SlideShare a Scribd company logo
A Secure Intrusion-Detection 
System for MANETs using EAACK 
scheme 
1 
By 
Kshirsagar Sachin Laxman 
WCE sangli.
Content 
EAACK-Secure IDS For MANET's 
2 
 Introduction 
 Problem Statement 
 Objectives 
 Methodology 
 References
Introduction to MANETs 
EAACK-Secure IDS For MANET's 
3 
 Mobile Ad hoc Network(MANET) – 
collection of mobile nodes equipped 
with both a wireless transmitter and a 
receiver that communicate with each other 
via bidirectional wireless links 
 No need of infrastructue 
 Vulnerable to malicious attacks
Types 
EAACK-Secure IDS For MANET's 
4 
 single-hop network: 
-Nodes communicate directly 
 multi-hop network : 
-relay of messages by neighbors
IDS in MANET 
EAACK-Secure IDS For MANET's 
5 
 Assumption that all nodes cooperate 
 Significant impact if some nodes are 
compromised 
 IDS work as a second layer in MANETS
IDS in MANET 
EAACK-Secure IDS For MANET's 
6 
 Watchdog 
 TWOACK 
 AACK
Watchdog 
EAACK-Secure IDS For MANET's 
7 
 Watchdog and pathrater 
 capable of detecting malicious nodes misbehaviors 
in network 
 if node fails to forward packet within time, 
increases failure counter
Problems with Watchdog 
EAACK-Secure IDS For MANET's 
8 
1. False Misbehavior : 
 Node A sends back a misbehavior report even 
through node B forwarded the packet to C 
Fig:False Misbehavior
9 
2. Limited Transmission Power: 
 Node B intentionally limits its transmission power 
EAACK-Secure IDS For MANET's
EAACK-Secure IDS For MANET's 
10 
3)Receiver collision
TWOACK 
EAACK-Secure IDS For MANET's 
11 
 resolve receiver collision and limited transmission 
power problem 

AACK 
EAACK-Secure IDS For MANET's 
12 
combination of TACK and end to end ACK 
first ACK is used if it fails switch to TACK
Digital Signature 
EAACK-Secure IDS For MANET's 
13 
 Digital Signature is an authentication mechanism 
which Provide valid acknowledgement in manet. 
Fig: communication with Digital signature
Problem Statement 
EAACK-Secure IDS For MANET's 
14 
 Design and implementation of an intrusion detection system 
for Mobile Adhoc Networks using EAACK scheme.
Objectives 
EAACK-Secure IDS For MANET's 
15 
 Study of different Intrusion Detection Systems for MANETs 
 Study of NS2 and other required softwares. 
 Implementation of IDS for MANETs using 
EAACK scheme. 
 Use of digital signatures in the EAACK scheme. 
 Comparison of EAACK performance analysis with other 
contemporary approaches like ACK and TWOACK
EAACK 
EAACK-Secure IDS For MANET's 
16 
 Enhanced Adaptive ACKnowledgement 
 Solves 3 problems with watchdog 
 EAACK consists of three major parts: 
1.ACK 
2.S-ACK 
3.MRA
ACK 
EAACK-Secure IDS For MANET's 
17 
 Basically end to end acknowledgement. 
Works as hybrid scheme in EAACK
S-ACK 
EAACK-Secure IDS For MANET's 
18 
 improved version of TWOACK 
 let every three consecutive nodes work in a group 
to detect misbehaving nodes. 
 misbehavior report switch the system to MRA 
mode
MRA 
EAACK-Secure IDS For MANET's 
19 
resolve weakness of watchdog of detecting misbehaving 
nodes. 
a) Source node 
1)checks local knowledge base 
2)if no path use DSR and send MRA to destination 
b)Destination node 
1)checks local knowledge base 
2)if packet received then falsify the report
EAACK-Secure IDS For MANET's 
20
Refferences 
EAACK-Secure IDS For MANET's 
21 
[1] EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, 
Nan Kang and Tarek R. Sheltami, Member, IEEE 
[2]K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the 
detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5 pp. 536–550 
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile adhhoc networks,” 
in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265 
[4] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in 
presence of misbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15 no. 5, pp. 273–282, Oct. 
2009. 
[5] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile networks,” IEEE Trans. Ind. 
Electron., vol. 55, no. 4,pp. 1835–1841, Apr. 2008. 
[6] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. 
IEEE 25th Int. Conf. AINA, Biopolis Singapore, Mar. 22–25, 2011, pp. 488–494. 
[7] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards 
Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
EAACK-Secure IDS For MANET's 
22 
THANK YOU

