ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS

ABSTRACT:
The migration to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it possible in many
applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork
(MANET) is one of the most important and unique applications.

On the contrary to traditional network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate
directly with each other when they are both within the same communication range. Otherwise,
they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET
made it popular among criticalmission applications like military use or emergency recovery.

However, the open medium and wide distribution of nodes make MANET vulnerable to
malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms
to protect MANET from attacks. With the improvements of the technology and cut in hardware
costs, we are witnessing a current trend of expanding MANETs into industrial applications. To
adjust to such trend, we strongly believe that it is vital to address its potential security issues.

In this paper, we propose and implement a new intrusion-detection system named Enhanced
Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to
contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in
certain circumstances while does not greatly affect the network performances.

More Related Content

DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
PPTX
Machine-to-Machine communicatioN AKASH
DOCX
International Journal of VLSI & Communication Systems(IJCS)
DOCX
International Journal of VLSI & Communication Systems(IJCS)
PDF
International Journal of Wireless and Mobile Networking (IJWAMN)
PPTX
NATEG Days - Machine To Machine Communication
DOCX
International Journal on AdHoc Networking System (IJANS)
Eaack—a secure intrusion detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Machine-to-Machine communicatioN AKASH
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
International Journal of Wireless and Mobile Networking (IJWAMN)
NATEG Days - Machine To Machine Communication
International Journal on AdHoc Networking System (IJANS)

What's hot (11)

PPTX
Wireless Sensor Networks Applications Projects
PPTX
"Integration of wireless sensor technology, Internet tools y computational me...
ODP
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
PDF
2018.10.slide share
PPTX
Wireless Body Area Network Research Project Topics
DOCX
Ieee 2015 2016 wireless Communications titles
PPTX
PDF
International Journal of Wireless and Mobile Networking (IJWAMN)
PDF
International Journal of Wireless and Mobile Networking (IJWAMN)
DOCX
International Journal on AdHoc Networking Systems (IJANS)
DOCX
International Journal on AdHoc Networking Systems (IJANS)
Wireless Sensor Networks Applications Projects
"Integration of wireless sensor technology, Internet tools y computational me...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
2018.10.slide share
Wireless Body Area Network Research Project Topics
Ieee 2015 2016 wireless Communications titles
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
Ad

Viewers also liked (16)

PDF
A rough set-based incremental approach for updating approximations under dyna...
PDF
Delay optimal broadcast for multihop wireless networks using self-interferenc...
PDF
Distributed processing of probabilistic top k queries in wireless sensor netw...
PDF
Capacity of hybrid wireless mesh networks with random a ps
PDF
Adaptive network coding for broadband wireless access networks
PDF
A scalable server architecture for mobile presence services in social network...
PDF
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
PDF
Dynamic coverage of mobile sensor networks
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
DOCX
Afiche medio ambiente
PDF
Covering points of interest with mobile sensors
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Cross layer design of congestion control and power control in fast-fading wir...
PDF
An investigation on lte mobility management
A rough set-based incremental approach for updating approximations under dyna...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Distributed processing of probabilistic top k queries in wireless sensor netw...
Capacity of hybrid wireless mesh networks with random a ps
Adaptive network coding for broadband wireless access networks
A scalable server architecture for mobile presence services in social network...
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
Dynamic coverage of mobile sensor networks
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel assignment for throughput optimization in multichannel multiradio wir...
Afiche medio ambiente
Covering points of interest with mobile sensors
Clustering sentence level text using a novel fuzzy relational clustering algo...
Discovery and verification of neighbor positions in mobile ad hoc networks
Cross layer design of congestion control and power control in fast-fading wir...
An investigation on lte mobility management
Ad

Similar to Eaack—a secure intrusion detection system for mane ts (20)

PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Java eaack—a secure intrusion-detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Java eaack—a secure intrusion-detection system for mane ts
PDF
Secured Intrusion Protection System through EAACK in MANETS
DOCX
A study on secure intrusion detection system in wireless mane ts to increase ...
DOCX
Eaack—a secure intrusion detection system for manets ns2
DOCX
Eaack—a secure intrusion detection system for manets
DOCX
Eaack—a secure intrusion detection system for mane ts
DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
PDF
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
PPTX
Eaack—a secure intrusion detection.ppt
PDF
Iaetsd baack better adaptive
PDF
Intrusion detection system for manets a secure eaack
PDF
An intrusion detection system for detecting malicious nodes in manet using tr...
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
PPTX
EAACK-A Secure Intrusion Detection System Overview
PDF
Attacks Prevention and Detection Techniques In MANET: A Survey
PDF
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Eaack—a secure intrusion detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Secured Intrusion Protection System through EAACK in MANETS
A study on secure intrusion detection system in wireless mane ts to increase ...
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for mane ts
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Eaack—a secure intrusion detection.ppt
Iaetsd baack better adaptive
Intrusion detection system for manets a secure eaack
An intrusion detection system for detecting malicious nodes in manet using tr...
Adopting hybrid cryptography technique for reduction of network overhead in m...
EAACK-A Secure Intrusion Detection System Overview
Attacks Prevention and Detection Techniques In MANET: A Survey
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...

More from ecwayprojects (20)

PDF
Model based analysis of wireless system architectures for real-time applications
PDF
Min max a counter-based algorithm for regular expression matching
PDF
Mining semantic context information for intelligent video surveillance of tra...
PDF
Microarchitecture of a coarse grain out-of-order superscalar processor
PDF
Maximum likelihood estimation from uncertain data in the belief function fram...
PDF
Localization based radio model calibration for fault-tolerant wireless mesh n...
PDF
Large graph analysis in the g mine system
DOCX
Large graph analysis in the g mine system
PDF
In network estimation with delay constraints in wireless sensor networks
PDF
Importance of coherence protocols with network applications on multicore proc...
PDF
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
PDF
Harvesting aware energy management for time-critical wireless sensor networks...
PDF
Gaussian versus uniform distribution for intrusion detection in wireless sens...
PDF
Finding rare classes active learning with generative and discriminative models
PDF
Fast channel zapping with destination oriented multicast for ip video delivery
PDF
Fast activity detection indexing for temporal stochastic automaton based acti...
PDF
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
PDF
Event tracking for real time unaware sensitivity analysis
PDF
Emap expedite message authentication protocol for vehicular ad hoc networks
PDF
Distributed web systems performance forecasting using turning bands method
Model based analysis of wireless system architectures for real-time applications
Min max a counter-based algorithm for regular expression matching
Mining semantic context information for intelligent video surveillance of tra...
Microarchitecture of a coarse grain out-of-order superscalar processor
Maximum likelihood estimation from uncertain data in the belief function fram...
Localization based radio model calibration for fault-tolerant wireless mesh n...
Large graph analysis in the g mine system
Large graph analysis in the g mine system
In network estimation with delay constraints in wireless sensor networks
Importance of coherence protocols with network applications on multicore proc...
Idm an indirect dissemination mechanism for spatial voice interaction in netw...
Harvesting aware energy management for time-critical wireless sensor networks...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Finding rare classes active learning with generative and discriminative models
Fast channel zapping with destination oriented multicast for ip video delivery
Fast activity detection indexing for temporal stochastic automaton based acti...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Event tracking for real time unaware sensitivity analysis
Emap expedite message authentication protocol for vehicular ad hoc networks
Distributed web systems performance forecasting using turning bands method

Eaack—a secure intrusion detection system for mane ts

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS ABSTRACT: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among criticalmission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances.