Performance Evaluation of EA3ACK in different topology’s Using EAACK for MANET

K. Thamizhmaran*
Assistant Professor, Department of Electronics and Communication Engineering, Annamalai University, Annamalai Nagar, Tamilnadu, India.
Periodicity:September - November'2016
DOI : https://doi.org/10.26634/jit.5.4.10332

Abstract

The recent emerging research Mobile Ad-hoc Networks (MANET) is a infrastructure-less network. All the nodes act as transmitter and receiver within their communication range and also act as medium. The main issues in MANET are to secure routing due to misbehaving attack preventing and having security from malicious nodes. In this recent research with the aim to filter misbehaviour attack, the author has proposed Intrusion Detection System (IDS), Enhanced Adaptive 3 Acknowledgement (EA3ACK) using EAACK (DSA) with (MARS4) hybrid cryptography for MANET. MARS4 which is a combination of RSA and MAJE4 is employed to reduce the routing congestion. Developed system that compares with five different scenarios through Network simulator (NS2) is used to implement and test the proposed system, providing secured transmission, and improving Packet Delivery Ratio (PDR) and throughput.

Keywords

Wireless Network, MANET, Routing Protocols, IDS, Watchdog, Malicious Attack, RO, PDR, Throughput.

How to Cite this Article?

Thamizhmaran. K (2016). Performance Evaluation of Proactive, Reactive and Hybrid Routing Protocols in different topology’s Using EAACK for MANET. i-manager’s Journal on Information Technology, 5(4), 5-10. https://doi.org/10.26634/jit.5.4.10332

References

[ 1 ] . Abdulsalam Basabaaa,et al.,(2014) . “Implementation of A3ACKs intrusion detection system under various mobility speeds”. 5th International Conference on Ambient Systems, Networks and Technologies, pp. 571-578.
[2]. Al-Roubaiey, A. Sheltami, T. et al., (2010). “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement ”. 24th IEEE Conference on AINA, pp. 634-640.
[3]. Nan Kang, et al., (2013). “EAACK—A Secure Intrusion: Detection System for MANETs”. IEEE Transaction, Vol. 60, No. 3, pp. 1089-1098.
[4]. Nan Kang, et al., (2010). “Detecting Misbehaving Nodes in MANETs”. International Conference on Advanced Information Networking and Applications, pp. 488-494.
[5]. Jongoh Choi, et al., (2005). “Malicious Nodes Detection in AODV-Based Mobile Ad-hoc Networks”. GESTS Transaction, Vol. 18, No. 1 pp. 49-55.
[6]. Liu, et al., (2007). “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs”. IEEE Transaction, Vol. 6, No. 5, pp. 536–550.
[7]. Prabu, K., and Subramani, A., (2012). “Performance comparison of routing protocol in MANET”. IJARCSSE, Vol. 2, No. 9, pp. 388–392.
[8]. Prabu, K., and Subramani, A., (2014). “Energy efficient routing in MANET through edge node selection using ESPR algorithm”, Inderscience, Vol. 5, No. 3, pp. 166–175.
[9]. Sheena Mathew and K. Paulose Jacob, (2006). “A Novel Fast Hybrid Cryptographic System: MARS4”. IEEE International Conference.
[10]. Subasree, S., and N.K. Sakthivel, (2010). “Design of a New Security Protocol Using Hybrid Cryptography Algorithms”. IJRRAS, Vol. 2, No. 2, pp. 48-55.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.