section: Related Work Normalized Wormhole Local Intrusion Detectimentioning
confidence: 99%
“…In [4] Nidhi Lal has proposed an improved Watchdog mechanism which identifies the malicious node in the network as well as spots the network congestion. In [8] Aarfa Khan has proposed a Normalized Worm hole Local Intrusion Detection (NWHLID) which is the modified version of Local Intrusion Detection Routing Security over mobile Ad-Hoc Network which has a intermediate neighbor node discovery mechanism, packet drop calculator, individual node receiving packet estimator followed by isolation technique. In [5] a new routing technique called security aware ad hoc routing that incorporates security attributes as parameters in to ad hoc route discovery.…”
Section: Literature Reviewmentioning
confidence: 99%