Performance Evaluation and Testing of EAACK-Secure IDS for MANETs: Brief Study

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-17 Number-1
Year of Publication : 2014
Authors : Harisha Datla , Mallikarjun Reddy D , Santosh Naidu P
  10.14445/22312803/IJCTT-V17P110

MLA

Harisha Datla , Mallikarjun Reddy D , Santosh Naidu P. "Performance Evaluation and Testing of EAACK-Secure IDS for MANETs: Brief Study". International Journal of Computer Trends and Technology (IJCTT) V17(1):44-52, Nov 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and classifiable applications. On the adverse to ancient spec, Manet doesn't need a set network infrastructure; each single node works as each a sender and a receiver and they trust their neighbours to relay messages. Unfortunately, the open medium and remote distribution of Manet create it at risk of numerous kinds of attacks. So, it is essential to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we define solid privacy requirements regarding malicious attackers in MANET. Then we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviour-detection rates in certain circumstances while does not greatly affect the network performances.

References
[1] Lidong Zhou and Zygmunt J. Haas, IEEE, no. Network Security, pp. 1-12, November 1999.
[2] David B. Johnson b, Adrian Perrig Yih-Chun Hu a, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Elsevier, pp. 175-192, 2003.
[3] Undercoffer, J. Parker J, J. Pinkston, and A. Joshi, "On intrusion detection and response for mobile ad hoc networks," in Performance, Computing, and Communications, 2004 IEEE International Conference , USA, 2004, pp. 747-752.
[4] Jing Deng, Pramod K. Varshney, and Kashyap Balakrishnan Kejun Liu, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE, vol. 6, pp. 536-550, May 2007.
[5] N. Nasser, Guelph Univ. of Guelph, and Yunfeng Chen, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks," in Communications, 2007. ICC '07. IEEE International Conference, Glasgow, 2007, pp. 1154 - 1159.
[6] Evans, R.G. Yunseop Kim and W.M. Iversen, "Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network," IEEE, vol. 57, no. 7, pp. 1379 - 1387, May 2008.
[7] Jin-Shyan Lee and Hsinchu Ind. Technol. Res. Inst., "A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks," IEEE, vol. 55, no. 4, pp. 1835 - 1841, April 2008.
[8] Alessandro Bertacchini, Davide Brunelli, Luca Larcher, Luca Benini Denis Dondi, "Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks," IEEE, vol. 55, no. 7, pp. 2759-2766, July 2008.
[9] Xinwen Fu , Bryan Graham , Riccardo Bettati , Wei Zhao Ye Zhu, "On flow correlation attacks and countermeasures in mix networks," in PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies, Heidelberg, 2005, pp. 207-225.
[10] Wei Liu Yanchao Zhang, Wenjing Lou, and Yuguang Fang, "Anonymous handshakes in mobile ad hoc networks," in Military Communications Conference, 2004, pp. 1193 - 1199.
[11] Nan Kang, and Tarek R. Sheltami Elhadi M. Shakshuki, "EAACK—A Secure Intrusion-Detection System for MANETs," IEEE, vol. 60, no. 3, pp. 1089-1098, March 2013.
[12] ABIRAMI.S.P., KALYANI.R., SUBHASHRI.M., SUCHITHRA.R MS. M.PONNRAJAKUMARI, "A SECURE INTRUSION DETECTION USING IMPROVED EAACK IN MANETS," in 5th IRF International Conference, Chennai, 2014, pp. 41-47.
[13] Vairachilai.S Arockia Rubi.S, "A Survey on Intrusion Detection System in Mobile Adhoc Networks," International Journal of Computer Science and Mobile Computing, vol. 2, no. 12, pp. 389 – 393, December 2013.

Keywords
EAACK, MANET, AODV, RERR