International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks; Mobile Ad hoc NET work (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture; MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise; they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However; the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case; it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs; we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend; we strongly believe that it is vital to address its potential security issues. In this paper; we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches; EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances. The open medium allows MANET vulnerable to attacks. In existing system Enhanced Adaptive Acknowledgment (EAACK) method is imposed; in this digital signature method is used which cause network overhead. Thus proposed system specifies the Hybrid Cryptography technique is used to reduce network overhead.

Keywords: WATCHDOG, TWOACK, DSR, MANET, DSH

Edition: Volume 3 Issue 6, June 2014

Pages: 2598 - 2605


How to Cite this Article?

S. Krishna Priya, K. V. Srinivasa Rao, "Implementation of EAACK Secure Trespass on Detection System for MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014806, Volume 3 Issue 6, June 2014, 2598 - 2605

32 PDF Views | 31 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'WATCHDOG'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1935 - 1938

Survey on Watchdog Systems and Classifier Based Scheme to Detect Selfish Nodes in MANET

K. Yasotha, R. Gunasundari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 158 - 164

Enhanced Channel Estimation and Traffic Monitoring for Misbehaviour Nodes in Disruption Tolerant Networks

M. Rubini, N. Tajunisha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 525 - 528

A Simulation Scheme for Improving the Data Security in Mobile Ad-hoc Network

Najiya Sultana, S. S. Sarangdevat

Share this article



Similar Articles with Keyword 'TWOACK'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 358 - 363

Intrusion Detection Techniques in MANET: A Review

Navneet Dhillon, Dr Amardeep Singh

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this article



Similar Articles with Keyword 'DSR'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2832 - 2834

Hiding Sensitive Association Rules Using EMDSRRC

Marate Shashank S., Manjusha Yeola

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this article



Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article



Similar Articles with Keyword 'DSH'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Expert?s Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 455 - 458

Technique for Preserving Privacy and Security to the Online Social Network

Swati Pulkurte, V. V. Dakhode

Share this article
Top