Security Providence in MANET?s through RSA-KEM Algorithm
Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.2, No. 7)Publication Date: 2014-07-05
Authors : K. Sree Divya G. Anusha K. Santhi;
Page : 35-42
Keywords : Digital signature; digital signature algorithm (DSA)Key-Encapsulation Mechanism(KEM); Enhanced Adaptive Acknowledgment (AACK) (EAACK)Mobile Ad hoc Network (MANET);
Abstract
Opposed to infrastructure wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes that lie within each other?s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other?s send range, intermediate nodes act as routers.Every single node works as both a transmitter anda receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with.. The self-con?guring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Other Latest Articles
- Simulation of Waiting Line System Using Single-Line Multiple-Channel Models: A Case Study of NNPC Mega Stations in Owerri and Enugu State, Nigeria
- Ground Bounce Noise Reduction Using Power Gating Techniques
- Process of Detecting Barcodes Using Image Processing
- Android Mobile Phone Controlled Bluetooth Robot Using 8051 Microcontroller
- Noise Reduction in Mobile Phone by Using FIR, IIR and Adaptive Filter
Last modified: 2021-07-08 15:13:55