ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)

Publication Date:

Authors : ; ;

Page : 1178-1190

Keywords : Network Security; Open Source; IDS; Enhanced Adaptive ACKnowledgment (EAACK); Mobile Ad hoc NETwork (MANET);

Source : Downloadexternal Find it from : Google Scholarexternal


With the various and increasingly malicious attacks on networks and wireless systems, traditional security tools such as anti-virus programs and firewalls are not sufficient to provide free, integrated, reliable and secure networks. Intrusion detection systems (IDSs) are one of the most tested and reliable technologies to monitor incoming and outgoing network traffic to identify unauthorized usage and mishandling of computer system networks. It is critical to implement intrusion detection systems (IDSs) in computer networks that have high traffic. Due to the fact that software IDSs are able to detect all the growing threats to high-speed environments, such as flood attacks or Denial and Distributed Denial of Service Attacks, because the main function of these kinds of attacks is simply to send more traffic in high speed to systems to stop or slow down the performance of systems. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure. Every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we propose and implement a hybrid cryptography technique of diffie hell man key exchange algorithm with new energy constraint based intrusion-detection system named two tier Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviordetection rates in certain circumstances while does not greatly affect the network performances.

Last modified: 2014-05-31 18:25:18