Enhanced Adaptive Acknowledgement for Mobile Ad Hoc Network

نویسنده

  • Satyanarayana Reddy
چکیده

A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or indirectly depending on other nodes.In recent years, the use of mobile ad hoc network (MANET) has been widespread in many applications, including some critical mission applications and as such security has become one of the major concerns in MANET. MANET does not require a fixed infrastructure and MANET originally developed on military use. However the open medium and wide distributions of nodes make to various types of malicious attacks. The self-configuring ability of nodes inMANETmade it popular among criticalmission applications like military use recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop an efficient intrusion detection mechanism to product MANET from attacks. In this paper, we propose and implement a new intrusion detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANET and Compared to all contemporary approaches. The results will be positive performances of WATCHDOG, TWOACK and AACK in the cases are receiver collision, limited transmission power and false misbehavior report.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

A Survey of Intrusion Detection for Ad-hoc Network

Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET does not require a fixed network formation, since every single node works as both a sending and a receiving messeges and it communicate with each other. Nodes communicate directly with each other when they are both within the same communication range. we implement a new intrusion detection system named Enh...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

Hybrid Cryptography for Secure Intrusion Detection System for MANETs

Mobile Ad Hoc Networks (MANETs) consist of a set of mobile nodes, which can move freely. MANET does not require a fixed network infrastructure. Mobile ad hoc network (MANET) is one of the most important and unique application in which every single node works as both a transmitter and a receiver and they trust their neighbors to relay messages. Many IDS (Intrusion Detection System) have been pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014