CFP last date
20 January 2025
Reseach Article

Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method

Published on October 2014 by Harshavardhan, Supriya R K, Shivanand R D
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 6
October 2014
Authors: Harshavardhan, Supriya R K, Shivanand R D
7d289baf-ed77-4026-b5c6-dc2922ad3a3e

Harshavardhan, Supriya R K, Shivanand R D . Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method. International Conference on Information and Communication Technologies. ICICT, 6 (October 2014), 1-5.

@article{
author = { Harshavardhan, Supriya R K, Shivanand R D },
title = { Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 6 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icict/number6/18003-1459/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Harshavardhan
%A Supriya R K
%A Shivanand R D
%T Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 6
%P 1-5
%D 2014
%I International Journal of Computer Applications
Abstract

A group of freely migrating nodes called Mobile Ad hoc Network (MANET) is one of the most important and unique wireless network architecture. MANETs do not have fixed infrastructure. Because of its open medium and wide distribution of nodes MANET is vulnerable to malicious attackers. For this reason, it is necessary to design an efficient intrusion detection mechanism to protect MANET from attacks. As it is proposed, that Enhanced Adaptive Acknowledgement (EAACK), a new intrusion detection system can protect MANETs from attacks compared to other IDS approaches due to its special design. EAACK also demonstrates higher malicious behavior detection rates, without affecting the network performances. In this paper we provide an implementation for the above mentioned approach.

References
  1. Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE "EAACK—A Secure Intrusion-DetectionSystem for MANETs", IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013.
  2. R. Akbani, T. Korkmaz and G. V. S Raju. "Mobile Ad hoc Network Security", Lecture Notes in Electrical Engineering, vol. 127, pp. 659-666, Springer, 2012 – here1
  3. R. H. Akbani, S. Patel, D. C. Jinwala. "DoS Attacks in Mobile Ad Hoc Networks: A Survey", the proceedings of the Second International Meeting of Advanced Computing & Communication Technologies (ACCT) , pp. 535-541, Rohtak, Haryana, India. 2012. – here1
  4. Y. Hu, D. Johnson and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In the Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, pp. 3-13, 2002.
  5. R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. In the Communications of ACM, vol. 21, pp. 120-126, 1978.
  6. L. Buttyan and J. P. Hubaux. Security and Cooperation in Wireless Networks. Cambridge University Press, Aug. 2007.
  7. K. Al Agha, M. -H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, J. -B. Viollet, "Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technol," IEEE Trans. on Industrial Electronics, vol. 56, no. 10, pp. 4266-4278, Oct 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Digital Signature Dsa Eaack