ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security Providence in MANET?s through RSA-KEM Algorithm

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.2, No. 7)

Publication Date:

Authors : ;

Page : 35-42

Keywords : Digital signature; digital signature algorithm (DSA)Key-Encapsulation Mechanism(KEM); Enhanced Adaptive Acknowledgment (AACK) (EAACK)Mobile Ad hoc Network (MANET);

Source : Downloadexternal Find it from : Google Scholarexternal


Opposed to infrastructure wireless networks, where each user directly communicates with an access point or base station, a mobile Ad hoc network, or MANET, does not rely on a fixed infrastructure for its operation. The network is an autonomous transitory association of mobile nodes that communicate with each other over wireless links. Nodes that lie within each other?s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other?s send range, intermediate nodes act as routers.Every single node works as both a transmitter anda receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks (Dos) and incapable to execute computation-heavy algorithms like public key algorithms; in MANETs, there are more probabilities for trusted node being compromised and we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with.. The self-con?guring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.

Last modified: 2021-07-08 15:13:55