SlideShare a Scribd company logo
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.40- 43
ISSN: 2278-2400
40
Secure Disclosure of Trespassing Mechanisms
using Digital Signature Algorithm
V.VishwaPriya1
, VijiVinod2
1
Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai
2
Professor, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai
E-mail: vishwapriya13@gmail.com, vijivinod@gmail.com
ABSTRACT-The migration to wireless network from wired
network has been a global trend in the past few decades. The
mobility and scalability brought by wireless network made it
possible in many applications. Among all the contemporary
wireless networks, Mobile Ad hoc NETwork (MOBILE AD-
HOC NETWORK) is one of the most important and unique
applications. On the contrary to traditional network
architecture, MOBILE AD-HOC NETWORK does not require
a fixed network infrastructure; every single node works as both
a transmitter and a receiver. Nodes communicate directly with
each other when they are both within the same communication
range. It is crucial to develop efficient intrusion-detection
mechanisms to protect MOBILE AD-HOC NETWORK from
attacks. With the improvements of the technology and cut in
hardware costs, we are witnessing a current trend of expanding
MOBILE AD-HOC NETWORKs into industrial application
I.Introduction
Wireless networks are always preferred since the first day of
their invention. Owing to the improved technology and
reduced costs, wireless networks have gained much more
preferences over wired networks in the past few
decades.Mobile Ad hoc NETwork (MOBILE AD-HOC
NETWORK) is a collection of mobile nodes equipped with
both a wireless transmitter and a receiver that communicate
with each other via bidirectional wireless links either directly
or indirectly.MOBILE AD-HOC NETWORK solves this
problem by allowing intermediate parties to relay data
transmissions. This is achieved by dividing MOBILE AD-
HOC NETWORK into two types of networks, namely, single-
hop and multihop. In a single-hop network, all nodes within the
same radio range communicate directly with each other. On the
other hand, in a multihop network, nodes rely on other
intermediate nodes to transmit if the destination node is out of
their radio range.
II.Review of Literature
The review of literature for secure disclosure for trespassing mobile ad-hoc network
S.
No.
Year Author Work
1 2012 R. H. Akbani, S.
Patel
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
2 2011 Ms. Usha Sakthivel Introduced a powerful decision support tool, data mining, in the context of knowledge
management
3 2010 Sunilkumar S.
Manvia
Routing Misbehavior Detection in MANETs Using 2ACK
4 2007 Kejun Liu Detection of Routing Misbehavior in mobile ad-hoc net.
III. Role Play for Secure Disclosure and Trespassing
System
Misbehavior Report Authentication (MRA):
The MRA scheme is designed to resolve the weakness of
watchdog with respect to the false misbehavior report. In this
source node checks the alternate route to reach destination.
Using the generated path if the packet reaches the destination
then it is concluded as the false report.
Digital Signature Validation:
In all the three parts of EAACK, namely, ACK, S-ACK, and
MRA, are acknowledgment-based detection schemes. They all
rely on acknowledgment packets to detect misbehaviors in the
network. Thus, it is extremely important to ensure that all
acknowledgment packets in EAACK are authentic and
untainted. Otherwise, if the attackers are smart enough to forge
acknowledgment packets, all of the three schemes will be
vulnerable.
River-Shamir-Adleman(RSA):
The typically embed some form of structured, randomized
padding into the value before encrypting it. This padding
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.40- 43
ISSN: 2278-2400
41
ensures that does not fall into the range of insecure plaintexts,
and that a given message, once padded, will encrypt to one of a
large number of different possible cipher texts. A cryptosystem
is called semantically secure if an attacker cannot distinguish
two encryptions from each other even if the attacker knows (or
has chosen) the corresponding plaintexts
Secure Disclosure
Secure the information without hacking our details by third
person. Information security specialists are almost always
found in any major area due to the nature and value of the data
within larger area. They are responsible for keeping all of the
technology within the company secure from malicious cyber
attacks that often attempt to breach into critical private
information or gain control of the internal systems. Secure a
node without hacking the information is a trusted node.
