Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques

Monika Darji, Bhushan Trivedi Published in Wireless Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Monika Darji and Bhushan Trivedi. Article: Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques. International Journal of Applied Information Systems 1(3):38-43, February 2012. BibTeX

    	author = "Monika Darji and Bhushan Trivedi",
    	title = "Article: Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 3,
    	pages = "38-43",
    	month = "February",
    	note = "Published by Foundation of Computer Science, New York, USA"


Intrusion Detection and Prevention System is a must for mobile ad networks as the security mechanisms like encryption, authentication and firewall systems are not able to completely secure the nodes and their communication. In this paper, we aim to study the various intrusion detection and prevention systems that were proposed for Mobile Adhoc Networks (MANETs) and compare the recent techniques Intrusion Detection based on their architecture and data gathering techniques.


  1. C.S.R.Murthy and B.S.Manoj, Ad Hoc Wireless Networks, Pearson Education, 2008.
  2. George Aggelou, Mobile Ad Hoc Networks, McGraw-Hill, 2004.
  3. E. Ahmed, K. Samad, W. Mahmood, “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks,” AusCERT2006 R&D Stream Program, Information Technology Security Conference, May 2006.
  4. Zhou Chunyue, L.Y., (2006) “A Pattern Matching Based Network Intrusion Detection System”, IEEE, 9th International Conference on Control, Automation, Robotics and Vision 2006, 5-8 Dec, ICARCV '06, Singapore.
  5. Lu Huijuan, Chen Jianguo and Wei Wei, (2008) “Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System”, International Symposium on Electronic Commerce and Security, pp.482-487.
  6. Y. Zhang, W. Lee, ”Intrusion Detection in wireless ad -hoc networks”, Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’2000), pp. 275-283, Aug 6-11.
  7. S. Buchegger, J.L. Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes- fairness in dynamic ad-hoc networks,” Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June 2002, pp. 226-236.
  8. O. Kachirski, R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks”, Proc. of the 36th Hawaii International Conference on System Sciences (HICSS’03), IEEE, 2002.
  9. P. Albers, O. Camp, J-M. Percher, B. Jouga, M. Ludovic, and R.Puttini, “Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches”, Proc. of the First International Workshop on Wireless Information Systems (WIS-2002), April 2002, pp.1-12.
  10. D.Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R.Talpade,C.Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt, J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, In Proc. of the 3rd IEEE International Workshop on Information Assurance, pp. 57-70, 2005.
  11. B. Sun, K. Wu, U.W. Pooch. “Zone-based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc and Sensor Wireless Networks”, zVol 2, No. 3, 2006.
  12. R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai,”Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks”,IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February,2010.
  13. Jaydip Sen, “An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks”, Second International Conference on Computational Intelligence, Communication Systems and Networks, 2010.
  14. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, IEEE Transactions on Dependable and Secure Computing, vol. 99, no. 1, 2008.
  15. Yinan Li , Zhihong Qian,” Mobile agents-based intrusion detection system for mobile ad hoc networks” 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering
  16. S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom, pp. 255-265, Aug. 2000.


Intrusion Detection and Prevention System, MANET, Data gathering techniques