M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Implementation of EAACK Secure Trespass on Detection System for MANETs
S. Krishna Priya, K. V. Srinivasa Rao
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks; Mobile Ad hoc NET work (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture; MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise; they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However; the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case; it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs; we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend; we strongly believe that it is vital to address its potential security issues. In this paper; we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches; EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances. The open medium allows MANET vulnerable to attacks. In existing system Enhanced Adaptive Acknowledgment (EAACK) method is imposed; in this digital signature method is used which cause network overhead. Thus proposed system specifies the Hybrid Cryptography technique is used to reduce network overhead.
Keywords: WATCHDOG, TWOACK, DSR, MANET, DSH
Edition: Volume 3 Issue 6, June 2014
Pages: 2598 - 2605
How to Cite this Article?
S. Krishna Priya, K. V. Srinivasa Rao, "Implementation of EAACK Secure Trespass on Detection System for MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014806, Volume 3 Issue 6, June 2014, 2598 - 2605
137 PDF Views | 107 PDF Downloads
Similar Articles with Keyword 'WATCHDOG'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1981 - 1983Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
Gajendra Singh, Monali V. Ghode
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2598 - 2605Implementation of EAACK Secure Trespass on Detection System for MANETs
S. Krishna Priya, K. V. Srinivasa Rao
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1935 - 1938Survey on Watchdog Systems and Classifier Based Scheme to Detect Selfish Nodes in MANET
K. Yasotha, R. Gunasundari
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 525 - 528A Simulation Scheme for Improving the Data Security in Mobile Ad-hoc Network
Najiya Sultana, S. S. Sarangdevat
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 158 - 164Enhanced Channel Estimation and Traffic Monitoring for Misbehaviour Nodes in Disruption Tolerant Networks
M. Rubini, N. Tajunisha
Similar Articles with Keyword 'TWOACK'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2598 - 2605Implementation of EAACK Secure Trespass on Detection System for MANETs
S. Krishna Priya, K. V. Srinivasa Rao
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 358 - 363Intrusion Detection Techniques in MANET: A Review
Navneet Dhillon, Dr Amardeep Singh
Similar Articles with Keyword 'DSR'
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1262 - 1265Evaluation of MANET Routing Protocols using OMNeT++
Chand Jain, Jaswinder Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1644 - 1648Survey on VANET Protocols and Security Techniques
Ashok Shivaji Dadali, Prof. Ram Joshi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 597 - 602Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks
Abhishek Kumar, Shweta Kumari
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'DSH'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1384 - 1390Sherpa - Experts Social Network
Sangramsingh M Ghatage, Siddharth K Gaikwad
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1373 - 1376Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra, K. Raghavendra Rao
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1743 - 1745A Survey Paper on Wireless Transport Layer Security
Parmar Paresh B., Ketan Patel
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2598 - 2605Implementation of EAACK Secure Trespass on Detection System for MANETs
S. Krishna Priya, K. V. Srinivasa Rao