Trespassing Mechanism
The unauthorized entering into or upto tribal premises or
private property by any one person which has the result of
interfering with the conduct of tribal area .The unknown person
enter into our node theit will be suffer by violation. Control the
process without affecting the person information it will allow
the node to the system this is called trespassing mechanism
IV.Intrusion-Detection System in Mobile Ad-Hoc Network
in Secure Disclosure in Trepassing
We assume that other nodes always cooperate with each other
to relay data. This assumption leaves the attackers with the
opportunities to achieve significant impact on the network with
just one or two compromised nodes. To address this problem,
an INTRUSION-DETECTION SYSTEM should be added to
enhance the security level of MOBILE AD-HOC
NETWORKs. If MOBILE AD-HOC NETWORK can detect
the attackers as soon as they enter the network, we will be able
to completely eliminate the potential damages caused by
compromised nodes at the first time.
MOBILE AD-HOC NETWORK PROCESS
DIGITALSIGNATURE:
Digital signature is a widely adopted approach to ensure the
authentication, integrity, and non-repudiation of MOBILE AD-
HOC NETWORKs. Digital signature schemes can be mainly
divided into the following two categories.
1) Digital signature with appendix: The original message is
required in the signature verification algorithm (digital
signature algorithm (DSA)).
2) Digital signature with message recovery: This type of
scheme does not require any other information besides the
signature itself in the verification process (RSA).
Secure Acknowledgment (S-ACK)
In the S-ACK principle is to let every three consecutive nodes
work in a group to detect misbehaving nodes. For every three
consecutive nodes in the route, the third node is required to
send an S-ACK acknowledgment packet to the first node. The
intention of introducing S-ACK mode is to detect misbehaving
nodes in the presence of receiver collision or limited
transmission power.
ARCHITECTURE FOR DIGITAL SIGNATURE
DIGITAL SIGNATURE VALIDATION:
All three parts of EAACK, namely, ACK, S-ACK, and MRA,
are acknowledgment-based detection schemes. They all rely on
acknowledgment packets to detect misbehaviors in the
network. This scheme ensures that all acknowledgment packets
in EAACK are authentic and untainted. Otherwise, if the
attackers are smart enough to forge acknowledgment packets,
all of the three schemes will be vulnerable.
V. Digital Signature Algorithm:
The general flow of data communication with digital signature
is shown in above diagram.
Step1:
A fixed-length message digest is computed through a pre
agreed hash function H for every message m. This process can
be described as,
H (m) = d
Step2:
The sender Vishwa needs to apply its own private key Pr−
Vishwa on the computed message digest d. The result is a
signature Vishwa, which is attached to message m and
Vishwa’s secret private key,
SP
r−Vishwa(d) = Sig Vishwa
Step3:
To ensure the validity of the digital signature, the sender
Vishwa is obliged to always keep her private key Pr−Vishwa
as a secret without revealing to anyone else. Otherwise, if the
attacker Eve gets this secret private key, she can intercept the
message and easily forge malicious messages with Vishwa’s
signature and send them to Tamil. As these malicious messages
are digitally signed by Vishwa, Tamil sees them as legit and
authentic messages from Vishwa. Next, Vishwa can send a
message m along with the signature Vishwa to Tamil via an
unsecured channel. Tamil then computes the received message
m against the pre agreed hash function H to get the message
digest d. This process can be generalized as,
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.40- 43
ISSN: 2278-2400
42
H (m’) = d’
Tamil can verify the signature by applying Vishwa’s public
key Pk−Vishwa on SigAlice, by using
SP
k−Vishwa (SigVishwa) = d If d == d, then
it is safe to claim that the message m_ transmitted through an
unsecured channel is indeed sent from Vishwa and the
messages itself are intact.
