Skip to main content

Using Hybrid Cryptography and Improved EAACK Develop Secure Intrusion Detection System for MANETs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 9))

Abstract

MANET is widely used in different areas, because it supports lots of feature. Day by day importance of wireless network increases. The issue in mantes are security, broadcasting, Packet dropping there for giving security to mantes is important. There are different types of attack such as misbehaving attack, wormhole attack, gray whole attack and flooding attack. In this paper, we study how the attack is detected or prevented. And finally using specific parameter, we measure performance. We study the EAACK algorithm, and it uses hybrid cryptography technique for reducing network overhead.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lakshmi SM, Bhavana S, Sujata T (2014) Enhancement of security levels using intrusion detection system in MANETs. IOSR–JCE. e-ISSN 2278-0661, ISSN 2278-8727

    Google Scholar 

  2. Anantvalee T, Wu J (2006) A survey on intrusion detection in mobile ad hoc networks. In: Wireless/mobile security. Springer, New York

    Google Scholar 

  3. Ruchita M, Seema L (2014) Review paper on flooding attack in MANET. Int J Eng Res Appl 4(1, Version 2):39–46. ISSN 2248-9622

    Google Scholar 

  4. Hally K, Gupta A, Pal D (2014) Mitigation of HTTP-GET flood attack. Int J Res Appl Sci Eng 2(XI). ISSN 2321-9653

    Google Scholar 

  5. Shakshuki LM (Senior Member, IEEE), Kang N, Sheltami TR (Member, IEEE) (2013) EAACK a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3)

    Google Scholar 

  6. Jathe SS, Dhamdhere V (2007) Hybrid cryptography for secure superior malicious behavior detection and prevention system for MANET’s. Int J Innov Res Sci Eng Technol (An ISO 3297:2007 Certified Organization) 4(7)

    Google Scholar 

  7. Nikam PD, Raut V (2014) Attacks prevention and detection techniques in MANET: a survey. J Eng Res Appl 4(11, Version 2):15–19. ISSN 2248-9622

    Google Scholar 

  8. Ramya K, Beaulah David and Shaheen (2014) Hybrid cryptography algorithms for enhanced adaptive acknowledgement secure in MANET. IOSR–JCE 16(1, Ver. VIII). e-ISSN 2278-0661, ISSN 2278-8727

    Google Scholar 

  9. Kang N, Shakshuki E, Sheltami T (2011) Detecting forged acknowledgements in MANETs. In: IEEE 25th international conference on AINA, Biopolis, Singapore, 22–25 Mar 2011, pp 488–494

    Google Scholar 

  10. Joshi P, Nande P, Pawar A, Shinde P, Umbrae R (2015) EAACK—secure intrusion detection system for MANETs. In: 2015 international conference on pervasive computing (ICPC), Jan 2015

    Google Scholar 

  11. Ferdous R, Muthukkumarasamy V (2010) Trust management scheme for mobile ad-hoc networks. In: 2010 10th IEEE international conference on computer and information technology (CIT 2010)

    Google Scholar 

  12. Suruthi B, Kumar NVR (2014) An enhanced intrusion detection system for MANETs using hybrid key cryptography. IJCSIT 5

    Google Scholar 

  13. Pattnaik O, Pani S (2012) Application of IDS in WSN: a survey. Int J Res Comput Commun Technol IJRCCT 1(7). ISSN 2278-5814

    Google Scholar 

  14. Thanikaivel B, Pranisa B (2012) Fast and secure data transmission in MANET. In: 2012 international conference on computer communication and informatics (ICCCI-2012), 10–12 Jan 2012, Coimbatore, India

    Google Scholar 

  15. Andhiya D, Sangeetha K, Latha RS (2012) Adaptive acknowledgement technique with key exchange mechanism for MANET

    Google Scholar 

  16. Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mobile Comput 6(5):536–550

    Article  Google Scholar 

  17. Buttyan L, Hubaux JP (2007) Security and cooperation in wireless networks. Cambridge University Press, Cambridge, U.K.

    Book  Google Scholar 

  18. Pahlevanzadeh B, Samsudin A (2007) Distributed hierarchical IDS for MANET over AODV. In: IEEE international conference on telecommunications an communications, May 2007, pp 99–104

    Google Scholar 

  19. Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocol—a review. J Comput Sci 3(8):574–582

    Article  Google Scholar 

Download references

Acknowledgements

I am mainly thankful to my guide Prof. Pankaj Chandre, who has provided guidance, expertise, and encouragement. Thanks to all those who helped me in completion of this work knowingly or unknowingly.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sharad Awatade .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Awatade, S., Chandre, P. (2018). Using Hybrid Cryptography and Improved EAACK Develop Secure Intrusion Detection System for MANETs. In: Mishra, D., Nayak, M., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Lecture Notes in Networks and Systems, vol 9. Springer, Singapore. https://doi.org/10.1007/978-981-10-3932-4_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3932-4_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3931-7

  • Online ISBN: 978-981-10-3932-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics