SlideShare a Scribd company logo
EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS
ABSTRACT:
The migration to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it possible in many
applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork
(MANET) is one of the most important and unique applications.
On the contrary to traditional network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate
directly with each other when they are both within the same communication range. Otherwise,
they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET
made it popular among criticalmission applications like military use or emergency recovery.
However, the open medium and wide distribution of nodes make MANET vulnerable to
malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms
to protect MANET from attacks. With the improvements of the technology and cut in hardware
costs, we are witnessing a current trend of expanding MANETs into industrial applications. To
adjust to such trend, we strongly believe that it is vital to address its potential security issues.
In this paper, we propose and implement a new intrusion-detection system named Enhanced
Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to
contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in
certain circumstances while does not greatly affect the network performances.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

What's hot

Defendec
DefendecDefendec
EnGenius AP MeshCam Introduction
EnGenius AP MeshCam IntroductionEnGenius AP MeshCam Introduction
EnGenius AP MeshCam Introduction
engeniushq
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
MiajackB
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
arpublication
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
ijfcst journal
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
arpublication
 
Air defense enterprise brochure
Air defense enterprise brochureAir defense enterprise brochure
Air defense enterprise brochure
Advantec Distribution
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
arpublication
 
International Journal on AdHoc Networking System (IJANS)
International Journal on AdHoc Networking System (IJANS)International Journal on AdHoc Networking System (IJANS)
International Journal on AdHoc Networking System (IJANS)
pijans
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN) International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
jackson130
 

What's hot (10)

Defendec
DefendecDefendec
Defendec
 
EnGenius AP MeshCam Introduction
EnGenius AP MeshCam IntroductionEnGenius AP MeshCam Introduction
EnGenius AP MeshCam Introduction
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS) International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)International Journal of VLSI & Communication Systems(IJCS)
International Journal of VLSI & Communication Systems(IJCS)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
Air defense enterprise brochure
Air defense enterprise brochureAir defense enterprise brochure
Air defense enterprise brochure
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal on AdHoc Networking System (IJANS)
International Journal on AdHoc Networking System (IJANS)International Journal on AdHoc Networking System (IJANS)
International Journal on AdHoc Networking System (IJANS)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN) International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 

Viewers also liked

Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Ecway Technologies
 
[YMC] Nội san Sức trẻ số 32
[YMC] Nội san Sức trẻ số 32[YMC] Nội san Sức trẻ số 32
[YMC] Nội san Sức trẻ số 32
Câu lạc bộ Truyền thông YMC
 
SMV- Green Matters 02-2012
SMV- Green Matters 02-2012SMV- Green Matters 02-2012
SMV- Green Matters 02-2012
Sean Van Delist
 
Artes visuales
Artes visualesArtes visuales
Artes visuales
AmadoRosas
 
[YMC] Nội san Sức trẻ số 31
[YMC] Nội san Sức trẻ số 31[YMC] Nội san Sức trẻ số 31
[YMC] Nội san Sức trẻ số 31
Câu lạc bộ Truyền thông YMC
 
[YMC] Nội san Sức trẻ số 29
[YMC] Nội san Sức trẻ số 29[YMC] Nội san Sức trẻ số 29
[YMC] Nội san Sức trẻ số 29
Câu lạc bộ Truyền thông YMC
 
Comercio electronico
Comercio electronicoComercio electronico
Comercio electronico
pierremcig12
 
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
Dotnet  maximum likelihood estimation from uncertain data in the belief funct...Dotnet  maximum likelihood estimation from uncertain data in the belief funct...
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
Ecway Technologies
 
Marketing plan = Karatbars = Inglês
Marketing plan = Karatbars = InglêsMarketing plan = Karatbars = Inglês
Marketing plan = Karatbars = Inglês
Grupo “Gold Team” (Equipe de Ouro)
 
[YMC] Nội san Sức trẻ số 33
[YMC] Nội san Sức trẻ số 33[YMC] Nội san Sức trẻ số 33
[YMC] Nội san Sức trẻ số 33
Câu lạc bộ Truyền thông YMC
 
5.2.4.1.1
5.2.4.1.15.2.4.1.1
5.2.4.1.1
Camilo_Rodriguez
 
Part 1 of bucher 1 last
Part 1 of bucher 1 lastPart 1 of bucher 1 last
Part 1 of bucher 1 last
arsalanhosseini
 
CV
CVCV
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Ecway Technologies
 
2016 EOY Launch brochure
2016 EOY Launch brochure2016 EOY Launch brochure
2016 EOY Launch brochure
Dean Radomsky
 

Viewers also liked (16)

Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...Dotnet  emap expedite message authentication protocol for vehicular ad hoc ne...
Dotnet emap expedite message authentication protocol for vehicular ad hoc ne...
 
[YMC] Nội san Sức trẻ số 32
[YMC] Nội san Sức trẻ số 32[YMC] Nội san Sức trẻ số 32
[YMC] Nội san Sức trẻ số 32
 
SMV- Green Matters 02-2012
SMV- Green Matters 02-2012SMV- Green Matters 02-2012
SMV- Green Matters 02-2012
 
Artes visuales
Artes visualesArtes visuales
Artes visuales
 
[YMC] Nội san Sức trẻ số 31
[YMC] Nội san Sức trẻ số 31[YMC] Nội san Sức trẻ số 31
[YMC] Nội san Sức trẻ số 31
 
[YMC] Nội san Sức trẻ số 29
[YMC] Nội san Sức trẻ số 29[YMC] Nội san Sức trẻ số 29
[YMC] Nội san Sức trẻ số 29
 
Comercio electronico
Comercio electronicoComercio electronico
Comercio electronico
 
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
Dotnet  maximum likelihood estimation from uncertain data in the belief funct...Dotnet  maximum likelihood estimation from uncertain data in the belief funct...
Dotnet maximum likelihood estimation from uncertain data in the belief funct...
 
Trung tâm gia sư giỏi nhất tp.hcm
Trung tâm gia sư giỏi nhất tp.hcmTrung tâm gia sư giỏi nhất tp.hcm
Trung tâm gia sư giỏi nhất tp.hcm
 
Marketing plan = Karatbars = Inglês
Marketing plan = Karatbars = InglêsMarketing plan = Karatbars = Inglês
Marketing plan = Karatbars = Inglês
 
[YMC] Nội san Sức trẻ số 33
[YMC] Nội san Sức trẻ số 33[YMC] Nội san Sức trẻ số 33
[YMC] Nội san Sức trẻ số 33
 
5.2.4.1.1
5.2.4.1.15.2.4.1.1
5.2.4.1.1
 
Part 1 of bucher 1 last
Part 1 of bucher 1 lastPart 1 of bucher 1 last
Part 1 of bucher 1 last
 
CV
CVCV
CV
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
2016 EOY Launch brochure
2016 EOY Launch brochure2016 EOY Launch brochure
2016 EOY Launch brochure
 

Similar to Dotnet eaack—a secure intrusion-detection system for mane ts

Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ecwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
ecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwayt
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ecwayt
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
IEEEFINALYEARPROJECTS
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
JPINFOTECH JAYAPRAKASH
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEEMEMTECHSTUDENTPROJECTS
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
prjpublications
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
ijiert bestjournal
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
Iaetsd Iaetsd
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
AM Publications
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
IJCNCJournal
 

Similar to Dotnet eaack—a secure intrusion-detection system for mane ts (20)

Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
 

Dotnet eaack—a secure intrusion-detection system for mane ts

  • 1. EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS ABSTRACT: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among criticalmission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com