DIGITAL SIGATURE PROCESS:
Vishwa Tamil
The Security of RIVEST-SHAMIR-ADLEMAN
Four possible approaches to attacking the RSA algorithm are:
• Brute force: This involves trying all possible private keys.
• Mathematical attacks:
There are several approaches, all equivalent in effort to
factoring the product of two primes.
• Timing attacks: These depend on the running time of the
decryption algorithm.
• Chosen cipher text attacks:
This type of attack exploits properties of the RSA algorithm.
The defense against the brute-force approach is the same for
RSA as for other cryptosystems, namely, to use a large key
space. Thus, the larger the number of bitsin d, the better.
However, because the calculations involved, both in key
generation and in encryption/ decryption, are complex, the
larger the size of the key, the slower the system will run.
Hash Function using Cryptography:
Plain text not recoverable from cipher text.
Hash function
Plain text Cipher text
 In hash function it will inserting the nodes into
budgets.
 The process should be in correct way.
 After finishing the process it send the node to proper
channel
Plain Text:
The text should be clean and clear understand of the sender the
it will encrypt after sending the plain text.
Cipher text:
This text will change our information to secret code then it will
convert to bytes and send to destination, when it reach
destination it will convert to cipher text to plain text.
Advantages and Limitations
Network Intrusion Detection Systems gain access to network
traffic by connecting to a hub, network switch configured for
port mirroring, or network tap.To minimize this effort a
specialized tool securing network and checking available
service.For each operating system different applications have
to be used, regardless they are doing exactly the same.All
malicious nodes to send out false misbehavior report to the
source node whenever it is possible. This scenario setting is
designed to test the INTRUSION-DETECTION SYSTEM’s
performance under the false misbehavior report. The
introduction of MRA scheme mainly contributes to this
performance. EAACK is the only scheme that is capable of
detecting false misbehavior report.We believe that this is
because EAACK is the only scheme which is capable of
detecting forged acknowledgment packets.
VI Result
Process Input
Client Request is the sample input of the project to get
responses from the server without disturbance of malicious
nodes. After given client request we have to check the trusted
nodes to send the request to server.
Process Output
Client Responses is the sample output of the project to receive
the data’s from server without disturbance of malicious nodes.
A server gets the request from client and it’s verified the node
and message without reached without disturbance of the
hackers.
VII Analysis
Using an algorithm to implement get best result
ONE PACKET DELIVERY RATIO
PDR Malicious node 0% Malicious node 10% Malicious node 20%
DSI 1 .82 .73
WATCH DOG 1 .83 .77
2ACK 1 .97 .96
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.40- 43
ISSN: 2278-2400
43
AACK 1 .96 .96
EAACK
(DSA)
1 .96 .97
EAACK
(RSA)
1 .96 .97
ANALYSIS FOR PDR
ONE ROUTING OVERHEAD
R O/H Maliciou
s node
0%
Malicious
node 10%
Malicious
node 20%
DSI .02 .023 .023
WATCH
DOG
.02 .025 .025
2ACK .18 .4 .43
AACK .03 .23 .32
EAACK
(DSA)
.15 .28 .35
EAACK
(RSA)
.16 .3 .37
ANALYSIS FOR R O/H
VIII CONCLUSION
A more efficient intrusion detection system is required. Among
existing distributed intrusion detection algorithms, anomaly
detection systems are more economic due to distributed nature
of ad hoc network. To give clear view about EAACK we have
presented details and implementation about EAACK. Our
mechanism is able to handle both detect malicious nodes with
the presence of false misbehavior report and forged
acknowledgment packets. Packet-dropping attack has always
been a major threat to the security in MOBILE AD-HOC
NETWORKs. In this research paper, we have proposed a novel
INTRUSION-DETECTION SYSTEM named EAACK
protocol specially designed for MOBILE AD-HOC
NETWORKs and compared it against other popular
mechanisms in different scenarios through simulations. The
results demonstrated positive performances against Watchdog,
TWOACK, and AACK in the cases of receiver collision,
limited transmission power, and false misbehavior report.
