Incorporation of 3-phase Commit Protocol into the Existing Intrusion Detection Systems in the Mobile Ad-hoc Network

Daniel, Makanjuola (2015) Incorporation of 3-phase Commit Protocol into the Existing Intrusion Detection Systems in the Mobile Ad-hoc Network. British Journal of Mathematics & Computer Science, 7 (1). pp. 26-39. ISSN 22310851

[thumbnail of Daniel712015BJMCS14987.pdf] Text
Daniel712015BJMCS14987.pdf - Published Version

Download (438kB)

Abstract

A mobile ad-hoc network is a collection of mobiles nodes forming an ad-hoc network without the assistance of any centralized structures [1]. It is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in mobile ad-hoc network themselves are responsible for dynamically discovering other nodes to communicate.
As a result of certain unique properties in mobile ad-hoc networks, the on-going trends in the communication industries is advancing towards the adoption of ad-hoc networks for commercial and security issues. This subsequently exposes mobile ad-hoc networks to various external attacks from un-authorized bodies. This paper is segmented into various sections; the first section introduces the reader to the concept of MANETs and gives account of its level of vulnerability to intruders’ attack; the second section addresses sources of threats posed to wireless network, the threat involved, the types and effects of threats. In the same line of progression, comprehensive details were given on statement of problems with special focus on the weakness on the existing researches in respect to improving security on mobile ad-hoc networks. Further, the content of the paper explains the motivation of study and later sheds light on the research objectives. Subsequently, details were given on the significance of study; that is, the dividends of this research on various application areas. The next section makes an explicit highlight about the existing models of Intrusion Detection Systems (IDS), giving a concise account of their area of strengths and weaknesses. The tail end of the paper introduces the working concept of a 3-phase commit protocol and how this concept was modeled to stand as a three in one intrusion detection systems algorithm, integrating the functionalities of the three notable existing intrusion detection systems (IDS): CONFIDANT, OCEAN and CORE. Subsequently, I describe the implementation concept of IIDSA, giving rational for picking on 3-phase commit protocol as a viable instrument in its plight to sieve out malicious nodes in a multi-user network.

Item Type: Article
Subjects: Opene Prints > Mathematical Science
Depositing User: Managing Editor
Date Deposited: 16 Jun 2023 03:57
Last Modified: 10 Jan 2024 04:04
URI: http://geographical.go2journals.com/id/eprint/2130

Actions (login required)

View Item
View Item