ArticlePDF Available

Implementation of EAACK Secure Trespass on Detection System for MANETs

Authors:

Abstract and Figures

The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NET work (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances. The open medium allows MANET vulnerable to attacks. In existing system Enhanced Adaptive Acknowledgment (EAACK) method is imposed, in this digital signature method is used which cause network overhead. Thus proposed system specifies the Hybrid Cryptography technique is used to reduce network overhead.
Content may be subject to copyright.
A preview of the PDF is not available
Chapter
Cyber-assaults have resulted in significant financial losses and the disruption of essential governmental services in recent years. Among these cyberattacks, the Advanced Persistent Threat (APT) has become a major security issue to cybersecurity, affecting a number of businesses and organizations. The APT attacks are targeted and have a specific objective behind the attacks. An attacker builds an entry point to the target network as part of the APT attack. This is commonly accomplished by infecting the targeted system with malware that leaves a backdoor open for future access. The spear-phishing email is a prevalent method for breaking into a network for establishing the initial foothold into a target network. The phishing mails may contain malware attachment or link which leads to website injected with malware code. This research offered an authentication-based detection approach for spear-phishing emails. The proposed technique takes the trust email dataset’s stylometric, gender, and personality traits and extracts them.
Article
Full-text available
Zone‐based intrusion detection is a supporting protection mechanism for mobile adhoc environment consisting of large volume of distributed number of nodes. With the presence of malicious nodes, security will be violated, which is focused in proposed research by introducing Secured and Anonymous Zone‐Based Intrusion Detection System (SAZIDS). Here, anonymous rule sharing is guaranteed by introducing the Anonymous Location‐Aided Routing in MANET in which group signatures would be generated by all zone members based on group public key provided by the intra zone leader. Thus, the exact location of zone members cannot be revealed. To ensure the secured rule sharing, Enhanced Adaptive ACKnowledgment is utilized, which would ensure the presence of malicious nodes. This is done at the time of rule sharing by the intra zone leaders. After secured sharing of rule set, in order to optimize the memory storage, in this work, rule set aggregation is performed, which would merge the rules, thus resolving the bandwidth and associated memory issues. The overall evaluation of SAZIDS is performed in the NS2 simulation environment, which proves secured and reliable transmission of data without the involvement of malicious activities.
Conference Paper
Full-text available
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns. In this paper, we will present survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs. We will also discuss some proposed solutions to detect and prevent these attacks. As MANETs are widely used in many vital applications, lots of research work has to be done to find efficient solutions against these DoS attacks that can work for different routing protocols.
Article
Full-text available
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Article
Full-text available
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid encryption technique is a combination of both symmetric and asymmetric cryptographic techniques. The encryption algorithms are more secured depends on the key value and its size. But, the key distribution is major problem. The various protocols are currently given the solution. The new protocol solves the key management problem using key servers. It also provides all the three cryptographic primitives - integrity, confidentiality and authentication. In this proposed design methodology, the new protocol design using Symmetric cipher (AES-Rijndael) and public key cryptography (RSA) with hash function SHA-512.
Conference Paper
Full-text available
As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Many intrusion detection systems have been proposed and most of them are tightly related to routing protocols, such as Watchdog/Pathrater and Routeguard. These solutions include two parts: intrusion detection (Watchdog) and response (Pathrater and Routeguard). Watchdog resides in each node and is based on overhearing. Through overhearing, each node can detect the malicious action of its neighbors and report other nodes. However, if the node that is overhearing and reporting itself is malicious, then it can cause serious impact on network performance. In this paper, we overcome the weakness of Watchdog and introduce our intrusion detection system called ExWatchdog. The main feature of the proposed system is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation results show that our system decrease the overhead greatly, though it does not increase the throughput obviously.
Conference Paper
Full-text available
There has been a tremendous growth in the use of wireless communication in the past few decades. Mobile Ad hoc NETwork (MANET) is one of the most important one among various wireless communication mechanisms. In MANET, each node in a network performs as both a transmitter and a receiver. They rely on each other to store and forward packets. Its unique infrastructureless network and self-configuring capability makes it ideal for many mission critical applications, including military use and remote exploration. However, these characteristics also make MANET vulnerable to passive and active attacks due to its open medium, changing topology and lack of centralized monitoring. To address the new security challenges, Intrusion Detection System (IDS) is required to detect the malicious attackers before they can accomplish any significant damages to the network. Many existing IDSs for MANETs are based upon Watchdog mechanism. In this paper, we propose a new IDS called Enhanced Adaptive ACKnowledgement (EAACK) that solves four significant problems of Watchdog mechanism, which are ambiguous collisions, receiver collisions, limited transmission power and false misbehavior report. We use Network Simulator 2 to simulate the proposed mechanism and compare the results with existing mechanisms.
Conference Paper
Full-text available
Over the past few years, with the trend of mobile computing, Mobile Ad hoc NETwork (MANET) has become one of the most important wireless communication mechanisms among all. Unlike traditional network, MANET does not have a fixed infrastructure, every single node in the network works as both a receiver and a transmitter. Nodes directly communicate with each other when they are both within their communication ranges. Otherwise, they rely on their neighbors to store and forward packets. As MANET does not require any fixed infrastructure and it is capable of self configuring, these unique characteristics made MANET ideal to be deployed in a remote or mission critical area like military use or remote exploration. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. It is crucial to develop suitable intrusion detection scheme to protect MANET from malicious attackers. In our previous research, we have proposed a mechanism called Enhanced Adaptive ACKnowledgement (EAACK) scheme. Nevertheless, it suffers from the threat that it fails to detect misbehaving node when the attackers are smart enough to forge the acknowledgement packets. In this paper, we introduce Digital Signature Algorithm (DSA) into the EAACK scheme, and investigate the performance of DSA in MANET. The purpose of this paper is to present an improved version of EAACK called EAACK2 that performs better in the presence of false misbehavior and partial dropping. Keywords—MANET; Digital Signature; DSA; EAACK
Chapter
In this paper we are focusing on closed MANETs where only authorized nodes are supposed to access the network. We denote “outsider” nodes as those nodes that are not authorized to access the network, and ‘insider” nodes as those that are. The objective of this research is to develop mechanisms that protect a closed MANET against malicious behavior from outsider nodes as well as insider nodes through packet authentication and a Trust Management System, respectively.
Chapter
In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless networks are not well suited for MANETs. In this paper, we classify the architectures for intrusion detection systems (IDS) that have been introduced for MANETs. Current IDS ’s corresponding to those architectures are also reviewed and compared. We then provide some directions for future research.
Article
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n , of two large secret prime numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d = 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n .