International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 108 | Views: 110

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


EAACK - To Overcome from Intruders Attacks in Manet's by Providing Security Checks

H. Syed Siddiq | M. Hymavathi


Abstract: Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET does not require a fixed network infrastructure. Every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.


Keywords: Mobile Ad hoc NETwork MANET, Enhanced Adaptive ACKnowledgement EAACK, Packet Delivery Ratio PDR, Digital Signature Algorithm DSA, Secure ACKnowledgement S-ACK


Edition: Volume 3 Issue 12, December 2014,


Pages: 2105 - 2111


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

H. Syed Siddiq, M. Hymavathi, "EAACK - To Overcome from Intruders Attacks in Manet's by Providing Security Checks", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 2105-2111, https://www.ijsr.net/get_abstract.php?paper_id=SUB14895



Similar Articles with Keyword 'Mobile Ad hoc NETwork MANET'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy | S. Z. Parveen

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod | Sherly Noel

Share this Article



Top