We plan to investigate the following issues in our future
research:
1) Possibilities of adopting hybrid cryptography techniques to
further reduce the network overhead caused by digital
signature.
2) Examine the possibilities of adopting a key exchange
mechanism to eliminate the requirement of pre-distributed
keys.
3) Testing the performance of EAACK in real network
environment instead of software simulation.
4) Possibilities of implementing hybrid cryptography
techniques to further reduce the network overhead caused by
security.
REFERENCES
[1] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B.
Viollet, “Which wireless technology for industrial wireless sensor
networks? The development of OCARI technol,” IEEE Trans. Ind.
Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.
[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network
Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York:
Springer-Verlag, 2012, pp. 659–666.
[3] R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc
networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana,
India, 2012, pp. 535–541.
[4] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad
Hoc Networks,” in Wireless/Mobile Security. New York: Springer-
Verlag, 2008.
[5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless
Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.

More Related Content

PDF
Investigation of detection & prevention sinkhole attack in manet
PPTX
Classification and review of security schemes
PDF
Ijarcet vol-2-issue-4-1322-1329
PDF
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
PDF
Ijcet 06 07_001
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
PDF
Ijretm 2014-sp-043
PPTX
Abdullah Mukhtar ppt
Investigation of detection & prevention sinkhole attack in manet
Classification and review of security schemes
Ijarcet vol-2-issue-4-1322-1329
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
Ijcet 06 07_001
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
Ijretm 2014-sp-043
Abdullah Mukhtar ppt

Similar to Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm (20)

PDF
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
PDF
G011123539
PDF
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
PDF
I1802046780
PDF
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
PDF
A Key Management Approach For Wireless Sensor Networks
PDF
A Key Management Approach For Wireless Sensor Networks
PDF
A Key Management Approach For Wireless Sensor Networks
PDF
Protocols for Wireless Sensor Networks and Its Security
PDF
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
PDF
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
PDF
Iaetsd baack better adaptive
PDF
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
PDF
A Security Overview of Wireless Sensor Network
PDF
Security in Wireless Sensor Networks Using Broadcasting
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Exclusion of Denial of Service Attack using Graph Theory in MANETS
PDF
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
PDF
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
PDF
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
G011123539
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
I1802046780
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Protocols for Wireless Sensor Networks and Its Security
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
Iaetsd baack better adaptive
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
A Security Overview of Wireless Sensor Network
Security in Wireless Sensor Networks Using Broadcasting
International Journal of Computational Engineering Research(IJCER)
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
Ad

More from ijcnes (20)

DOCX
A Survey of Ontology-based Information Extraction for Social Media Content An...
DOCX
Economic Growth of Information Technology (It) Industry on the Indian Economy
DOCX
An analysis of Mobile Learning Implementation in Shinas College of Technology...
DOCX
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
DOC
Challenges of E-government in Oman
DOC
Power Management in Micro grid Using Hybrid Energy Storage System
DOC
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
DOCX
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
DOCX
Feature Extraction in Content based Image Retrieval
DOCX
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
DOC
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
DOC
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
DOC
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
DOC
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
DOCX
Virtual Position based Olsr Protocol for Wireless Sensor Networks
DOC
Mitigation and control of Defeating Jammers using P-1 Factorization
DOC
An analysis and impact factors on Agriculture field using Data Mining Techniques
DOCX
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
DOCX
Priority Based Multi Sen Car Technique in WSN
DOC
Semantic Search of E-Learning Documents Using Ontology Based System
A Survey of Ontology-based Information Extraction for Social Media Content An...
