An Effective Double Acknowledgement Scheme For Intrusion Detection In Mobile Ad hoc Networks

S. Kiruthika*, S. Vadivel**
* Assistant Professor, Electronics and Communication Engineering, KPR Institute of Engineering and Technology, Coimbatore, India.
** Assistant Professor, Electronics and Communication Department, KPR Institute of Engineering & Technology, Erode, India.
Periodicity:May - July'2014
DOI : https://doi.org/10.26634/jmt.1.2.3170

Abstract

The hegira to wireless network from wired network has been a worldwide trend in the past few years. The mobility and scalability brought by a wireless network made it possible in many applications. Mobile Ad Hoc Network (MANET) is one of the most predominant and idiosyncratic applications. On the contrary to accustomed network architecture, MANET does not require a fixed network infrastructure, every single node works as Transceiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they reckon on their neighbors to relay messages. The Self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET impuissant to rancorous attackers. In this case, it is pivotal to develop efficient encroachment-detection mechanisms to protect MANET from attacks. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, the authors have proposed and implemented a new encroachment-detection system named Enhanced Double Acknowledgment (EDACK) specially designed for MANET. Compared to various approaches, EDACK demonstrates higher rancorous behavior-detection rates in certain circumstances, while does not greatly affect the network performances.

Keywords

Acknowledgement, Mobile, Networks, Rancorous, Relay Messages.

How to Cite this Article?

Kiruthika, S., and Vadivel, S. (2014). An Effective Double Acknowledgement Scheme For Intrusion Detection In Mobile Adhoc Networks. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 13-19. https://doi.org/10.26634/jmt.1.2.3170

References

[1]. K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet (2009), “Which wireless technology for industrial wireless sensor networks? The development of OCARI technologies,” IEEE Trans. Ind. Electron, Vol. 56, No. 10, pp. 4266–4278.
[2]. R. Akbani, T. Korkmaz, and G. V. S. Raju (2012), “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, Vol. 127. New York: Springer-Verlag, pp. 659–666.
[3]. R. H. Akbani, S. Patel, and D. C. Jinwala (2012), “DoS attacks in mobile ad hoc networks: A survey,” in Proceedings of 2 nd International. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
[4]. T. Anantvalee and J. Wu (2008). “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security, New York: Springer-Verlag.
[5]. L. Buttyan and J. P. Hubaux (2007), “Security and Cooperation in Wireless Networks”. Cambridge, U.K.:Cambridge University Press.
[6]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini (2008), “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Trans. Ind. Electron., Vol. 55, No. 7,pp. 59–2766.
[7]. V. C. Gungor and G. P. Hancke (2009), “Industrial wireless sensor networks: Challenges, design principles, and technical approach,” IEEE Trans. Ind.Electron., Vol. 56, No. 10, pp. 4258–426.
[8]. Y. Hu, D. Johnson, and A. Perrig (2002), “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proceedings of 4 th IEEEWorkshop Mobile Comput. Syst. Appl, pp. 3–13.
[9]. Y. Hu, A. Perrig, and D. Johnson (2002), “ARIADNE: A secure on-demand routing protocol for ad hoc networks,” in Proceedings of 8 th ACM Int. Conf. MobiCom, Atlanta, GA, pp. 12–23.
[10]. G. Jayakumar and G. Gopinath (2007), “Ad hoc mobile wireless networks routing protocol—A review,” Journal of Computer Science., Vol. 3, No. 8, pp. 574–582.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.