Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

An Acknowledgement based Intrusion Detection System using ECDSA for Detecting Malicious Node in MANET

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 16
Year of Publication: 2014
T. Elaya Perumal
P. Kuppusamy
S. Chandra

Elaya T Perumal, P Kuppusamy and S Chandra. Article: An Acknowledgement based Intrusion Detection System using ECDSA for Detecting Malicious Node in MANET. International Journal of Computer Applications 87(16):1-5, February 2014. Full text available. BibTeX

	author = {T. Elaya Perumal and P. Kuppusamy and S. Chandra},
	title = {Article: An Acknowledgement based Intrusion Detection System using ECDSA for Detecting Malicious Node in MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {16},
	pages = {1-5},
	month = {February},
	note = {Full text available}


Mobile Ad hoc network is a group of wireless mobile nodes generating a network not by using any existing infrastructure. MANET is a collection of mobile nodes equipped with a wireless-transmitter and receiver that in contact with each other via bi-directional wireless links either directly or indirectly. An encroachment detection system named Enhanced Adaptive Acknowledgement (EAACK) specially designed for MANETs. By the acceptation of MRA scheme, EAACK is capable of finding malicious nodes contempt the existence of the false misbehavior report and equate it against other popular mechanisms in different scenario through simulation. The results will exhibit positive performances against thefalse misbehavior report. EAACK demonstrates higher leering behavior detection rates in certain circumstances while does not greatly affect the network performances. Malicious attackers to falsely report innocent nodes as malicious can produce the false misbehavior report. EAACK is an acknowledgment-based encroachment detection system. This attack can be deadly to the entire network when the attackers break down sufficient nodes and thus cause a network division. The introduction of digital signature (DSA) is to prevent the attacker from counterfeitacknowledgment packets.


  • Akbani, E. Korkmaz, T. , and Raju, G. V. S. 2012 Mobile Ad hoc Network Security In Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag.
  • Akbani R. H, Patel,S and Jinwala,D. C. 2012 DoS attacks in mobile ad hoc networks: A survey. In Proceedings of the2nd Int. Meeting ACCT, Haryana, India
  • Anantvalee, Tand Wu, J. 2008A Survey on Intrusion Detection in Mobile Ad Hoc Networks inWireless/Mobile Security. New York: Springer- Verlag.
  • Botan, A Friendly C++ Crypto Library. [Online]. Available: http:// botan. randombit. net/.
  • Buttyan, Land Hubaux, J. P. 2007Security and Cooperation in WirelesNetworks. Cambridge, U. K. : Cambridge Univ. Press.
  • Jayakumar,G and Gopinath,G. 2007 Ad hoc mobile wireless networks routing protocol—A reviewIn Proceedings of the INJ. Computer Science.
  • Johnson,D and Maltz,D. 1996 Dynamic Source Routing in ad hoc wireless networks in Mobile Computing.
  • Kang, N. , Shakshuki, E and Sheltami,T. 2010 Detecting misbehaving nodes in MANETs. In Proceedings of the12th Int. Conf. Paris, France.
  • Kang, N. , Shakshuki, E and Sheltami, T. 2011Detecting forged acknowledgements in MANETs In Proceedings of theIEEE 25th Int. Conf. AINA, Biopolis, Singapore.
  • Lee J. S. 2008 A Petri net design of command filters for semiautonomous mobile sensor networks in IEEE Trans. Ind. Electron.
  • Liu, K. Deng, J P. Varshney, K and Balakrishnan, K. 2007 An acknowledgment-based approach for the detection of routing misbehavior in MANETs in IEEE Trans. Mobile Computer.
  • Marti,S. , Giuli,T. J. ,Lai,K and Baker,M. 2000 Mitigating routing misbehavior in mobile ad hoc networks In Proceedings of the 6th Annu. Int. Conf. Mobile Compute. Newt, Boston.
  • Nasser, N and Chen, Y. 2007 Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network In Proceedings of the IEEE Int. Conf. Communication, Glasgow, Scotland.
  • Rivest, R. , Shamir, A and Adleman, L. 1983 A method for obtaining digitalSignatures and public-key cryptosystems in Commun. ACM,
  • Sheltami, T. , Al-Roubaiey, A. , Shakshuki, E. , and Mahmoud, A. 2009 Video transmission enhancement in presence ofmisbehaving nodes inMANETs In Proceedings of theInt. J. Multimedia System.
  • Sun, B. 2004 Intrusion detection in mobile ad hoc networks in Texas A&M Univ. , College Station.
  • Digital Signature Standard (DSS). 2009 in Federal Information Processing Standards Publication, Gaithersburg, MD.
  • Sharmila Begam, U and Murugaboopathi, G. 2013. A Recent Secure Intrusion Detection System for MANETS, International Journal of Emerging Technology and Advanced Engineering.
  • Sheltami, R. , Shakshuki, M and Nan Kang. 2013 EAACK- A Secure Intrusion Detection System for MANETs. IEEE Transactions on Mobile computing.
  • Tmote Skyin TIK WSN Research Group, The Sensor Network Museum— [Online]. Available: http://www. snm. ethz. ch/Projects/TmoteSky