Economic Growth of Information Technology (It) Industry on the Indian Economy
An analysis of Mobile Learning Implementation in Shinas College of Technology...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
Challenges of E-government in Oman
Power Management in Micro grid Using Hybrid Energy Storage System
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
Feature Extraction in Content based Image Retrieval
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Mitigation and control of Defeating Jammers using P-1 Factorization
An analysis and impact factors on Agriculture field using Data Mining Techniques
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
Priority Based Multi Sen Car Technique in WSN
Semantic Search of E-Learning Documents Using Ontology Based System
Ad

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
web development for engineering and engineering
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Well-logging-methods_new................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Construction Project Organization Group 2.pptx
Sustainable Sites - Green Building Construction
Operating System & Kernel Study Guide-1 - converted.pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
web development for engineering and engineering
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Safety Seminar civil to be ensured for safe working.
Well-logging-methods_new................
R24 SURVEYING LAB MANUAL for civil enggi
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CH1 Production IntroductoryConcepts.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
OOP with Java - Java Introduction (Basics)
Construction Project Organization Group 2.pptx

Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm

  • 1. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.40- 43 ISSN: 2278-2400 40 Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithm V.VishwaPriya1 , VijiVinod2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai 2 Professor, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai E-mail: vishwapriya13@gmail.com, vijivinod@gmail.com ABSTRACT-The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MOBILE AD- HOC NETWORK) is one of the most important and unique applications. On the contrary to traditional network architecture, MOBILE AD-HOC NETWORK does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. It is crucial to develop efficient intrusion-detection mechanisms to protect MOBILE AD-HOC NETWORK from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MOBILE AD-HOC NETWORKs into industrial application I.Introduction Wireless networks are always preferred since the first day of their invention. Owing to the improved technology and reduced costs, wireless networks have gained much more preferences over wired networks in the past few decades.Mobile Ad hoc NETwork (MOBILE AD-HOC NETWORK) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or indirectly.MOBILE AD-HOC NETWORK solves this problem by allowing intermediate parties to relay data transmissions. This is achieved by dividing MOBILE AD- HOC NETWORK into two types of networks, namely, single- hop and multihop. In a single-hop network, all nodes within the same radio range communicate directly with each other. On the other hand, in a multihop network, nodes rely on other intermediate nodes to transmit if the destination node is out of their radio range. II.Review of Literature The review of literature for secure disclosure for trespassing mobile ad-hoc network S. No. Year Author Work 1 2012 R. H. Akbani, S. Patel A Survey on Intrusion Detection in Mobile Ad Hoc Networks 2 2011 Ms. Usha Sakthivel Introduced a powerful decision support tool, data mining, in the context of knowledge management 3 2010 Sunilkumar S. Manvia Routing Misbehavior Detection in MANETs Using 2ACK 4 2007 Kejun Liu Detection of Routing Misbehavior in mobile ad-hoc net. III. Role Play for Secure Disclosure and Trespassing System Misbehavior Report Authentication (MRA): The MRA scheme is designed to resolve the weakness of watchdog with respect to the false misbehavior report. In this source node checks the alternate route to reach destination. Using the generated path if the packet reaches the destination then it is concluded as the false report. Digital Signature Validation: In all the three parts of EAACK, namely, ACK, S-ACK, and MRA, are acknowledgment-based detection schemes. They all rely on acknowledgment packets to detect misbehaviors in the network. Thus, it is extremely important to ensure that all acknowledgment packets in EAACK are authentic and untainted. Otherwise, if the attackers are smart enough to forge acknowledgment packets, all of the three schemes will be vulnerable. River-Shamir-Adleman(RSA): The typically embed some form of structured, randomized padding into the value before encrypting it. This padding
