Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
84 views8 pages

Reference Paper 1

This document summarizes a research paper that proposes a new intrusion detection and prevention system called EAACK for mobile ad hoc networks (MANETs). It uses elliptic curve cryptography (ECC) to provide digital signatures. EAACK aims to address weaknesses in existing approaches like Watchdog and TWOACK by demonstrating higher detection of malicious behaviors while not greatly affecting network performance. The full paper introduces intrusion detection in MANETs, discusses background approaches like Watchdog and TWOACK, and then proposes the new EAACK system using ECC.

Uploaded by

Rajakumar Srini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views8 pages

Reference Paper 1

This document summarizes a research paper that proposes a new intrusion detection and prevention system called EAACK for mobile ad hoc networks (MANETs). It uses elliptic curve cryptography (ECC) to provide digital signatures. EAACK aims to address weaknesses in existing approaches like Watchdog and TWOACK by demonstrating higher detection of malicious behaviors while not greatly affecting network performance. The full paper introduces intrusion detection in MANETs, discusses background approaches like Watchdog and TWOACK, and then proposes the new EAACK system using ECC.

Uploaded by

Rajakumar Srini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: [email protected], [email protected]


Volume 2, Issue 4, July August 2013
ISSN 2278-6856

EAACK Based Intrusion Detection and


Prevention for MANETs using ECC Approach
Sanjith S 1, Padmadas M1 , andKrishnan N1
1

Centre for Information Technology and Engineering, ManonmaniamSundaranar University, India.

Abstract-The migration to wireless network from wired


network has been a worldwide trend within the past few
decades. The quality and quantifiability brought by wireless
network create its potential in several applications. Among
all the up to date wireless net- works, Mobile Ad hoc
Network (MANET) is one in every of the foremost necessary
and distinctive applications. On the contrary to ancient
specification, MANET doesn't need a hard and fast network
infrastructure; each single node works as each a transmitter
and a receiver. Nodes communicate directly with one another
once they are in range intervals constant communication
varies. Otherwise, they place confidence in their neighbors to
relay messages. The self-configuring ability of nodes in
MANET created it fashionable among vital mission
applications like military use or emergency recovery.
However, the open medium and wide distribution of nodes
create MANET liable to malicious attackers. Duringthis case,
it's crucial to develop economical
intrusion-detection
mechanisms
to defend MANET from attacks. With the
enhancements of the technology and cut in hardware prices,
we tend to area unit witnessing a current trend of increasing
MANET into industrial applications. To regulate to such
trend, we tend to powerfully believe that it's very important to
handle its potential security problems. During this paper, we
tend to propose and implement a brand new intrusiondetection and prevention system named EAACK based
Intrusion Detection and prevention system using ECC
approach specially designed for MANET. Compared to up to
date approaches, our approach demonstrates higher
malicious-behavior detection rates in sure circumstances
whereas doesn't greatly have an effect on the network
performances.

Keywords - Digitalsignature , Enhanced Adaptive


ACKnowledgment (AACK) (EAACK), Mobile Adhoc
NETwork (MANET), Elliptic Curve Cryptography (ECC)
.

I. INTRODUCTION
Due to their natural quality and quantifiability,
wireless networks area unit perpetually most popular
since the primary day of their invention. Becauseof the
improved technologyand reduced prices, wireless
networks have gained rather more preferences over wired
networks within the past few decades. By definition,
Mobile Ad hoc NETwork (MANET) is a set of mobile
nodes equipped with each a wireless transmitter and a
receiver that communicate with one another via
Volume 2, Issue 4 July August 2013

bidirectional wireless links either directly or indirectly.


