Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

EAACK: Secure IDS for Wireless Sensor Networks

JALAGAM NAGAMANI, K.SUMALATHA, , ,
Affiliations
M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
:NOT ASSIGNED


Abstract
The migration to wireless network from wired network has been a global trend in the past few decades.The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new technique EAACK (Enhanced Adaptive Acknowledgement) method designed for MANET was proposed for intrusion detection.EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.


Citation
JALAGAM NAGAMANI,K.SUMALATHA."EAACK: Secure IDS for Wireless Sensor Networks". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 06,pp.461-469, DECEMBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I617.pdf,


Keywords : Keywords- EAACK (Enhanced Adaptive Acknowledgement), IBOOS (Identity Based Online/Offline Signature),SACK (Selective Acknowledgement), Packet dropping, Watchdog scheme.

References
[1] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B.‖Viollet,‖“Which‖wireless‖ technology for industrial wireless sensor networks?‖ The‖ development‖ of‖ OCARI‖ technol,”‖ IEEE Trans. Ind. Elec- tron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. 
[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile‖ Ad‖ hoc‖ Net- work‖ Security,”‖ in‖ Lecture‖ Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666. 
[3]‖R.‖H.‖Akbani,‖S.‖Patel,‖and‖D.‖C.‖Jinwala,‖“DoS‖ attacks‖ in‖ mobile‖ ad‖ hoc‖ networks:‖ A‖ survey,”‖ in‖ Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. 
[4]‖ T.‖ Anantvalee‖ and‖ J.‖ Wu,‖ “A‖ Survey‖ on‖ Intrusion‖Detection‖in‖Mobile‖Ad‖Hoc‖Networks,”‖ in Wireless/Mobile Security. New York: SpringerVerlag, 2008. 
[5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
 [6] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher,‖ and‖ L.‖ Benini,‖ “Model- ing and optimization of a solar energy harvester system for self-powered‖ wireless‖ sensor‖ networks,”‖ IEEE‖ Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008. 
[7]‖ V.‖ C.‖ Gungor‖ and‖ G.‖ P.‖ Hancke,‖ “Industrial‖ wireless sensor networks: Challenges, design principles,‖ and‖ technical‖ approach,”‖ IEEE‖ Trans.‖ Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009. 
[8] Y. Hu, D. Johnson, and A. Perrig,‖ “SEAD:‖ Secure‖ efficient‖ distance‖ vector‖ routing‖ for‖mobile‖ wireless‖ ad‖ hoc‖ networks,”‖ in‖ Proc.‖ 4th‖ IEEE‖ Workshop Mobile Comput. Syst. Appl., 2002, pp. 3–13. 
[9]‖Y.‖Hu,‖A.‖Perrig,‖ and‖D.‖ Johnson,‖ “ARIADNE:‖ A secure on-demand rout- ing protocol for ad hoc networks,”‖in‖Proc.‖8th‖ACM‖Int.‖Conf.‖MobiCom,‖ Atlanta, GA, 2002, pp. 12–23. 
[10]‖ G.‖ Jayakumar‖ and‖ G.‖ Gopinath,‖ “Ad‖ hoc‖ mobile wireless networks rout- ing protocol—A review,”‖J.‖Comput.‖Sci.,‖vol.‖3,‖no.‖8,‖pp.‖574–582, 2007. 
[11] D. Johnson and D. Maltz,‖ “Dynamic‖ Source‖ Routing‖ in‖ ad‖ hoc‖ wireless‖ networks,”‖ in‖ Mobile‖ Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181. 
[12] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting‖ misbehaving‖ nodes‖ in‖ MANETs,”‖ in‖ Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8– 10, 2010, pp. 216–222. 
[13] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting‖ forged‖ acknowl- edgements in MANETs,”‖ in‖ Proc.‖ IEEE‖ 25th‖ Int.‖ Conf.‖ AINA,‖ Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494. 
