Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:2 Issue:3 Year: 08 April,2014 Pages:255-262
The movement from wired network to wireless network has been a trend in the past few years. Comparing to other wireless networks MANET is important one. MANET Contains the collection of mobile nodes or computers with a wireless transmitter and receiver that communicate with each other. MANET is a self-configurable and has automatic IP configuration features with several independent nodes. Due to this MANETS are used in applications like military and in natural disasters. Security measures play an important role in all these applications .Hence it is necessary to include intrusion- detection system for MANETs. The existing techniques in finding the malicious nodes in the presence of false misbehave report using the three parts of EAACK schemes namely ACK, S-ACK, MRA. These are all acknowledgement based schemes. The cryptography used in this schemes are DSA and RSA for authentication process. Due to the network overhead caused by the DSA and RSA we propose a cryptography algorithm called DSAB. It takes less no of bits for the encryption and verification process.
MANET ACK S-ACK MRA DSA RSA DASB
[1] G. Jayakumar and G. Gopinath. Ad Hoc Mobile Wireless Networks Routing Protocol – A Review. In Journal of Computer Science 3(8): 574-582, 2007. [2] B. Sun. Intrusion Detection in Mobile Ad hoc Networks. Doctoral Dissertation. Texas A&M University, 2004. [3] A. Tabesh, L. G. Frechette, "A Low-Power Stand-Alone Adaptive Circuit for Harvesting Energy From a Piezoelectric Micropower Genera," IEEE Trans. on Industrial Electronics, vol. 57, no. 3, pp. 840-849, March 2010. [4] Y. Kim, "Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network," IEEE Trans. on Instrumentation and Measurement, vol. 57, no. 7, pp. 1379 – 1387, 2008 [5] N. Nasser and Y. Chen. Enhanced Intrusion Detection Systems For Discovering Malicious Nodes in Mobile Ad Hoc Network, In Proceedings of IEEE International Conference On Communication, Glasgow, Scotland, June 24 – 28, 2007. [6] M. Zapata and N. Asokan. Securing Ad hoc Routing Protocols. In the ACM Workshop on Wireless Security, pp. 1-10, 2002. [7] K. Kuladinith, A.s Timm-Giel and C. Görg. Mobile Ad-Hoc Communications in AEC industry. In Journal of Information Technology in Construction Vol. 9, pp. 313-323, 2004. [8] K. Stanoevska-Slabeva and M. Heitmann. Impact of Mobile Ad-Hoc Networks on the Mobile Value System. 2nd Conference on m-Business, Vienna, June 2003. [9] L. Buttyan and J.P. Hubaux. Security and Cooperation in Wireless Networks. Cambridge University Press, Aug. 2007. [10] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, J.-B. Viollet, "Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technol," IEEE Trans. on Industrial Electronics, vol. 56, no. 10, pp. 4266-4278, Oct 2009. [11] Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE. EAACK – A Secure Intrusion Detection System for MANETs. [12] Digital Signature Standard (DSS). Federal Information Processing Standards Publication, National Institute of Standards and Technology, Gaithersburg, MD, 2009 . [13] R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. In t he Communications of ACM, vol. 21, pp. 120-126, 1978. [14] W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 . [15] S. Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1,2008. [16] G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011. [17]Y. Desmedt and Y. Frankel, “Threshold cryptosystems”, in Advances in Cryptology - Crypto '89, Proceedings, Lecture Notes in Computer Science 435, G. Brassard, Ed., Santa Barbara: Springer-Verlag,1990, pp. 307-315. [18] G. Kumar, M. K. Rai, “An Approach to provide Security in Mobile Ad Hoc Networks using Counter Mode of Encryption on MAC Layer”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.