A modified EAACK-Intrusion Detection system for MANETs

In the recent years Mobile Ad-hoc Network is emerging as a very popular technology in the wireless network. Because of its dynamic topology and its infrastructure less architecture, it is vulnerable to various types of attack. Providing security against the intruder is a challenging task in MANET. In this paper, we present the Modified Enhanced Adaptive Acknowledgment (EAACK) based Intrusion Detection system that is used to mitigate the attacks. The proposed scheme is also used to overcome the limitations of watchdog. Elliptic Curve DSA (ECDSA) is used to authenticate the acknowledgment packets used in the proposed technique in order to improve the security level. When compared to the existing method, the proposed method achieves smaller end to end delay and higher throughput performance.

[1]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[2]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[3]  Tarek R. Sheltami,et al.  Detecting misbehaving nodes in MANETs , 2010, iiWAS.

[4]  Vidya Kadam,et al.  An Acknowledgement-Based Approach for the Detection of Routing Misbehaviour in MANETS , 2011 .

[5]  Khaldoun Al Agha,et al.  Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology , 2009, IEEE Transactions on Industrial Electronics.

[6]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[7]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[8]  Anupam Joshi,et al.  On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Sugata Sanyal,et al.  Mobile Ad Hoc Network Security , 2009 .

[12]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[13]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.