TY - JOUR T1 - Identifying Intruder in Mobile Ad Hoc Network Using AIHAODV Protocol AU - Hemalatha, S. AU - Rodrigues, Paul JO - Research Journal of Applied Sciences VL - 10 IS - 7 SP - 256 EP - 263 PY - 2015 DA - 2001/08/19 SN - 1815-932x DO - rjasci.2015.256.263 UR - https://makhillpublications.co/view-article.php?doi=rjasci.2015.256.263 KW - Ad hoc network KW -routing protocol KW -intruder KW -divide and conquer KW -AIHAODV protocol AB - Mobile ad hoc network is one of the growing technology for providing communication without the need of any infrastructure. Having the limitation of infrastructure less and no access control, MANET has several possibilities to fall into attacks through intruder. The intruder is a one kind of attacker who tries to prevent the normal operations like not cooperating to forwarding the packet to the next hop. There are several methods has been proposed to identify the intruder in the network. Those methods are concentrating on the signature based, anomaly and rule based. There is none of the method is being proposed to identify the packets on data flow itself if the intruder play the role of not forwarding the packet to the next node. This study presents the implementation of AIHAODV (Advanced Intruder Handling Ad hoc on Demand Vector). This protocol is implemented using the concept of divide and conquer strategy which will help to identify the node which does not forward the packet to the next node while flow from source to destination. This protocol not only used to identify the intruder in the network also used to re-direct the packet by forming the new route. ER -