Industrial remote access and management via wireless
networks are getting additional and additional in style
currently [35]. One in all the key blessings of wireless
networks is its ability to permit electronic communication
between completely different parties and still maintain
their quality. However, this communication is restricted
to the vary of transmitters. This implies that 2 nodes
cannot communicate with one another once the space
between the 2 nodes is on the far side the communication
varies of their own. MANET solves this drawback by
permitting intermediate par- ties to relay information
transmissions. This is often achieved by dividing
MANET into 2 varieties of networks, namely, single-hop
and multihop. During a single-hop network, all nodes
among a similar radio vary communicate directly with
one another. On the opposite hand, during a multihop
network, nodes admit different intermediate nodes to
transmit if the destination node is out of their radio vary.
In contrary to the normal wireless network,
MANETincorporates
a
suburbanized
network
infrastructure. MANET doesn't need a hard and fast
infrastructure; therefore, all nodes area unit unengaged to
move arbitrarily [10], [27], [29]. MANET is capable of
making a self-configuring and self-maintaining network
while not the assistance of a centralized infrastructure,
that is commonly unfeasible in crucial mission
applications like military conflict or emergency recovery.
tokenish configuration Associate in fast preparation
create
MANET able to be utilized in emergency
circumstances wherever an infrastructure is unavailable
or impracticable to put in in scenarios like natural or
human-induced disasters, military conflicts, and medical
emergency things [19], [30].
Owing to these distinctive characteristics,
MANET is becoming additional and additional wide
enforced within the trade [14], [28]. However,
considering the very fact that MANET is in style among
crucial mission applications, network security is of
important importance. sadly, the open medium and
remote distribution of MANET create it prone to varied
varieties of attacks. for instance, as a result of the nodes
lack of physical pro-tection, malicious attackers will
simply capture and compromise nodes to attain attacks.
specially, considering the very fact that the majority
routing protocols in MANETs assume that each node
within the network behaves hand and glove with different
nodes and presumptively not malicious [5], attackers will
simply compromise MANETs by inserting malicious or
Page 424

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
no cooperative nodes into the network. What is more, as a
result of MANETs distributed design and dynamical
topology, a conventional centralized observance technique
isn't any longer possible in MANETs. In such case, it's
crucial to develop Associate in Nursing intrusiondetection system (IDS).

II. BACKGROUND
A. Intrusion Detection in MANETs:
As mentioned before, as a result of the restrictions of
most MANET routing protocols, nodes in MANETs
assume that different nodes invariably work with one
another to relay information. This assumption leaves the
attackers with the opportunities to attain vital impact on
the network with only one or 2 compromised nodes. to
handle this drawback, associate IDS ought to be
additional to reinforce the protection level of MANETs. If
MANET will observe the attackers as before long as they
enter the network, we'll be able to fully eliminate the
potential damages caused by compromised nodes at the
primary time. IDSs sometimes act because the second
layer in MANETs, and that they area unit an excellent
complement to existing proactive approaches [27].
Anantvalee and Wu dialect [4] given a awfully thorough
survey on up to date IDSs in MANETs. In this section,
we tend to primarily describe 3 exist- ing approaches,
namely, Watchdog [17], TWOACK [15], and
adjustiveACKnowledgment (AACK) [25].
1) Watchdog: [17] projected a theme named Watchdog
that aims to boost the output of network with the presence
of malicious nodes. In fact, the Watchdog theme is
consisted of 2 elements, namely, Watchdog and Pathrater.
Watchdog is associate IDS for MANETs. Its liable for
police investigation malicious node misbehaviors in the
network. Watchdog detects malicious misbehaviors by
promiscuously being attentive to its next hops
transmission. If a Watchdog node overhears that its next
node fails to forward the packet among a particular
amount of your time, it will increase its failure counter.
When- ever a nodes failure counter exceeds a predefined
threshold, the Watchdog node reports it as misbehaving.
During this case, the Pathrater cooperates with the
routing protocols to avoid the reported nodes in future
transmission.
Many
following
analysis
studies
and
implementations have proved that the Watchdog theme is
economical. Moreover, compared to another schemes,
Watchdog is capable of police investigation malicious
nodes instead of links. These benefits have created the
Watchdog theme a well-liked alternative within the field.
Several MANET IDSs area unit either supported or
developed as associate improvement to the Watchdog
theme [15], [20], [21], [25]. All the same, as seen by
Marti et al. [17], the Watchdog theme fails to observe
malicious misbehaviors with the presence of the
following: 1) ambiguous collisions; 2) receiver collisions;
3) Restricted transmission power; 4) false misdeed
Volume 2, Issue 4 July August 2013

