Intrusion Detection System in Mobile Networks

Intrusion Detection System in Mobile Networks

P. Ramkumar, E. Saravanakumar, R. Uma, V. Mareeswari, Naveen H. S.
DOI: 10.4018/979-8-3693-4159-9.ch022
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

A mobile network is a systematic collection of mobile nodes that process information with one another without the help of another mounted vital arranger. In common usage, a node refers to any electronic device that possesses either the capability or the power to communicate with other electronic devices. If a node wants to connect with other nodes that are located outside of its range of direct verbal communication, it must rely on transitional nodes to pass along its message. The topology of the network will change in a dynamic way over the course of the years as nodes shift in and out of their positions, as a few opportunity nodes detach themselves from the network. The objective of the system has been presented to increase the output, the packet delivery ratio (PDR), and the lifetime of the packets by measuring the Intrusion detection system (IDS) with respect to specific criteria. In this chapter, an intrusion detection system has been discussed in a mobile network environment.
Chapter Preview
Top

Mobile Network Architecture

Mobile network consists of transceivers, controllers, switches, routers, and registers via these devices it connects and form the network. The region covered via those mobile nodes depends on the transmission strength of the base station signal strength. Hence, as we flow away from the base station strength, the energy of transmission reduces. In fact, the shape of the mobile node might even overlap or have huge areas in-among regions; which includes two adjacent nodes. The predominant purpose of the node is to maximize the frequency channel and assign more mobile nodes (Amouri, A. et al., 2015). Thus, Mobile networks provides cell services based on high-speed connections, IP mobility, wise terminals, and World Wide Web.

Figure 1.

Network architecture

979-8-3693-4159-9.ch022.f01

Complete Chapter List

Search this Book:
Reset