Detecting Malicious Nodes in Mobile Ad hoc Networks – A Review
Imran Khan1, Pratik Gite2

1Imran Khan*, Research Scholar, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India. 
2Dr. Pratik Gite, Associate Professor, Department of Computer Science and Engineering, IPSA IES, Indore (M.P), India. 
Manuscript received on 21 February 2022 | Revised Manuscript received on 16 April 2022 | Manuscript published on 30 May 2022 | PP: 1-3 | Volume-10 Issue-6, May, 2022. | Retrieval Number: 100.1/ijese.D25270310422 | DOI: 10.35940/ijese.D2527.0510622
Open Access | Ethics and  Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Every new innovation brings its own set of challenges. Manet, or mobile ad-hoc networks, have the ability to form proxy networks without requiring any standard devices or central administration. The network is wireless and can communicate with each other. First and foremost, a reliable and effective network intrusion detection system (NIDS) must be installed and maintained. A system’s data should be protected against access by anyone without authorization. Structures that have interruption detection procedures may be able to estimate future interrupts as well as current interruptions with a high degree of accuracy. There have been artificial intelligence approaches for organizing interruption locations for more than two decades, and there are numerous approaches. A reliable interruption detection system will probably remain a subject of debate for some time. The number of digital assaults and the volume of system information continue to grow at an alarming rate, forcing companies to devise better methods for keeping their systems and information secure. 
Keywords: Portability; Signatures.
Scope of the Article: Mobile Adhoc Network