Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 6
Year of Publication: 2014
Authors:
Harshavardhan
Supriya R K
Shivanand R D

Harshavardhan, Supriya R K and Shivanand R D. Article: Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(6):1-5, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Harshavardhan and Supriya R K and Shivanand R D},
	title = {Article: Implementation of EAACK to Detect Node Misbehavior in Manets using Intrusion Detection Method},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {6},
	pages = {1-5},
	month = {October},
	note = {Full text available}
}

Abstract

A group of freely migrating nodes called Mobile Ad hoc Network (MANET) is one of the most important and unique wireless network architecture. MANETs do not have fixed infrastructure. Because of its open medium and wide distribution of nodes MANET is vulnerable to malicious attackers. For this reason, it is necessary to design an efficient intrusion detection mechanism to protect MANET from attacks. As it is proposed, that Enhanced Adaptive Acknowledgement (EAACK), a new intrusion detection system can protect MANETs from attacks compared to other IDS approaches due to its special design. EAACK also demonstrates higher malicious behavior detection rates, without affecting the network performances. In this paper we provide an implementation for the above mentioned approach.

References

  • Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE "EAACK—A Secure Intrusion-DetectionSystem for MANETs", IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013.
  • R. Akbani, T. Korkmaz and G. V. S Raju. "Mobile Ad hoc Network Security", Lecture Notes in Electrical Engineering, vol. 127, pp. 659-666, Springer, 2012 – here1
  • R. H. Akbani, S. Patel, D. C. Jinwala. "DoS Attacks in Mobile Ad Hoc Networks: A Survey", the proceedings of the Second International Meeting of Advanced Computing & Communication Technologies (ACCT) , pp. 535-541, Rohtak, Haryana, India. 2012. – here1
  • Y. Hu, D. Johnson and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In the Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, pp. 3-13, 2002.
  • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. In the Communications of ACM, vol. 21, pp. 120-126, 1978.
  • L. Buttyan and J. P. Hubaux. Security and Cooperation in Wireless Networks. Cambridge University Press, Aug. 2007.
  • K. Al Agha, M. -H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, J. -B. Viollet, "Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technol," IEEE Trans. on Industrial Electronics, vol. 56, no. 10, pp. 4266-4278, Oct 2009.