Special Issue Introduction
Special Issues List
Aims and Scope
Article Processing Charge
Open Access Policy
Digital Preservation Policy
1796-2021 (Online); 2374-4367 (Print)
Prof. Maode Ma
Prof. Jalel Ben-Othman, Prof. Nobuo Funabiki
Prof. Jason Z. Kang
or comments to
, rank Q3 in Category Electrical and Electronic Engineering
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
Volume 17, No. 5 has been published online!
Volume 17, No. 1-3 has been indexed by Scopus.
Volume 17, No. 4 has been published online!
Volume 15, No. 5, May 2020
Energy Secured Intrusion Detection System and Analysis of Attacks for Mobile Ad-Hoc Networks
Rajendra Prasad P and Shivashankar
Department of Electronics & Communication Engineering, Sri Venkateshwara College of Engineering, Bengaluru and Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India
—Mobile ad-hoc networks (MANETs) have drawing popularity due to its vast range of application in real time from all the researchers. The major concern in this type of networks is the security, as it lacks firewalls and sufficient software which fails to the data protection in ad hoc networks. The networks are prone to different types of attacks ranging from the selfish and malicious nodes. The challenges are to build the secured intrusion detection system (S-IDS) that provide security to nodes in the networks. Many intrusion detection systems have been implemented, which focuses on either routing protocols or their efficiency, but they do not address the security problems. In this proposed work, we aim to investigate the effect of independent attacks on dynamic source routing protocol and provide pseudo code for the different types of attacks. We observe the impact of each of the attacks on performance of the network by varying the number of malicious nodes in the network. The simulations are setup in network simulator-2 and the performance of these attacks against the proposed algorithm has been calculated and the results are analyzed with the existing dynamic source routing protocol under energy consumption, throughput, packet delivery ratio (PDR) and end-to-end delay as performance metric.
—Mobile ad-hoc network, intrusion detection system, attacks, security
Cite: Rajendra Prasad P and Shivashankar, "Energy Secured Intrusion Detection System and Analysis of Attacks for Mobile Ad-Hoc Networks," Journal of Communications vol. 15, no. 5, pp. 406-414, May 2020. Doi: 10.12720/jcm.15.5.406-414
Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
Towards the Implementation of Energy Harvesting for IoT Sensor Nodes in an Early Warning Flood Detection System
Review in FBMC to Enhance the Performance of 5G Networks
Copyright © 2013-2022 Journal of Communications, All Rights Reserved