ID SECURITY SYSTEM IN HIGH TRAFFIC FOR MOBILE ADHOC NETWORK USING ACKNOWLEDGEMENTS
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)Publication Date: 2014-05-30
Authors : Asha N; Gowtham M;
Page : 1178-1190
Keywords : Network Security; Open Source; IDS; Enhanced Adaptive ACKnowledgment (EAACK); Mobile Ad hoc NETwork (MANET);
Abstract
With the various and increasingly malicious attacks on networks and wireless systems, traditional security tools such as anti-virus programs and firewalls are not sufficient to provide free, integrated, reliable and secure networks. Intrusion detection systems (IDSs) are one of the most tested and reliable technologies to monitor incoming and outgoing network traffic to identify unauthorized usage and mishandling of computer system networks. It is critical to implement intrusion detection systems (IDSs) in computer networks that have high traffic. Due to the fact that software IDSs are able to detect all the growing threats to high-speed environments, such as flood attacks or Denial and Distributed Denial of Service Attacks, because the main function of these kinds of attacks is simply to send more traffic in high speed to systems to stop or slow down the performance of systems. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure. Every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we propose and implement a hybrid cryptography technique of diffie hell man key exchange algorithm with new energy constraint based intrusion-detection system named two tier Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviordetection rates in certain circumstances while does not greatly affect the network performances.
Other Latest Articles
- AN APPROACH TOWARDS REMOVAL OF COMPARABLE ASPECTS BY ACCUMULATING QUERIES?
- ANALYSIS OF PROTECTIVE SYSTEM FOR HIGH VOLTAGE LINES USING PROTOCOL IEC 61850?
- A Survey on Energy Efficient Clustering Protocols for Wireless Sensor Network?
- Java Based Serial Data Logging System
- Design and Implementation of Bluetooth Based Data Logging of Processed Real Time Signal Using PIC16F877A?
Last modified: 2014-05-31 18:25:18