Securing Manets By Using An Intrusion Detection System (Eaack)

M Vamsi Krishna, D Jaya Prakash

Abstract


MANET arrangement may diverge depending on its application from a small static network that is extremely power inhibited to a large-scale, mobile, highly dynamic network. Every node works both as a transmitter and a receiver. Nodes converse directly with each other when they are both within the same communication range. Otherwise they depend on their neighbours to relay messages. Industrial remote access and control via wireless networks are flattering more and more popular these days. One of the chief advantages of wireless networks is its capability to permit data communication between different parties and still maintain their mobility. This communication is incomplete to the range of transmitters. This means that two nodes cannot communicate with each other when the distance between the two nodes is further than the communication range of their own. MANET solves this problem by allowing intermediate nodes to rely data transmission.   In this case detection should be focused as another part before an attacker can damage the structure of the system.


Keywords


Digital signature, digital signature algorithm (DSA), Enhanced Adaptive ACKnowledgment (AACK) (EAACK), Mobile Ad hoc NETwork (MANET).

References


K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,†IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.

R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,†in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.

R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,†in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.

T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,†in Wireless/Mobile Security. New York: Springer- Verlag, 2008.

L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.

D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,†IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.

V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approach,†IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.

Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,†in Proc. 4th IEEEWorkshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.

Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand routing protocol for ad hoc networks,†in Proc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.

G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol—A review,†J. Comput. Sci., vol. 3, no. 8, pp. 574–582, 2007.

D. Johnson and D. Maltz, “Dynamic Source Routing in ad hoc wireless networks,†in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,†in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,†in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.

K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc communications in AEC industry,†J. Inf. Technol. Const., vol. 9, pp. 313–323, 2004.

J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,†IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835–1841, Apr. 2008.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â