Acknowledgement based Intrusion-Detection System for MANETS

D Gayathri, M.S.S Sai


In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for emergency/ recover operations, defeat relief efforts, and Army networks. Such network scenarios cannot count on centralized and organized connectivity, and can be make up as applications of  Mobile Ad Hoc Networks.  The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. The self configuring ability of nodes in MANET made it popular among critical mission applications like army use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is decisive to develop efficient intrusion-detection mechanisms to protect MANET from attacks. By using technology support  we are cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security problem. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially made for MANETs. Compared to contemporary approaches, Enhanced Adaptive ACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances


Digital signature, digital signature algorithm (DSA), Enhanced Adaptive Acknowledgment (AACK) (EAACK), Mobile Ad hoc Networks (MANET).


A.Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.

G. R. Blakley, “Safeguarding cryptographic keys,” in Proc. National Computer Conf., 1979, vol. 48, pp. 313–317.

M.Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12, Springer-Verlag, LNCS.

M. Naor and B. Pinkas, “Visual authentication and identification,” in Proc. CRYPTO’97, 1997, vol. 1294, pp. 322–336, Springer-Verlag LNCS.

T. H. Chen and D. S. Tsai, “Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,” Pattern Recognit., vol. 39, pp. 1530–1541, 2006.

P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk, “Security displays enabling secure communications,” in Proc. First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, 2004, vol. 2802, pp. 271–284.

C. Blundo, A. De Bonis, and A. De Santis, “Improved schemes for visual cryptography,” Designs, Codes and Cryptography, vol. 24, pp. 255–278, 2001.

G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Computat., vol. 129, pp. 86–106, 1996.

N. K. Prakash and S. Govindaraju, “Visual secret sharing schemes for color images using halftoning,” in Proc. Int. Conf. Computational Intelligence and Multimedia Applications (ICCIMA 2007), 2007, vol. 3, pp. 174–178.

H. Luo, F.X.Yu, J. S. Pan, and Z. M. Lu, “Robust and progressive color image visual secret sharing cooperated with data hiding,” in Proc. 2008 Eighth Int. Conf. Intelligent Systems Design and Applications, 2008, vol. 3, pp. 431–436.

} J. Broch, D. A. Maltz, D. B. Johnson, Y. Hu, J. Jetcheva, A Performance Comparison of Multi-Hop Wireless Ad Hoc network Routing Protocols, Proc. Of MobiCom’98, Oct. 1998

] E. R. Royer, C.-K. Toh, A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, , IEEE Personal Communications, Apr. 1999

V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, , IEEE INFOCOM’97, 1997

Prof. Ravindra Rathod, Prof M. D. Ingle , Prof. Bharat S Kankate , Prof R. M. Kawale

Dr.J.Subash Chandra Bose , U.Akila Devi 2, M.Prasanalaxmi 3 , K.Malathi 4 , K.P.Vinodhini 5 , S.Saranya 6 Professor and Head, Department of Computer Science Engineering, Professional Group of Institutions, Palladam,

K. Fall, S. Floyd, “Simulation-based comparisons of Tahoe,Reno, and SACK TCP”, CM Computer Communication Review, 26(3), 6/96, pp. 5-2

K. Fall, S. Floyd, “Simulati on-based comparisons of Tahoe, Reno, and SACK TCP”, ACM Computer Communication Review, 26(3), 6/96, pp. 5-2

K.Liu,J.Deng,P.K.Varshney, And K.Balakrishnan -“An acknowledgement-based approach for the detection of routing misbehavior in MANETs”.[May-2007]

S . Marti , T . J. Giuli , K . Lai ,and M . Baker, -“Mitigating routing misbehavior in mobile ad hoc networks”.[Mar-2000]

T . Sheltami , A . Al-Roubaiey , E . Shakshuki ,and A . Mahmoud,- “Video transmission

enhancement in presence of misbehaving nodes in MANETs”.[Oct-2009]



  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at