report;5) collusion; and 6) partial dropping. We tend to


discuss these weak- nesses with additional detail in
Section III.
2) TWOACK:With regard to the six weaknesses of the
Watchdog theme, several researchers projected new
approaches to unravel these problems. TWOACK
projected by Liu et al. [16] is one in all the foremost
necessary approaches among them. Onthe contrary to
several different schemes, TWOACK is neither associate
sweetening nor a Watchdog-based theme. Getting to
resolve the receiver collision and restricted transmission
power problems of Watchdog, TWOACK detects
misbehaving links by acknowledging each information
packet transmitted over each 3 consecutive nodes on the
trail from the supply to the destination. Upon retrieval of
a packet, every node on the route is needed to challenge
associate acknowledgment packet to the node that's 2
hops aloof from it down the route. TWOACK is needed to
figure on routing protocols like Dynamic supply Routing
(DSR) [11]. The operating method of TWOACK is shown
in Fig. one: Node a primary forwards Packet 1 to node B,
and then, node B forwards Packet one to node C. once
node C receives Packet one, because it is 2 hops aloof
from node A, node C is duty-bound to come up with a
TWOACK packet, that contains reverse route from node
A to node C, and sends it back to node A. The retrieval of
this TWOACK packet at node A indicates that the
transmission of Packet one from node A to node C is
fortunate. Otherwise, if this TWOACK packet isn't
received in an exceedingly predefined period, each nodes
B and C area unit reported malicious. Identical method
applies to each 3 consecutive nodes on the remainder of
the route.

Fig.1.
TWOACKscheme:Eachnodeisrequiredtosendbackanacknowledgment packettothenodethatistwohops awayfromit.

The TWOACK theme with success solves the receiver


collision and restricted transmission power issues expose
by Watchdog. However, the acknowledgment method
needed in each packet transmission method additional a
big quantity of unwanted network overhead. as a result of
the restricted battery power nature of MANETs, such
redundant transmission method will simply degrade the
lifetime of the whole network. However, several analysis
studies area unit operating in energy gathering to handle
this drawback [25], [28], [29].
3) AACK: supported TWOACK, [25] pro- expose a new
theme referred to as AACK. almost like TWOACK,
AACK is associate acknowledgment-based network
layer theme which may be thought-about as a mixture of a
theme referred to as TACK (identical to TWOACK)
Page 425

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
associated an end-to-end acknowledgment theme referred
to as ACKnowledge (ACK). Compared to TWOACK,
AACK considerably reduced network overhead whereas
still capable of maintaining or perhaps surpassing
identical
network
output.
The
end-to-end
acknowledgment theme in ACK is shown in Fig. 2.
Fig.3.Communicationwithdigitalsignature.

Fig.2.ACKscheme:Thedestinationnodeisrequiredtosendacknowledg-ment
packetstothesourcenode.

In the ACK theme shown in Fig. 2, the supply


node S sends out Packet one with none overhead except
two b of flag indicating the packet sort. All the
intermediate nodes merely forward this packet. Once the
destination node D receives Packet one, it's needed to
challenge associate ACK acknowledgment packet to the
supply node S on the reverse order of identical route.
Among a predefined period, if the supply node S receives
this ACK acknowledgment packet, then the packet
transmission from node S to node D is fortunate.
Otherwise, the supply node S can switch to TACK theme
by causation out a TACK packet. The conception of
adopting a hybrid theme in AACK greatly reduces the
network overhead, however each TWOACK and AACK
still suffer from the matter that they fail to observe
malicious nodes with the presence of false misdeed report
and cast acknowledgment packets.
B.DigitalSignature
Digital signatures have continually been
associate integral a part of cryptography in history.
Cryptography is that the study of mathematical
techniques associated with aspects of knowledge security
like confidentiality, knowledge integrity, entity
authentication, and knowledge origin authentication [18].
The event of cryptography technique features a long and
interesting history. The pursuit of secure communication
has been conducted by person since 4000 years agone in
Egypt, in keeping with Kahns book [30] in 1963. Such
development dramatically accelerated since the globe War
II, that some believe is basically because of the economic
{process} process.
The security in MANETs is outlined as a mix of
processes, procedures, and systems wont to guarantee
confidentiality, authentication, integrity, availableness,
and nonrepudiation [18]. Digital signature may be a wide
adopted approach to confirm the authentication, integrity,
and nonrepudiation of MANETs.

Volume 2, Issue 4 July August 2013

To ensure the validity of the digital signature,


the sender Alice is obligated to continually keep her
personal key Pr Alice as a secret while not revealing to
anyone else. Otherwise, if the assailant Eve gets this
secret personal key, she will be able to intercept the
message and simply forge malicious messages with
Alices signature and send them to Bob. As these
malicious messages are digitally signed by Alice, Bob
sees them as legit and authentic messages from Alice.
Thus, Eve will promptly attain malicious attacks to Bob
or perhaps the complete network.
Next, Alice will send a message m in conjunction with
the signature SigAlice to Bob via associate unsecured
channel. Bob then computes the received message m
against the preagreed hash operate H to urge the message
digest d. This method are often generalized asH (m ) = d
. (3) Bob will verify the signature by applying Alices
public keyPkAlice on SigAlice , by usingcan be
generalized as an information string, that associates a
message
(in digital form) with some originating entity, or associate
electronicSPk
Alice (SigAlice ) = d. (4)
Digital signature schemes are often in the main divided
into the subsequent 2 classes.
1) Digital signature with appendix: the initial message is
needed within the signature verification formula.
Examples embody a digital signature formula (DSA) [33].
2) Digital signature with message recovery: this sort of
theme doesn't need the other info besides the signature
itself within the verification method. Examples embody
RSA [23].
If d == d, then it's safe to say that the message m
transmitted through associate unsecured channel is so
sent from Alice and also the message itself is unbroken.

III.PROBLEMDEFINITION
Ourproposed
approach
EAACK
with
ECCisdesigned totacklethree of thesixweaknessesof
Watchdogscheme,namely,
false
misbehavior,limitedtransmissionpower,andreceivercollisio
n and to provide Security in packet delivery. In
thissection,wediscussthesethreeweaknessesindetail.

Page 426

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856

Fig.4. Receivercollisions: BothnodesBandXaretryingtosendPacket1and


Packet2,respectively,tonodeCatthesame time.

Fig.5.
Limitedtransmissionpower:NodeBlimitsitstransmissionpowersothatthepack
ettransmissioncanbeoverheardbynodeA buttooweaktoreachnode C.

each of them area unit at risk of the false wrongful


conduct attack. during this analysis work, our goal is to
propose a brand new IDS specially designed for
MANETs, that solves not solely receiver collision and
restricted transmission power however additionally the
false wrongful conduct downside.
Furthermore, we have a tendency to extend our analysis
to adopt a digital sig- nature theme throughout the packet
transmission method. As all told acknowledgment-based
IDSs, it's important to make sure the integrity and
credibleness of all acknowledgment packets.
In this section, we tend to describe our projected EAACK
theme thoroughly. The approach delineated during this
analysis paper relies on our previous work [12], wherever
the backbone of EAACK was projected and evaluated
through implementation. During this work, we tend to
extend it with the introduction of digital signature to
forestall the assaulter from formation acknowledgment
packets.

IV. SCHEMEDESCRIPTION

Fig.6. Falsemisbehaviorreport: NodeAsendsbackamisbehaviorreporteven


thoughnodeBforwardedthepacketto nodeC.

Fig.7.Systemcontrolflow:ThisfigureshowsthesystemflowofhowtheEAACKsc
hemeworks.

In a typical example of receiver collisions,


shown in Fig. 4, once node A sends Packet one to node B,
it tries to take in if node B forwarded this packet to node
C; in the meantime, node X is forwarding Packet a pair of
to node C. In such case, node A overhears that node B has
with success forwarded Packet one to node C however
didn't observe that node C failed to receive this packet as
a result of a collision between Packet one and Packet a
pair of at node C.
In the case of restricted transmission power, so as to preserve its own battery resources, node B on purpose limits
its transmission power in order that it's robust enough to
be overheard by node A however not robust enough to be
received by node C, as shown in Fig. 5.
For false wrongful conduct report, though node A with
success overheard that node B forwarded Packet one to
node C, node A still rumored node B as misbehaving, as
shown in Fig. 6. As a result of the open medium and
remote distribution of typical MANETs, attackers will
simply capture and compromise one or 2 nodes to attain
this false wrongful conduct report attack.
As mentioned in previous sections, TWOACK and
AACK solve 2 of those 3 weaknesses, namely, receiver
collision and restricted transmission power. However,
Volume 2, Issue 4 July August 2013

