Making Wireless Infra Structure Less Medium Intrusion Free

  • Unique Paper ID: 157823
  • Volume: 9
  • Issue: 8
  • PageNo: 406-412
  • Abstract:
  • Wireless medium is very prone to attacks of various types. Here a wireless medium has been taken into account and it has been classified as Wireless infra structure less medium. Most of the cases, it is termed as Ad hoc as well. Objective of the paper is to identify a malicious node that can enter in a routing process and can cause major damages to packet delivery. In this paper, efforts have been made for how to fuse intrusion detection into wireless networks, and present a technique for detecting novel routing attacks on these networks. Efforts have been made to develop an algorithm to detect a malicious entry and then regenerate a path to have smooth packet delivery.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{157823,
        author = {Meenu Kamboj and ashwani},
        title = {Making Wireless Infra Structure Less Medium Intrusion Free},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {9},
        number = {8},
        pages = {406-412},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=157823},
        abstract = {Wireless medium is very prone to attacks of various types. Here a wireless medium has been taken into account and it has been classified as Wireless infra structure less medium. Most of the cases, it is termed as Ad hoc as well.  Objective of the paper is to identify a malicious node that can enter in a routing process and can cause  major damages to packet delivery. In this paper, efforts have been made for  how to fuse intrusion detection into wireless networks, and present a technique for detecting novel routing attacks on these networks. Efforts have been made to develop an algorithm to detect a malicious entry and then regenerate a path to have smooth packet delivery.},
        keywords = {Wireless networks, routing, adhoc, shortest path, security},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 9
  • Issue: 8
  • PageNo: 406-412

Making Wireless Infra Structure Less Medium Intrusion Free

Related Articles