Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ International Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 1 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

IMPROVED EAACK FOR INTRUSION DETECTION SYSTEM

Authors: Anuradha Jangir; G. Usha Devi; Sowmitha Mk; Jidhesh R;

IMPROVED EAACK FOR INTRUSION DETECTION SYSTEM

Abstract

Today Mobile Ad-hoc networks (MANETs) are preferred in many applications because of its self-configuring nature and dynamic topology. Sending node in MANETs rely on intermediate nodes for data transmission to remote nodes. This poses serious security threats. There is a necessity of an intrusion detection system to ensure secure message transmission in MANETs. Many Intrusion Detection Systems (IDS) like Watchdog, TWO ACKnowledgement (TWOACK), Adaptive ACKnowledgement (AACK) and Enhanced Adaptive ACKnowledgement (EAACK) have been proposed for this purpose. Of these IDS, EAACK is found to perform better. EAACK is purely acknowledgement based. Hence there should be a mechanism to validate the acknowledgements. This paper aims at improving performance of EAACK by using hybrid cryptography to validate the sending and receiving nodes in place of Digital Signature Algorithm (DSA) and Rivest Shamir and Adelman algorithm (RSA) that is used in existing EAACK. In hybrid cryptographic key exchange algorithm, a combination of symmetric and asymmetric key cryptographic algorithm (AES and RSA) is used. When compared with its contemporary EAACK, Improved EAACK (IEAACK) achieves smaller network overhead.To simulate the IEAACK environment, NS2 simulator is used. IEAACKovercomes the problems of existing IDS.

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold