scispace - formally typeset
Search or ask a question
Author

Sougato Adhikari

Bio: Sougato Adhikari is an academic researcher from University of Calcutta. The author has contributed to research in topics: Ad hoc wireless distribution service & Optimized Link State Routing Protocol. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
Proceedings ArticleDOI
01 Oct 2013
TL;DR: A cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system is proposed.
Abstract: Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The proposed consolidated approach, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network, which enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency.
Abstract: The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.

8 citations

01 Jan 2018
TL;DR: The following lists the main characters from the film version of The God of Small Things, which was released in cinemas around the world in 2016.
Abstract: Error! Bookmark not defined. List of Tables vii List of Figures viii

3 citations

Proceedings ArticleDOI
01 Apr 2016
TL;DR: The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
Abstract: Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network. This paper presents the literature review of DSR routing protocol and previously proposed approaches that plays a major role for enhancing the performance of DSR routing protocol. The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network.

1 citations