Enhancing Key Management In Intrusion Detection System For Manets

Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. those techniques have drawbacks due to the collusions of packets and distribution of keys between nodes becomes overhead. We propose a new alternate technique by developing a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV.

[1]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[2]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[3]  Anupam Joshi,et al.  Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.

[4]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[5]  José Gerardo V. da Rocha,et al.  Energy Harvesting From Piezoelectric Materials Fully Integrated in Footwear , 2010, IEEE Transactions on Industrial Electronics.

[6]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Khaldoun Al Agha,et al.  Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology , 2009, IEEE Transactions on Industrial Electronics.

[9]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[10]  Jin-Shyan Lee,et al.  A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.

[11]  Katarina Stanoevska-Slabeva,et al.  Impact of Mobile Ad Hoc Networks on the Mobile Value System , 2003 .

[12]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Prabir Bhattacharya,et al.  A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[15]  Anupam Joshi,et al.  On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[16]  Donald F. Towsley,et al.  Design and analysis of a leader election algorithm for mobile ad hoc networks , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[17]  Mohammad Mubasheer EAACK—A Secure Intrusion-Detection System for MANETs , 2014 .

[18]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[19]  S. A. M. Makki,et al.  The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.

[20]  Ahmadreza Tabesh,et al.  A Low-Power Stand-Alone Adaptive Circuit for Harvesting Energy From a Piezoelectric Micropower Generator , 2010, IEEE Transactions on Industrial Electronics.

[21]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[22]  Sugata Sanyal,et al.  Mobile Ad Hoc Network Security , 2009 .

[23]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .