Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs

S.B.Ninu*, S. Behin Sam**
* Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, India.
** Assistant Professor, Department of Computer Science, R.V. Government Arts College, Chengalpattu, India.
Periodicity:May - July'2015
DOI : https://doi.org/10.26634/jmt.2.2.4872

Abstract

Mobile Adhoc Network (MANET) is one of the most important and unique applications. When compared to traditional network architecture, MANET does not require a fixed network infrastructure instead dynamic and distributed in nature; every single node act as both a transmitter and a receiver. In same communication range, the nodes communicate directly with each other. For outer range, they rely on their trust based neighbors to relay messages. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, the authors propose and implement a new intrusion detection system named Hybrid Enhanced Adaptive Acknowledgment (HEAACK) specially designed for MANETs. They extend their work with the introduction of Hybrid Crypto systems to prevent the attacker from forging acknowledgment packets and reduce the network overhead which is caused by Digital Signature. In order to obtain the optimal AESs in MANETs, the authors have implemented DSA, RSA and AES schemes in the simulation. Eventually, they arose to a conclusion that the AES scheme is more suitable to be implemented in the MANETs. Simulation results show that the proposed Hybrid cryptosystem method is a more desirable scheme under MANETs.

Keywords

Hybrid Cryptosystems, Advanced Encryption Standard Algorithm, Hybrid Enhanced Adaptive AcKnowledgment (HEAACK), Mobile Adhoc Network (MANET)

How to Cite this Article?

Ninu, S.B., and Sam, S.B. (2015). Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 19-26. https://doi.org/10.26634/jmt.2.2.4872

