SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS

ABSTRACT:
The migration to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it possible in many
applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork
(MANET) is one of the most important and unique applications.

On the contrary to traditional network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate
directly with each other when they are both within the same communication range. Otherwise,
they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET
made it popular among criticalmission applications like military use or emergency recovery.

However, the open medium and wide distribution of nodes make MANET vulnerable to
malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms
to protect MANET from attacks. With the improvements of the technology and cut in hardware
costs, we are witnessing a current trend of expanding MANETs into industrial applications. To
adjust to such trend, we strongly believe that it is vital to address its potential security issues.

In this paper, we propose and implement a new intrusion-detection system named Enhanced
Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to
contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in
certain circumstances while does not greatly affect the network performances.

More Related Content

What's hot

Wireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsWireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsPhdtopiccom
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...3JornadasRFID
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...ESUG
 
Wireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsWireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsNetwork Simulation Tools
 
Ieee 2015 2016 wireless Communications titles
Ieee 2015  2016 wireless Communications titles Ieee 2015  2016 wireless Communications titles
Ieee 2015 2016 wireless Communications titles pgembeddedsystem
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 

What's hot (11)

Wireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsWireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications Projects
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
2018.10.slide share
2018.10.slide share2018.10.slide share
2018.10.slide share
 
Wireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsWireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project Topics
 
Ieee 2015 2016 wireless Communications titles
Ieee 2015  2016 wireless Communications titles Ieee 2015  2016 wireless Communications titles
Ieee 2015 2016 wireless Communications titles
 
Wsn
WsnWsn
Wsn
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 

Viewers also liked

Dotnet successive interference cancellation carving out mac layer opportunities
Dotnet  successive interference cancellation carving out mac layer opportunitiesDotnet  successive interference cancellation carving out mac layer opportunities
Dotnet successive interference cancellation carving out mac layer opportunitiesEcwaytech
 
Projekt Kino Úsmev
Projekt Kino ÚsmevProjekt Kino Úsmev
Projekt Kino ÚsmevLubos Bibig
 
Отчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаОтчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаАлексей Арешев
 
Dotnet ranking on data manifold with sink points
Dotnet  ranking on data manifold with sink pointsDotnet  ranking on data manifold with sink points
Dotnet ranking on data manifold with sink pointsEcwaytech
 
Legislación y recursos musicales w
Legislación y recursos musicales wLegislación y recursos musicales w
Legislación y recursos musicales wNoemi Merlos
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdfCicero galvao
 
Neucon mailer-state-farm-r2
Neucon mailer-state-farm-r2Neucon mailer-state-farm-r2
Neucon mailer-state-farm-r2Misty Smith
 
Dotnet ontology matching state of the art and future challenges
Dotnet  ontology matching state of the art and future challengesDotnet  ontology matching state of the art and future challenges
Dotnet ontology matching state of the art and future challengesEcwaytech
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp nsEcwayt
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...Ecwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwaytech
 
Dotnet on centralized and localized approximation algorithms for interferenc...
Dotnet  on centralized and localized approximation algorithms for interferenc...Dotnet  on centralized and localized approximation algorithms for interferenc...
Dotnet on centralized and localized approximation algorithms for interferenc...Ecwaytech
 
Dotnet distributed web systems performance forecasting using turning bands m...
Dotnet  distributed web systems performance forecasting using turning bands m...Dotnet  distributed web systems performance forecasting using turning bands m...
Dotnet distributed web systems performance forecasting using turning bands m...Ecwaytech
 
An Initial Answer -- June 2014 Presbyterians Today
An Initial Answer -- June 2014 Presbyterians TodayAn Initial Answer -- June 2014 Presbyterians Today
An Initial Answer -- June 2014 Presbyterians TodayKristena Morse
 

Viewers also liked (17)

Dotnet successive interference cancellation carving out mac layer opportunities
Dotnet  successive interference cancellation carving out mac layer opportunitiesDotnet  successive interference cancellation carving out mac layer opportunities
Dotnet successive interference cancellation carving out mac layer opportunities
 
Projekt Kino Úsmev
Projekt Kino ÚsmevProjekt Kino Úsmev
Projekt Kino Úsmev
 
Отчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаОтчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 года
 
Dotnet ranking on data manifold with sink points
Dotnet  ranking on data manifold with sink pointsDotnet  ranking on data manifold with sink points
Dotnet ranking on data manifold with sink points
 
Legislación y recursos musicales w
Legislación y recursos musicales wLegislación y recursos musicales w
Legislación y recursos musicales w
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdf
 
Neucon mailer-state-farm-r2
Neucon mailer-state-farm-r2Neucon mailer-state-farm-r2
Neucon mailer-state-farm-r2
 
Dotnet ontology matching state of the art and future challenges
Dotnet  ontology matching state of the art and future challengesDotnet  ontology matching state of the art and future challenges
Dotnet ontology matching state of the art and future challenges
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
 
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Televicion tarea
Televicion tareaTelevicion tarea
Televicion tarea
 
Página 13
Página 13Página 13
Página 13
 
Dotnet on centralized and localized approximation algorithms for interferenc...
Dotnet  on centralized and localized approximation algorithms for interferenc...Dotnet  on centralized and localized approximation algorithms for interferenc...
Dotnet on centralized and localized approximation algorithms for interferenc...
 
Dotnet distributed web systems performance forecasting using turning bands m...
Dotnet  distributed web systems performance forecasting using turning bands m...Dotnet  distributed web systems performance forecasting using turning bands m...
Dotnet distributed web systems performance forecasting using turning bands m...
 
Página 14
Página 14Página 14
Página 14
 
An Initial Answer -- June 2014 Presbyterians Today
An Initial Answer -- June 2014 Presbyterians TodayAn Initial Answer -- June 2014 Presbyterians Today
An Initial Answer -- June 2014 Presbyterians Today
 

Similar to Dotnet eaack—a secure intrusion-detection system for mane ts

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcway Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsecwayerode
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...IEEEGLOBALSOFTTECHNOLOGIES
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsIEEEFINALYEARPROJECTS
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networksIEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEEMEMTECHSTUDENTPROJECTS
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
 

Similar to Dotnet eaack—a secure intrusion-detection system for mane ts (20)

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
 

Dotnet eaack—a secure intrusion-detection system for mane ts

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS ABSTRACT: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among criticalmission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances.