SlideShare a Scribd company logo
1 of 1
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS

ABSTRACT:
The migration to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it possible in many
applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork
(MANET) is one of the most important and unique applications.

On the contrary to traditional network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate
directly with each other when they are both within the same communication range. Otherwise,
they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET
made it popular among criticalmission applications like military use or emergency recovery.

However, the open medium and wide distribution of nodes make MANET vulnerable to
malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms
to protect MANET from attacks. With the improvements of the technology and cut in hardware
costs, we are witnessing a current trend of expanding MANETs into industrial applications. To
adjust to such trend, we strongly believe that it is vital to address its potential security issues.

In this paper, we propose and implement a new intrusion-detection system named Enhanced
Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to
contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in
certain circumstances while does not greatly affect the network performances.

More Related Content

What's hot

Wireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsWireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsPhdtopiccom
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...3JornadasRFID
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...ESUG
 
Wireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsWireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsNetwork Simulation Tools
 
Ieee 2015 2016 wireless Communications titles
Ieee 2015  2016 wireless Communications titles Ieee 2015  2016 wireless Communications titles
Ieee 2015 2016 wireless Communications titles pgembeddedsystem
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 

What's hot (11)

Wireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications ProjectsWireless Sensor Networks Applications Projects
Wireless Sensor Networks Applications Projects
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
2018.10.slide share
2018.10.slide share2018.10.slide share
2018.10.slide share
 
Wireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project TopicsWireless Body Area Network Research Project Topics
Wireless Body Area Network Research Project Topics
 
Ieee 2015 2016 wireless Communications titles
Ieee 2015  2016 wireless Communications titles Ieee 2015  2016 wireless Communications titles
Ieee 2015 2016 wireless Communications titles
 
Wsn
WsnWsn
Wsn
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)International Journal of Wireless and Mobile Networking (IJWAMN)
International Journal of Wireless and Mobile Networking (IJWAMN)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 

Viewers also liked

Electric equivalent model for induction electrode less fluorescent lamps
Electric equivalent model for induction electrode less fluorescent lampsElectric equivalent model for induction electrode less fluorescent lamps
Electric equivalent model for induction electrode less fluorescent lampsEcwaytech
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksEcwaytech
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identificationEcwaytech
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwaytech
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Ecwaytech
 
Gesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personGesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personEcwaytech
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Ecwaytech
 
Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Ecwaytech
 
High efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticHigh efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticEcwaytech
 
Dual transformer less single-stage current source inverter with energy manage...
Dual transformer less single-stage current source inverter with energy manage...Dual transformer less single-stage current source inverter with energy manage...
Dual transformer less single-stage current source inverter with energy manage...Ecwaytech
 
Gps based fleet management system
Gps based fleet management systemGps based fleet management system
Gps based fleet management systemEcwaytech
 
High performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesHigh performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesEcwaytech
 
Dtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsDtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsEcwaytech
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Ecwaytech
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringEcwaytech
 

Viewers also liked (15)

Electric equivalent model for induction electrode less fluorescent lamps
Electric equivalent model for induction electrode less fluorescent lampsElectric equivalent model for induction electrode less fluorescent lamps
Electric equivalent model for induction electrode less fluorescent lamps
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identification
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...Gaussian versus uniform distribution for intrusion detection in wireless sens...
Gaussian versus uniform distribution for intrusion detection in wireless sens...
 
Gesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personGesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled person
 
Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...Harvesting aware energy management for time-critical wireless sensor networks...
Harvesting aware energy management for time-critical wireless sensor networks...
 
Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...
 
High efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolyticHigh efficiency asymmetrical half-bridge converter without electrolytic
High efficiency asymmetrical half-bridge converter without electrolytic
 
Dual transformer less single-stage current source inverter with energy manage...
Dual transformer less single-stage current source inverter with energy manage...Dual transformer less single-stage current source inverter with energy manage...
Dual transformer less single-stage current source inverter with energy manage...
 
Gps based fleet management system
Gps based fleet management systemGps based fleet management system
Gps based fleet management system
 
High performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economiesHigh performance resource allocation strategies for computational economies
High performance resource allocation strategies for computational economies
 
Dtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applicationsDtmf based human less boat control for oceanic research applications
Dtmf based human less boat control for oceanic research applications
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoring
 

Similar to Eaack—a secure intrusion detection system for mane ts

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcway Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsecwayerode
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...IEEEGLOBALSOFTTECHNOLOGIES
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsIEEEFINALYEARPROJECTS
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networksIEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEEMEMTECHSTUDENTPROJECTS
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
 

Similar to Eaack—a secure intrusion detection system for mane ts (20)

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
 

Eaack—a secure intrusion detection system for mane ts

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS ABSTRACT: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among criticalmission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances.