UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 9
September-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2409518


Registration ID:
548426

Page Number

e905-e911

Share This Article


Jetir RMS

Title

Exploring Intrusion Detection Strategies for Ad Hoc Networks: A Comprehensive Review

Abstract

In the context of decentralized structure and dynamic topology, ad hoc networks help in particular difficulties for intrusion detection. As it is effective at creating paths on-demand, the Ad hoc On-Demand Distance Vector (AODV) protocol is one of the many routing protocols used in ad hoc networks. But its dynamic nature, it is vulnerable to many security attacks and flaws. The problems occurred in identifying intrusions in ad hoc networks are examined in this study, employed the AODV protocol and examines current strategies and ideas for embarking the risks. Additionally, it includes new research avenues and innovative techniques to enhance ad hoc network security. Without the assistance of a centralized infrastructure, ad hoc networks in a wireless systems are by nodes connecting directly to one another. Additionally, the regular change to the network’s structure, failures also their dynamic topology, which means that node mobility helps in distinguishing networks. In significance that ad hoc networks are decentralized they are more complex, or that there is no single entity in responsibility of them. An important part of the ad hoc networks, the routing protocol manages how data packets are reaching from one node to another and also responsible for organizing the channels via the node communicate. In ad hoc networks, the AODV protocol is a famous and most randomly used routing protocol as it has good efficacy. By only maintaining data packet transmissions, when obligatory, AODV drops the overhead in assessments to sustaining the direction-finding tables and replacement the network capitals. Besides this, attackers can hypothetically take benefit of the susceptibilities familiarized by the lively nature of AODV built systems.

Key Words

Ad Hoc network, Intrusion detection. Wireless Network, AODV.

Cite This Article

"Exploring Intrusion Detection Strategies for Ad Hoc Networks: A Comprehensive Review", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 9, page no.e905-e911, September-2024, Available :http://www.jetir.org/papers/JETIR2409518.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Exploring Intrusion Detection Strategies for Ad Hoc Networks: A Comprehensive Review", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 9, page no. ppe905-e911, September-2024, Available at : http://www.jetir.org/papers/JETIR2409518.pdf

Publication Details

Published Paper ID: JETIR2409518
Registration ID: 548426
Published In: Volume 11 | Issue 9 | Year September-2024
DOI (Digital Object Identifier):
Page No: e905-e911
Country: dcm, rajasthan, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000334

Print This Page

Current Call For Paper

Jetir RMS