More Related Content

PPTX
EAACK-A Secure Intrusion Detection System Overview
PPTX
Enhanced Adaptive ACKnowledgment (EAACK)
PPT
eaack-a secure ids for manet
PPTX
Intrusion detection in MANETS
PDF
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
DOCX
Eaack—a secure intrusion detection system for manets ns2
DOCX
Eaack—a secure intrusion detection system for manets
PPTX
Improved eaack develop secure intrusion detection system for mane ts using hy...
EAACK-A Secure Intrusion Detection System Overview
Enhanced Adaptive ACKnowledgment (EAACK)
eaack-a secure ids for manet
Intrusion detection in MANETS
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets
Improved eaack develop secure intrusion detection system for mane ts using hy...

What's hot (20)

DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
PDF
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
PDF
Intrusion detection system for manets a secure eaack
PPT
Security in WSN
PDF
Wireless sensor network wireless network
PPTX
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
PPTX
Wireless Sensor Networks
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
PPT
Security and privacy in Wireless Sensor Networks
PPT
Data retrieval in sensor networks
PPTX
6. security in wireless sensor netwoks
PPT
WIRELESS SENSOR NETWORKS
PDF
Reliability analysis for wireless sensor networks
PPTX
mobile ad-hoc network (MANET) and its applications
PDF
Wireless Multimedia Sensor Networks
PDF
Scalability in wireless sensor networks
PPTX
WIRELESS SENSOR NETWORK
PPT
Wireless Sensor Network
PPTX
Intrusion detection systems in wireless sensor networks
Eaack—a secure intrusion detection system for mane ts
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
Intrusion detection system for manets a secure eaack
Security in WSN
Wireless sensor network wireless network
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Wireless Sensor Networks
Wireless sensor Network using Zero Knowledge Protocol ppt
Security and privacy in Wireless Sensor Networks
Data retrieval in sensor networks
6. security in wireless sensor netwoks
WIRELESS SENSOR NETWORKS
Reliability analysis for wireless sensor networks
mobile ad-hoc network (MANET) and its applications
Wireless Multimedia Sensor Networks
Scalability in wireless sensor networks
WIRELESS SENSOR NETWORK
Wireless Sensor Network
Intrusion detection systems in wireless sensor networks
Ad

Viewers also liked (20)

PPSX
Intrusion detection system
PPT
Manet ns2
PPTX
Mobile Ad hoc Networks
PPTX
Final Year Project Presentation
PPTX
Network simulator 2
PDF
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
PDF
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
PPTX
Bat Algorithm
DOC
Dss digital signature standard and dsa algorithm
PDF
Akshayappt
PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
PPT
Digital signature
PPTX
AODV Protocol
PPT
Attacks in MANET
PPTX
RSA ALGORITHM
PPTX
Digital signature
PDF
Digital signatures
PPT
Public Key Cryptography and RSA algorithm
PPT
Digital signature
PDF
RSA ALGORITHM
Intrusion detection system
Manet ns2
Mobile Ad hoc Networks
Final Year Project Presentation
Network simulator 2
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Bat Algorithm
Dss digital signature standard and dsa algorithm
Akshayappt
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature
AODV Protocol
Attacks in MANET
RSA ALGORITHM
Digital signature
Digital signatures
Public Key Cryptography and RSA algorithm
Digital signature
RSA ALGORITHM
Ad

Similar to Eaack—a secure intrusion detection.ppt (20)

PDF
Secured Intrusion Protection System through EAACK in MANETS
DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
PDF
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Java eaack—a secure intrusion-detection system for mane ts
PDF
Java eaack—a secure intrusion-detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
PDF
Iaetsd baack better adaptive
PDF
50120140507006
PDF
50120140507006
PDF
A Novel Acknowledgement based Intrusion Detection System for MANETs
PDF
Attacks Prevention and Detection Techniques In MANET: A Survey
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
Secured Intrusion Protection System through EAACK in MANETS
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Eaack—a secure intrusion detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Adopting hybrid cryptography technique for reduction of network overhead in m...
Iaetsd baack better adaptive
50120140507006
50120140507006
A Novel Acknowledgement based Intrusion Detection System for MANETs
Attacks Prevention and Detection Techniques In MANET: A Survey
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PPTX
web development for engineering and engineering
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Construction Project Organization Group 2.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Digital Logic Computer Design lecture notes
Sustainable Sites - Green Building Construction
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Geodesy 1.pptx...............................................
composite construction of structures.pdf
web development for engineering and engineering
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Construction Project Organization Group 2.pptx
573137875-Attendance-Management-System-original
CYBER-CRIMES AND SECURITY A guide to understanding
Structs to JSON How Go Powers REST APIs.pdf
Lesson 3_Tessellation.pptx finite Mathematics
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
OOP with Java - Java Introduction (Basics)
Digital Logic Computer Design lecture notes

Eaack—a secure intrusion detection.ppt

  • 1. A Secure Intrusion-Detection System for MANETs using EAACK scheme 1 By Kshirsagar Sachin Laxman WCE sangli.
  • 2. Content EAACK-Secure IDS For MANET's 2  Introduction  Problem Statement  Objectives  Methodology  References
  • 3. Introduction to MANETs EAACK-Secure IDS For MANET's 3  Mobile Ad hoc Network(MANET) – collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links  No need of infrastructue  Vulnerable to malicious attacks
  • 4. Types EAACK-Secure IDS For MANET's 4  single-hop network: -Nodes communicate directly  multi-hop network : -relay of messages by neighbors
  • 5. IDS in MANET EAACK-Secure IDS For MANET's 5  Assumption that all nodes cooperate  Significant impact if some nodes are compromised  IDS work as a second layer in MANETS
  • 6. IDS in MANET EAACK-Secure IDS For MANET's 6  Watchdog  TWOACK  AACK
  • 7. Watchdog EAACK-Secure IDS For MANET's 7  Watchdog and pathrater  capable of detecting malicious nodes misbehaviors in network  if node fails to forward packet within time, increases failure counter
  • 8. Problems with Watchdog EAACK-Secure IDS For MANET's 8 1. False Misbehavior :  Node A sends back a misbehavior report even through node B forwarded the packet to C Fig:False Misbehavior
  • 9. 9 2. Limited Transmission Power:  Node B intentionally limits its transmission power EAACK-Secure IDS For MANET's
  • 10. EAACK-Secure IDS For MANET's 10 3)Receiver collision
  • 11. TWOACK EAACK-Secure IDS For MANET's 11  resolve receiver collision and limited transmission power problem 
  • 12. AACK EAACK-Secure IDS For MANET's 12 combination of TACK and end to end ACK first ACK is used if it fails switch to TACK
  • 13. Digital Signature EAACK-Secure IDS For MANET's 13  Digital Signature is an authentication mechanism which Provide valid acknowledgement in manet. Fig: communication with Digital signature
  • 14. Problem Statement EAACK-Secure IDS For MANET's 14  Design and implementation of an intrusion detection system for Mobile Adhoc Networks using EAACK scheme.
  • 15. Objectives EAACK-Secure IDS For MANET's 15  Study of different Intrusion Detection Systems for MANETs  Study of NS2 and other required softwares.  Implementation of IDS for MANETs using EAACK scheme.  Use of digital signatures in the EAACK scheme.  Comparison of EAACK performance analysis with other contemporary approaches like ACK and TWOACK
  • 16. EAACK EAACK-Secure IDS For MANET's 16  Enhanced Adaptive ACKnowledgement  Solves 3 problems with watchdog  EAACK consists of three major parts: 1.ACK 2.S-ACK 3.MRA
  • 17. ACK EAACK-Secure IDS For MANET's 17  Basically end to end acknowledgement. Works as hybrid scheme in EAACK
  • 18. S-ACK EAACK-Secure IDS For MANET's 18  improved version of TWOACK  let every three consecutive nodes work in a group to detect misbehaving nodes.  misbehavior report switch the system to MRA mode
  • 19. MRA EAACK-Secure IDS For MANET's 19 resolve weakness of watchdog of detecting misbehaving nodes. a) Source node 1)checks local knowledge base 2)if no path use DSR and send MRA to destination b)Destination node 1)checks local knowledge base 2)if packet received then falsify the report
  • 20. EAACK-Secure IDS For MANET's 20
  • 21. Refferences EAACK-Secure IDS For MANET's 21 [1] EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE [2]K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5 pp. 536–550 [3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile adhhoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265 [4] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence of misbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15 no. 5, pp. 273–282, Oct. 2009. [5] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4,pp. 1835–1841, Apr. 2008. [6] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis Singapore, Mar. 22–25, 2011, pp. 488–494. [7] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
  • 22. EAACK-Secure IDS For MANET's 22 THANK YOU