CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security Enhanced Adaptive Acknowledgment Intrusion Detection System

by Pawar P.S., Hashmi S.A.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 7
Year of Publication: 2015
Authors: Pawar P.S., Hashmi S.A.
10.5120/ijca2015907055

Pawar P.S., Hashmi S.A. . Security Enhanced Adaptive Acknowledgment Intrusion Detection System. International Journal of Computer Applications. 130, 7 ( November 2015), 51-56. DOI=10.5120/ijca2015907055

@article{ 10.5120/ijca2015907055,
author = { Pawar P.S., Hashmi S.A. },
title = { Security Enhanced Adaptive Acknowledgment Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 7 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 51-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number7/23224-2015907055/ },
doi = { 10.5120/ijca2015907055 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:46.486366+05:30
%A Pawar P.S.
%A Hashmi S.A.
%T Security Enhanced Adaptive Acknowledgment Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 7
%P 51-56
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET is a collection of wireless mobile nodes forming a network without using any existing infrastructure. In recent years, the use of mobile ad hoc network has been widespread in many applications, security has a most important service in Mobile ad hoc Network compared to other networks. The open medium and wide distributions of nodes responsible for various types of malicious attacks. The solutions for traditional networks are usually not sufficient to provide efficient Ad-hoc operations. This paper proposes and implements a new intrusion detection system named Cryptography Enhanced Adaptive Acknowledgment (CEAACK) specially designed for MANET and compares all existing approaches. And enhancing security level of MANETs based on security attributes the various algorithms, namely RSA and DSA also introduced. The results will be positive performances of WATCHDOG, TWOACK and AACK in the cases of receiver collision, limited transmission power and false misbehavior report.

References
  1. Buttyan, L. and Hubaux, J .P .2007.Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press.
  2. Dondi,D., Bertacchini,A.,Brunelli, D. ,Larcher,L., and Benini,L.2008.Modelling and optimization of a solar energy harvester system for self-powered wireless sensor networks. IEEE Trans. Ind. Electron., vol. 55, no. 7, pp.2759–2766.
  3. Gungor,V. C. And Hancke, G. P. 2009.Industrial wireless sensor networks: Challenges, design principles, and technical approach. IEEE Trans. Ind. Electron., vol. 56, no. 10.pp.4258–4265.
  4. Hu,Y.,Johnson, D., and Perrig,A. 2002.SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks.In Proc. 4th IEEE Workshop Mobile Computer Syst. Appl. pp3–13.
  5. Hu,Y., Perrig,A., and Johnson,D.2000.ARIADNE: A secure on-demand routing protocol for ad hoc networks. In Proc. 8th ACM Int. Conf. MobiCom, Atlanta, GA. Pp.12–23.
  6. Jayakumar,G. And Gopinath,G. 2007.Ad hoc mobile wireless networks routing protocol—A review. J. Comput. Sci., vol. 3, no. 8.pp.574–582.
  7. Johnson,D. And Maltz,D. Dynamic Source Routing in ad hoc wireless .pp.153–181
  8. Kang,N., Shakshuki ,E., and Sheltami,T.2010 .Detecting misbehaving nodes in MANETs. In Proc. 12th Int. Conf. iiWAS, Paris, France. pp.216-222.
  9. Kang,N.,Shakshuki,E., and Sheltami,T.2011.Detecting forged acknowledge in MANETs. In Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore.pp. 488–494.
  10. Lee,J.S., 2008.A Petri net design of command filters for semiautonomous mobile sensor networks. IEEE Trans. Ind. Electron., vol. 55, no. 4.pp.1835–1841.
  11. Liu,K.,Deng,J.,Varshney,P.K. and Balakrishnan,K.,2007. An acknowledgment-based approach for the detection of routing misbehaviour in MANETs. IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550.
  12. Marti,S., Giuli,T.J., Lai,K., and Baker,M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proc. 6th Annu. Int. Conf. Mobile Computer Network, Boston, MA, pp. 255-265.
  13. Parker,J., Undercoffer,J., Pinkston,J., and Joshi,A.2004 .On intrusion detection and response for mobile ad hoc networks.In Proc. IEEE Int. Conf. Perform., Comput., Commun., pp. 747–752.
  14. Patcha,A., and Mishra,A.2003.Collaborative security architecture for black hole attack prevention in mobile ad hoc networks.In Proc. Radio Wireless Conf., pp. 75–78.
  15. Rivest,R.,Shamir,A., and Adleman,L.1983 .A method for obtaining digital signatures and public-key cryptosystems.Commun. ACM, vol. 21, no. 2, pp. 120–126.
  16. Sheltami,T., Al-Roubaiey,A., Shakshuki,E. and Mahmoud,A.,2009.Video transmission enhancement in presence of misbehaving nodes in MANETs. Int. J.Multimedia Syst.,vol. 15, no. 5, pp. 273-282.
  17. Nat. Inst. Std. Technol., 2009. Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, Digital Signature Std.
  18. Shakshuki,E.M.,Kang,N.andSheltami,T.R.2013 EAACK A Secure Intrusion-Detection System for MANETs.In IEEE Transactions on Industrial Electronics, vol. 60, no.3.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc NETworks (MANETs) Intrusion Detection System (IDSs) Digital Signature digital signature algorithm(DSA) Cryptography Enhanced Adaptive ACKnowledgment (CEAACK).