CFP last date
20 May 2024
Reseach Article

UNIACK- Universal Adaptive Acknowledge Intrusion Detection System in Manets

by Lohar Priyanka D., Lomte Archana C.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 4
Year of Publication: 2015
Authors: Lohar Priyanka D., Lomte Archana C.
10.5120/ijca2015905276

Lohar Priyanka D., Lomte Archana C. . UNIACK- Universal Adaptive Acknowledge Intrusion Detection System in Manets. International Journal of Computer Applications. 123, 4 ( August 2015), 1-4. DOI=10.5120/ijca2015905276

@article{ 10.5120/ijca2015905276,
author = { Lohar Priyanka D., Lomte Archana C. },
title = { UNIACK- Universal Adaptive Acknowledge Intrusion Detection System in Manets },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 4 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number4/21944-2015905276/ },
doi = { 10.5120/ijca2015905276 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:44.154790+05:30
%A Lohar Priyanka D.
%A Lomte Archana C.
%T UNIACK- Universal Adaptive Acknowledge Intrusion Detection System in Manets
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 4
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET (Mobile Ad-Hoc Network) a unique network which provides communication between mobile nodes available outside or within the radio range. This unique feature migrated from wired network to wireless network and resulted in the security issues. So, there is need to secure the MANETs. As compared to other types of networks, MANETs are more vulnerable to different attacks such as black hole attack, gray hole attack, wormhole attack, etc. MANET decides a radio range within which node can move and can feasibly transmit the data. And if any of the nodes migrates from one radio range to another, it relays the messages to their neighbors. This means that two communicating nodes are notable to exchange messages if those nodes exceed the radio range. To avoid these types of attacks, different Intrusion Detection System (IDS) in MANETs are introduced to follow secure data transmission. In this paper, a secure IDS plays an important role and gives the system which improves the efficiency of EAACK (Enhanced Adaptive Acknowledge) and is compared with different IDS in MANETs using RSA, AES and ZRP algorithms. RSA algorithm is used for encryption and decryption of the message to securely transmit data using mathematical model. AES algorithm is combinely used with RSA. And ZRP (Zone Routing Protocol) divides network into small zones to decide the route with nearby nodes and ensure the authentic path in the mobile network.

References
  1. Tiranuch Anantvalee and Jie Wu in Wireless/Mobile Network Security Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp.170 ? 196 c 2006 Springer ? ?A Survey on Intrusion Detection in Mobile Ad Hoc Networks.
  2. Vehbi C. Gungor, Member, IEEE, and Gerhard P. Hancke, Senior Member, IEEE IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 56, NO. 10, OCTOBER 2009 ?Industrial wireless sensor networks: Challenges, design principles, and technical approach.
  3. Yih-Chun Hu a, David B. Johnson b, Adrian Perriga at Ad Hoc Networks 1 (2003) 175192 SEAD secure efficient distance vector routing for mobile wireless ad hoc networks.
  4. David B. Johnson and David A. Maltz book Mobile Computing, edited by Tomasz Imielinski and Hank Korth Kluwer Academic Publishers, 1996. Dynamic Source Routing in ad hoc wireless networks.
  5. Lidong Zhou Zygmunt J. Haas in IEEE network, special issue on network security, November/December, 1999 Securing ad-hoc networks?.
  6. R.L. Rivest, A. Shamir, and L. Adleman National Science Foundation grant MCS76-14294, and the Office of Naval Research grant number N00014-67-A-0204-0063. ”A method for obtaining digital signatures and public- key cryptosystems”.
  7. Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013 ”EAACK-A Secure Intrusion-Detection System for MANETs”.
  8. Safdar Ali Soomro , Sajjad Ahmed Soomro , Abdul Ghafoor Memon in Journal of Information and Communication Technology Vol. 4, No. 2, (Fall 2010) 01-10 ?Denial of Service Attacks in Wireless Ad hoc Networks.
  9. Khaldoun Al Agha, Senior Member, IEEE, Marc-Henry Bertin, Tuan Dang, Member, IEEE, Alexandre Guitton, Member, IEEE, Pascale Minet, Thierry Val, and Jean-Baptiste Viollet IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 56, NO. 10, OCTOBER 2009 ”Which Wireless Technology for IndustrialWireless Sensor Networks? The Development of OCARI Technology”.
  10. K.P.Manikandan and Dr.R.Satyaprasad ”Analysis and Diminution of Security Attacks on Mobile Ad hoc Network ”JCA Special Issue on Mobile Ad-hoc Networks MANETs” 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Cryptography Zone Routing Protocol AES RSA IDS in Manets