CFP last date
20 January 2025
Reseach Article

CEAACK based Detector for Malicious Nodes

by Meenakshiammal.r, Deivanayaki.n, N.shalini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 19
Year of Publication: 2014
Authors: Meenakshiammal.r, Deivanayaki.n, N.shalini
10.5120/19022-0534

Meenakshiammal.r, Deivanayaki.n, N.shalini . CEAACK based Detector for Malicious Nodes. International Journal of Computer Applications. 108, 19 ( December 2014), 33-37. DOI=10.5120/19022-0534

@article{ 10.5120/19022-0534,
author = { Meenakshiammal.r, Deivanayaki.n, N.shalini },
title = { CEAACK based Detector for Malicious Nodes },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 19 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number19/19022-0534/ },
doi = { 10.5120/19022-0534 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:25.571317+05:30
%A Meenakshiammal.r
%A Deivanayaki.n
%A N.shalini
%T CEAACK based Detector for Malicious Nodes
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 19
%P 33-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET stands for Mobile Ad Hoc Network. The Ad Hoc network that is used for mobile communication is called MANET. The MANETS are used when the user is moving. Because MANET does not depends on fixed infrastructure. Wireless networks are used to connect with different networks in MANETs. Security is more critical in wireless communication when compared to the wired communication. So the security of the MANET must be optimized to secure information while transferring. The proposed system introduces a new intrusion-detection system named Competent Enhanced Adaptive Acknowledgment (CEAACK) for finding malicious nodes using RSA digital signature and EAACK specially designed for MANETs.

References
  1. K. Al Agha, M. -H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J. -B. Viollet, "Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,"IEEE Trans. Ind. Electron. , vol. 56, no. 10, pp. 4266–4278, Oct. 2009.
  2. R. Akbani, T. Korkmaz, and G. V. S. Raju, "Mobile Ad hoc Network Security," in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
  3. R. H. Akbani, S. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: A survey," in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
  4. T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," in Wireless/Mobile Security. New York: Springer Verlag, 2008.
  5. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U. K. : Cambridge Univ. Press, Aug. 2007.
  6. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, "Modeling and optimization of a solar energy harvester system for self-powered.
  7. V. C. Gungor and G. P. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approach, " IEEE Trans. Ind. Electron. , vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
  8. Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," inProc. 4th IEEE Workshop Mobile Comput. Syst. Appl. , 2002, pp. 3–13.
  9. Y. Hu, A. Perrig, and D. Johnson, "ARIADNE: A secure on-demand routing protocol for ad hoc networks," inProc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.
  10. G. Jayakumar and G. Gopinath, "Ad hocmobile wireless networks routing protocol—A review," J. Comput. Sci. , vol. 3, no. 8, pp. 574–582, 2007.
  11. D. Johnson and D. Maltz, "Dynamic Source Routing in ad-hoc wireless networks," in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
  12. N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodes in MANETs," in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.
  13. Shakshuki, E. M. ; Nan Kang; Sheltami, T. R. , "EAACK—A Secure Intrusion-Detection System for MANETs," Industrial Electronics, IEEE Transactions on , vol. 60, no. 3, pp. 1089,1098, March 2013.
  14. Ahmed Shihab, Alcahest; and Martin Langhammer, Altera, "Design How-To Implementing IKE Capabilities in FPGA Designs".
  15. J. -S. Lee, "A Petri net design of command filters for semiautonomous mobile sensor networks," IEEE Trans. Ind. Electron. , vol. 55, no. 4, pp. 1835–1841, Apr. 2008.
  16. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  17. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. , Boston, MA, 2000, pp. 255–265.
  18. http://www. webopedia. com/TERM/N/network_security. html
Index Terms

Computer Science
Information Sciences

Keywords

EAACK RSA Digital Signature MANET