[14] K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile‖ ad-hoc commu- nications in AEC industry,”‖ J.‖ Inf.‖ Technol.‖ Const.,‖ vol.‖ 9,‖ pp.‖ 313– 323, 2004. 
[15] J.-S.‖ Lee,‖ “A‖ Petri‖ net‖ design‖ of‖ command‖ filters‖ for‖ semiautonomous‖ mobile‖ sensor‖ networks,”‖ IEEE‖ Trans.‖ Ind.‖ Electron.,‖ vol.‖ 55,‖ no.‖ 4, pp. 1835–1841, Apr. 2008. 
[16] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan,‖ “An‖ acknowledgment-based approach for the detection of routing misbehaviour‖ in‖ MANETs,”‖ IEEE‖ Trans.‖ Mobile‖ Comput., vol. 6, no. 5, pp. 536–550, May 2007. 
[17] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating‖ routing‖ misbe- haviour in mobile ad hoc‖ networks,”‖ in‖ Proc.‖ 6th‖ Annu.‖ Int.‖ Conf.‖ Mobile Comput. Netw., Boston, MA, 2000, pp. 255– 265. 
[18] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37. 
[19]‖ N.‖ Nasser‖ and‖ Y.‖ Chen,‖ “Enhanced‖ intrusion‖ detection systems for dis- covering malicious nodes in mobile ad hoc‖network,”‖in‖Proc.‖IEEE‖Int.‖ Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159. 
[20] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi,‖ “On‖ intrusion‖ detection‖ and‖ response‖ for‖ mobile‖ ad‖hoc‖networks,”‖in‖Proc.‖ IEEE‖ Int.‖Conf.‖ Perform., Comput., Commun., 2004, pp. 747–752. 
[21]‖ A.‖ Patcha‖ and‖ A.‖ Mishra,‖ “Collaborative‖ security architecture for black hole attack prevention‖ in‖ mobile‖ ad‖ hoc‖ networks,”‖ in‖ Proc.‖ Radio Wire- less Conf., 2003, pp. 75–78. 
[22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and‖T.‖Karygiannis,‖“Secure‖routing‖and‖intrusion‖ detection‖ in‖ ad‖ hoc‖ networks,”‖ in‖ Proc.‖ 3rd‖ Int.‖ Conf. Pervasive Comput. Commun., 2005, pp. 191– 199. 
[23]‖ R.‖ Rivest,‖ A.‖ Shamir,‖ and‖ L.‖ Adleman,‖ “A‖ method for obtaining digital signatures and publickey‖cryptosystems,”‖Commun.‖ACM,‖vol.‖21,‖no.‖2,‖ pp. 120–126, Feb. 1983. 
[24] J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. Lanceros- Mendez,‖ “Energy‖ harvesting from piezoelectric materials fully integrated‖in‖footwear,”‖IEEE‖Trans. Ind. Electron., vol. 57, no. 3, pp. 813–819, Mar. 2010. 
[25] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A.‖ Mahmoud,‖ “Video‖ transmissionenhancementinpresenceofmisbehavin gnodesinMANETs,”‖ Int.‖ J.‖ Multimedia‖ Syst.,‖ vol.‖ 15, no. 5, pp. 273–282, Oct. 2009. 
[26] A. Singh, M. Maheshwari, and N. Kumar, “Security‖ and‖ trust‖ management‖ in‖ MANET,”‖ in‖ Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387. 
[27]‖ B.‖ Sun,‖ “Intrusion‖ detection‖in‖mobile‖ ad hoc networks,”‖Ph.D.‖disserta- tion, Texas A&M Univ., College Station, TX, 2004. 
[28] K. Stanoevska-Slabeva and M. Heitmann, “Impact‖of‖mobile‖ad-hoc net- works on the mobile value‖system,”‖in‖Proc.‖ 2nd‖Conf.‖m-Bus., Vienna, Austria, Jun. 2003. 
[29] A. Tabesh‖ and‖L.‖G.‖Frechette,‖ “A‖low-power stand-alone adaptive circuit for harvesting energy from‖ a‖ piezoelectric‖micropower‖ generator,”‖ IEEE‖ Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010. 
[30]‖ M.‖ Zapata‖ and‖ N.‖ Asokan,‖ “Securing‖ ad‖ hoc‖ routing‖ protocols,”‖ in‖ Proc.‖ ACM‖ Workshop‖ Wireless Secur., 2002, pp. 1–10. 
[31]‖ L.‖ Zhou‖ and‖ Z.‖ Haas,‖ “Securing‖ ad-hoc networks,”‖ IEEE‖ Netw.,‖ vol.‖ 13,‖ no.‖ 6,‖ pp.‖ 24–30, Nov./Dec. 1999. 
[32] Botan, A Friendly C ++ Crypto Library. [Online]. Available: http:// botan.randombit.net/1098 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013


DOI Link : NOT ASSIGNED

Download :
  V1I617.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]