  • 2. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.40- 43 ISSN: 2278-2400 41 ensures that does not fall into the range of insecure plaintexts, and that a given message, once padded, will encrypt to one of a large number of different possible cipher texts. A cryptosystem is called semantically secure if an attacker cannot distinguish two encryptions from each other even if the attacker knows (or has chosen) the corresponding plaintexts Secure Disclosure Secure the information without hacking our details by third person. Information security specialists are almost always found in any major area due to the nature and value of the data within larger area. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Secure a node without hacking the information is a trusted node. Trespassing Mechanism The unauthorized entering into or upto tribal premises or private property by any one person which has the result of interfering with the conduct of tribal area .The unknown person enter into our node theit will be suffer by violation. Control the process without affecting the person information it will allow the node to the system this is called trespassing mechanism IV.Intrusion-Detection System in Mobile Ad-Hoc Network in Secure Disclosure in Trepassing We assume that other nodes always cooperate with each other to relay data. This assumption leaves the attackers with the opportunities to achieve significant impact on the network with just one or two compromised nodes. To address this problem, an INTRUSION-DETECTION SYSTEM should be added to enhance the security level of MOBILE AD-HOC NETWORKs. If MOBILE AD-HOC NETWORK can detect the attackers as soon as they enter the network, we will be able to completely eliminate the potential damages caused by compromised nodes at the first time. MOBILE AD-HOC NETWORK PROCESS DIGITALSIGNATURE: Digital signature is a widely adopted approach to ensure the authentication, integrity, and non-repudiation of MOBILE AD- HOC NETWORKs. Digital signature schemes can be mainly divided into the following two categories. 1) Digital signature with appendix: The original message is required in the signature verification algorithm (digital signature algorithm (DSA)). 2) Digital signature with message recovery: This type of scheme does not require any other information besides the signature itself in the verification process (RSA). Secure Acknowledgment (S-ACK) In the S-ACK principle is to let every three consecutive nodes work in a group to detect misbehaving nodes. For every three consecutive nodes in the route, the third node is required to send an S-ACK acknowledgment packet to the first node. The intention of introducing S-ACK mode is to detect misbehaving nodes in the presence of receiver collision or limited transmission power. ARCHITECTURE FOR DIGITAL SIGNATURE DIGITAL SIGNATURE VALIDATION: All three parts of EAACK, namely, ACK, S-ACK, and MRA, are acknowledgment-based detection schemes. They all rely on acknowledgment packets to detect misbehaviors in the network. This scheme ensures that all acknowledgment packets in EAACK are authentic and untainted. Otherwise, if the attackers are smart enough to forge acknowledgment packets, all of the three schemes will be vulnerable. V. Digital Signature Algorithm: The general flow of data communication with digital signature is shown in above diagram. Step1: A fixed-length message digest is computed through a pre agreed hash function H for every message m. This process can be described as, H (m) = d Step2: The sender Vishwa needs to apply its own private key Pr− Vishwa on the computed message digest d. The result is a signature Vishwa, which is attached to message m and Vishwa’s secret private key, SP r−Vishwa(d) = Sig Vishwa Step3: To ensure the validity of the digital signature, the sender Vishwa is obliged to always keep her private key Pr−Vishwa as a secret without revealing to anyone else. Otherwise, if the attacker Eve gets this secret private key, she can intercept the message and easily forge malicious messages with Vishwa’s signature and send them to Tamil. As these malicious messages are digitally signed by Vishwa, Tamil sees them as legit and authentic messages from Vishwa. Next, Vishwa can send a message m along with the signature Vishwa to Tamil via an unsecured channel. Tamil then computes the received message m against the pre agreed hash function H to get the message digest d. This process can be generalized as,