References

[1]. K. Al Agha, M.H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.B. Viollet, (2009). “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol”. IEEE Trans. Ind. Electron.,Vol. 56, No. 10, pp. 4266–4278.
[2]. R. Akbani, T. Korkmaz, and G. V. S. Raju, (2012). “Mobile Ad hoc Network Security”. Lecture Notes in Electrical Engineering, New York:Springer-Verlag, Vol. 127, pp. 659–666.
[3]. R. H. Akbani, S. Patel, and D. C. Jinwala, (2012). “DoS nd attacks in mobile ad hoc networks: A survey”. in Proc. 2 Int. Meeting ACCT, Rohtak, Haryana, India, pp. 535–541.
[4]. T. Anantvalee and J. Wu, (2008). “A Survey on Intrusion Detection in Mobile Ad Hoc Networks”, in Wireless/Mobile Security. New York: Springer- Verlag,
[5]. L. Buttyan and J. P. Hubaux, (2007). Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press.
[6]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, (2008). “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks”. IEEE Trans. Ind. Electron., Vol. 55, No. 7, pp. 2759–2766.
[7]. V. C. Gungor and G. P. Hancke, (2009). “Industrial wireless sensor networks:Challenges, design principles, and technical approach”. IEEE Trans. Ind.Electron., Vol. 56, No. 10, pp. 4258–4265.
[8]. Y. Hu, D. Johnson and A. Perrig, (2002). “SEAD: Secure efficient distance vectorrouting for mobile wireless ad hoc th networks”. in Proc. 4 IEEE Workshop Mobile Comput. Syst. Appl. pp. 3–13.
[9]. Y. Hu, A. Perrig, and D. Johnson, (2002). “ARIADNE: A secure on-demand routing protocol for ad hoc networks”. th in Proc. 8 ACM Int. Conf. MobiCom, Atlanta, GA, pp. 12–23.
[10]. G. Jayakumar and G. Gopinath, (2007). “Ad hoc mobile wireless networks routing protocol—A review”. Journal on Computer Science., Vol. 3, No. 8, pp. 574–582.
[11]. D. Johnson and D. Maltz, (1996). Dynamic Source Routing in ad hoc wireless networks in Mobile Computing. Norwell, MA: Kluwer, ch. 5, pp. 153–181.
[12]. N. Kang, E. Shakshuki, and T. Sheltami, (2010). th “Detecting misbehaving nodes in MANETs”. in Proc. 12 Int. Conf. iiWAS, Paris, France, pp. 216–222.
[13]. N. Kang, E. Shakshuki, and T. Sheltami, (2011). “Detecting forged acknowledgements in MANETs”. in th Proc. IEEE 25 Int. Conf. AINA, Biopolis, Singapore, pp. 488–494.
[14]. K. Kuladinith, A. S. Timm-Giel, and C. Görg, (2004). “Mobile ad-hoc communications in AEC industry”. Journal on Information Technology. Vol. 9, pp. 313–323.
[15]. J.-S. Lee, (2008). “A Petri net design of command filters for semi autonomous mobile sensor networks”. IEEE Trans. Ind. Electron., Vol. 55, No. 4, pp. 1835–1841.
[16]. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, (2007). “An acknowledgment-based approach for the detection of routing misbehavior in MANETs”. IEEE Trans. Mobile Comput., Vol. 6, No.5, pp. 536–550.
[17]. S. Marti, T. J. Giuli, K. Lai, and M. Baker, (2000). “Mitigating routing misbehavior in mobile ad hoc th networks”, in Proc. 6 Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, pp. 255–265.
[18]. A. Menezes, P. Van Oorschot, and S. Vanstone, (1996). Handbook of Applied Cryptography. Boca Raton, FL: CRC, T-37.
[19]. N. Nasser and Y. Chen, (2007). “Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network”. in Proc. IEEE Int.Conf. Commun., Glasgow, Scotland, pp. 1154–1159.
[20]. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, (2005). “Secure routing and intrusion rd detection in ad hoc networks”, in Proc. 3 Int. Conf.Pervasive Comput. Commun., pp. 191– 199.
[21]. R. Rivest, A. Shamir, and L. Adleman, (1983). “A method for obtaining digital signatures and public key cryptosystems”, Commun. ACM, Vol. 21, No. 2, pp. 120–126.
[22]. J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. Lanceros-Mendez, (2010). “Energy harvesting from piezoelectric materials fully integratedin footwear”. IEEE Trans. Ind. Electron., Vol. 57, No. 3, pp. 813–819.
[23]. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, (2009). “Video transmission enhancement in presence of misbehaving nodes in MANETs”. International Journal on Multimedia Syst., Vol. 15, No. 5, pp. 273–282.
[24]. A. Singh, M. Maheshwari, and N. Kumar (2011). “Security and trust management in MANET”. in Communications in Computer and Information Science, Vol. 147. New York: Springer-Verlag, pt. 3, pp. 384–387.
[25]. B. Sun, (2004). “Intrusion detection in mobile ad hoc networks”. Ph.D. Dissertation, Texas A&M Univ., College Station, TX.
[26]. K. Stanoevska-Slabeva and M. Heitmann, (2003). “Impact of mobile ad-hoc networkson the mobile value nd system”, in Proc. 2 Conf. m-Bus., Vienna, Austria.
[27]. A. Tabesh and L. G. Frechette, (2010). “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator”. IEEE Trans. Ind. Electron., Vol. 57, No. 3, pp. 840–849.
[28]. M. Zapata and N. Asokan, (2002). “Securing ad hocrouting protocols”. in Proc.ACM Workshop Wireless Secur., pp. 1–10.
[30]. Botan. A Friendly C++ Crypto Library. Reterived from: http://botan.randombit.net/
[31]. Nat. Inst. Std. Technol., (2009). Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, Digital Signature Standard (DSS).
[32]. TIK WSN Research Group. The Sensor Network Museum—Tmote Sky. Reterived from: http://www. snm.ethz.ch/Projects/TmoteSky
[33]. Y. Kim, (2008). “Remote sensing and control of an irrigation system using a distributed wireless sensor network”. IEEE Trans. Instrum. Meas., Vol. 57, No. 7, pp. 1379–1387.
[34]. Ethadi M. Shakshuki, Nan kang and Tarek R. Sheltami, (2013). “EAACK—A Secure Intrusion-Detection System for MANETs”. IEEE Transaction on Industrial Electronics, Vol. 60, No. 3.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.