Technical Support E-Mail: editor@ijaccs.com
  Accessing from: India
 
Home About us Call for Paper Topics Digital Library Peer Review Contact us FAQ
Instructions Editorial Board Publication Fees Copyright Infringement
Home> Archives
Access Digital Library

 
 
 
 
 
Article Correction Policy
Learn about the IJACCS article correction policy and process...
Print / Hardcopy request
Directly place requests for print/ hard copies of IJACCS via Google Docs...
Publication Ethics
Policy on Publication Ethics - Ensuring genuine authorship...
 
Join as Reviewer
IJACCS calls Reviewer interested to contribute towards the scientific development in the field of engineering & technology research.
Click here to Join
March 2014 Volume.1 Issue.1
 
Enhancing Security in Mobile Ad-hoc Networks Using RSA Algorithm and SVM– Survey
International Journal of Advanced Computing and Communication Systems (IJACCS)
© 2014 by IJACCS Journal
Volume - 1, Issue - 1
Year of Publication: March 2014
Author's: P.Sivaranjanadevi, .Balaganesh, R.Divya, S.Periyasamy Paper ID: IJCSE132
 
Full Text
 
Citation
P.Sivaranjanadevi, .Balaganesh, R.Divya, S.Periyasamy. Enhancing Security in Mobile Ad-hoc Networks Using RSA Algorithm and SVM– Survey . International Journal of Advanced Computing and Communication Systems (IJACCS). Volume.1 Issue.1 March 2014.
 
Abstract
Mobile ad hoc network is an infrastructure less network. Since it has more challenging characteristics providing security is a complicated task. Most of the existing system uses either intrusion detection system to detect the malicious activities or prevention system to prevent the attacks in MANET. In this work, we propose Intrusion detection system and cryptographic techniques to detect the attacks and prevent the network from further attacks. There are various cryptographic techniques to encrypt the message for avoiding unauthorized persons to access the message but there is a possibility to occur some attack when the keys are not exchanged properly. So we have used RSA algorithm for exchanging the key to encrypt and decrypt the data in a secure way. Rough Set Theory is used for extracting necessary features to decrease the complexity of IDS. Classification of normal and malicious behavior of the MANET is done by Support Vector Machine.
 
References
  1. [1]. John Felix Charles Joseph and Amitabha Das,”Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA,” IEEE transactions on dependable and secure computing, vol. 8, no. 2 march-April 2011.
  2. [2]. D. K. Srivastava and K. S. Patnaik,” Data Classification: A Rough - SVM Approach,” Contemporary Engineering Sciences, Vol. 3, 2010, no. 2, 77 – 86.
  3. [3]. Roman W. Swiniarski and Andrzej Skowron,” Rough set methods in feature selection and recognition,” Pattern Recognition Letters 24 (2003) 833–849.
  4. [4]. Anazida Zainal and Mohd Aizaini, ”Feature Selection Using Rough Set in Intrusion Detection.”IEEE TENCON 2006, 14- 17th November 2006, Hongkong.
  5. [5].N.Vimala and Dr.R.Balasubramaniyam” Distributed key management scheme for mobile adhoc network-A survey” Global Journal of Computer Science and Technology,Vol.10 Issue 2(version 1.0), April 2012.
  6. [6]. Bing Wu, Jie Wu, Eduardo B. Fernandez and Spyros Magliveras “Secure and Efficient Key Management in Mobile Ad Hoc Networks.
  7. [7]. Zbigniew Suraj Chair, ”An Introduction to Rough Set Theory and Its Applications,” ICENCO’2004, December 27-30, 2004, Cairo, Egypt.
  8. [8]. Rung-Ching Chen and Kai-Fan Cheng,”Using Rough Set and Support Vector Machine for Network Intrusion Detection, “International Journal of Network Security & Its Applications (IJNSA), Vol 1, No1, April 2009.
  9. [9]. Rung-Ching Chen and Kai-Fan Cheng,”An Intrusion Detection System of Ad hoc Networks with Multi-attacks Based on Support Vector Machine and Rough Set”, Master’s Degree Thesis, Chaoyang University of Technology,2009.
  10. [10]. NS-2 TutorialMultimedia Networking Group, The Department of Computer Science, UVA Jianping Wang..
  11. [11]. Shishir K. Shandilya,”A Comprehensive Survey on Intrusion Detection In Manet”, International Journal of Information Technology and Knowledge Management July- December 2010, Volume 2.
  12. [12]. Sandhya Peddabachigari, “Intrusion Detection Systems Using Decision Trees and Support Vector Machines”, Department of Computer Science, Oklahoma State University, USA.
  13. [13]. Rung-Ching Chen and Kai-Fan Cheng, ”An Intrusion Detection System of Ad hoc Networks with Multi-attacks Based on Support Vector Machine and Rough Set”, Master’s Degree Thesis, Chaoyang University of Technology,2009.
  14. [14]. Rakesh Shrestha, “A Novel Cross Layer Intrusion Detection System in MANET”, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
  15. [15]. M. Zhang, “Rough Sets Based Approach to Feature Selection”, Department of Computer Science University of Regina, Saskatchewan.
  16. [16].Hongmei Deng, Qing-An Zeng and Dharma P,Agrawal “SVM-based Intrusion Detection System for Wireless Ad Hoc Networks”, ORB Center for Distributed and Mobile Computig, Department of ECECS, University of Cinncinn.
 
Keywords
Rough Set Theory, Support Vector Machine, MANET, RSA algorithm, IDS.
 

 

 
 
No of Visits:
know pasting counter