  • 3. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.40- 43 ISSN: 2278-2400 42 H (m’) = d’ Tamil can verify the signature by applying Vishwa’s public key Pk−Vishwa on SigAlice, by using SP k−Vishwa (SigVishwa) = d If d == d, then it is safe to claim that the message m_ transmitted through an unsecured channel is indeed sent from Vishwa and the messages itself are intact. DIGITAL SIGATURE PROCESS: Vishwa Tamil The Security of RIVEST-SHAMIR-ADLEMAN Four possible approaches to attacking the RSA algorithm are: • Brute force: This involves trying all possible private keys. • Mathematical attacks: There are several approaches, all equivalent in effort to factoring the product of two primes. • Timing attacks: These depend on the running time of the decryption algorithm. • Chosen cipher text attacks: This type of attack exploits properties of the RSA algorithm. The defense against the brute-force approach is the same for RSA as for other cryptosystems, namely, to use a large key space. Thus, the larger the number of bitsin d, the better. However, because the calculations involved, both in key generation and in encryption/ decryption, are complex, the larger the size of the key, the slower the system will run. Hash Function using Cryptography: Plain text not recoverable from cipher text. Hash function Plain text Cipher text  In hash function it will inserting the nodes into budgets.  The process should be in correct way.  After finishing the process it send the node to proper channel Plain Text: The text should be clean and clear understand of the sender the it will encrypt after sending the plain text. Cipher text: This text will change our information to secret code then it will convert to bytes and send to destination, when it reach destination it will convert to cipher text to plain text. Advantages and Limitations Network Intrusion Detection Systems gain access to network traffic by connecting to a hub, network switch configured for port mirroring, or network tap.To minimize this effort a specialized tool securing network and checking available service.For each operating system different applications have to be used, regardless they are doing exactly the same.All malicious nodes to send out false misbehavior report to the source node whenever it is possible. This scenario setting is designed to test the INTRUSION-DETECTION SYSTEM’s performance under the false misbehavior report. The introduction of MRA scheme mainly contributes to this performance. EAACK is the only scheme that is capable of detecting false misbehavior report.We believe that this is because EAACK is the only scheme which is capable of detecting forged acknowledgment packets. VI Result Process Input Client Request is the sample input of the project to get responses from the server without disturbance of malicious nodes. After given client request we have to check the trusted nodes to send the request to server. Process Output Client Responses is the sample output of the project to receive the data’s from server without disturbance of malicious nodes. A server gets the request from client and it’s verified the node and message without reached without disturbance of the hackers. VII Analysis Using an algorithm to implement get best result ONE PACKET DELIVERY RATIO PDR Malicious node 0% Malicious node 10% Malicious node 20% DSI 1 .82 .73 WATCH DOG 1 .83 .77 2ACK 1 .97 .96
  • 4. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.40- 43 ISSN: 2278-2400 43 AACK 1 .96 .96 EAACK (DSA) 1 .96 .97 EAACK (RSA) 1 .96 .97 ANALYSIS FOR PDR ONE ROUTING OVERHEAD R O/H Maliciou s node 0% Malicious node 10% Malicious node 20% DSI .02 .023 .023 WATCH DOG .02 .025 .025 2ACK .18 .4 .43 AACK .03 .23 .32 EAACK (DSA) .15 .28 .35 EAACK (RSA) .16 .3 .37 ANALYSIS FOR R O/H VIII CONCLUSION A more efficient intrusion detection system is required. Among existing distributed intrusion detection algorithms, anomaly detection systems are more economic due to distributed nature of ad hoc network. To give clear view about EAACK we have presented details and implementation about EAACK. Our mechanism is able to handle both detect malicious nodes with the presence of false misbehavior report and forged acknowledgment packets. Packet-dropping attack has always been a major threat to the security in MOBILE AD-HOC NETWORKs. In this research paper, we have proposed a novel INTRUSION-DETECTION SYSTEM named EAACK protocol specially designed for MOBILE AD-HOC NETWORKs and compared it against other popular mechanisms in different scenarios through simulations. The results demonstrated positive performances against Watchdog, TWOACK, and AACK in the cases of receiver collision, limited transmission power, and false misbehavior report. We plan to investigate the following issues in our future research: 1) Possibilities of adopting hybrid cryptography techniques to further reduce the network overhead caused by digital signature. 2) Examine the possibilities of adopting a key exchange mechanism to eliminate the requirement of pre-distributed keys. 3) Testing the performance of EAACK in real network environment instead of software simulation. 4) Possibilities of implementing hybrid cryptography techniques to further reduce the network overhead caused by security. REFERENCES [1] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. [2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666. [3] R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. [4] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. [5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.