EAACK is consisted of 3 major components,


namely, ACK, secure ACK (S-ACK), and misconduct
report authentication (MRA). so as totally differentiate to
tell apart} different packet varieties in different schemes,
we tend to enclosed a 2-b packet header in EAACK.
According to the web draft of DSR [11], there's halfdozen b reserved within the DSR header. In EAACK, we
tend to use two b of the half-dozen b to flag differing
kinds of packets.
Fig. 7 (shown later) presents a flow diagram describing
the EAACK theme. Please note that, in our projected
theme, we tend to assume that the link between every
node within the network is bifacial. What is more, for
every communication method, each the supply node and
also the destination node don't seem to be malicious.
Unless nominative, all acknowledgment packets
delineated during this analysis square measure needed to
be digitally signed by its sender and verified by its
receiver.
A. ACK
As mentioned before, ACK is essentially associate end-toend acknowledgment theme. It acts as a district of the
hybrid theme in EAACK, attending to scale back network
overhead once no network misconduct is detected. In Fig.
8, in ACK mode, node S initial sends out associate ACK
information packet Pad1 to the destination node D. If all
the intermediate nodes on the route between nodes S and
D square measure cooperative and node D with success
receives Pad1 , node D is needed to remand associate
ACK acknowledgment packet Pak1 on a similar route
however in a very reverse order. inside a predefined
fundamental quantity, if node S receives Pak1 , then the
packet transmission from node S to node D is winning.
Otherwise, node S can switch to S-ACK mode by causing
out associate S-ACK information packet to sight the
misbehaving nodes within the route.
B. S-ACK
Page 427

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
The S-ACK theme is associate improved version of the
TWOACK theme projected by Liu et al. [16]. The
principle is to let each 3 consecutive nodes add a gaggle
to sight misbehaving nodes. for each 3 consecutive nodes
within the route, the third node is needed to send
associate S-ACK acknowledgment packet to the primary
node. The intention of introducing S-ACK mode is to
sight misbehaving nodes within the presence of receiver
collision or restricted transmission power.
As shown in Fig. 9, in S-ACK mode, the 3 consecutive
nodes (i.e., F1, F2, and F3) add a gaggle to sight
misbehaving nodes within the network. Node F1 initial
sends out S-ACK information packet Psad1 to node F2.
Then, node F2 forwards this packet to node F3. Once
node F3 receives Psad1 , because it is that the third node
during this three-node cluster, node F3 is needed to
remand associate S-ACK acknowledgment packet Psak1
to node F2. Node F2 forwards Psak1 back to node F1. If
node F1 doesn't receive this acknowledgment packet
inside a predefined fundamental quantity, each nodes F2
and F3 square measure rumored as malicious. Moreover,
a misconduct report are generated by node F1 and sent to
the supply node S.
Nevertheless, not like the TWOACK theme, wherever the
supply node like a shot trusts the misconduct report,
EAACK needs the supply node to modify to MRA mode
and make sure this misconduct report. This can be an
important step to sight false misconduct report in our
projected theme.
C. MRA
The MRA theme is meant to resolve the weakness of
Watchdog once it fails to sight misbehaving nodes with
the presence of false misconduct report. The false
misconduct report may be generated by malicious
attackers to incorrectly report innocent nodes as
malicious. This attack may be fatal to the complete
network once the attackers break down enough nodes and
so cause a network division. The core of MRA theme is to
attest whether or not the destination node has received the
rumored missing packet through a special route.
To initiate the MRA mode, the supply node initial
searches its native mental object and seeks for an
alternate route to the destination node. If there's no
alternative that exists, the supply node starts a DSR
routing request to seek out another route. Attributable to
the character of MANETs, it's common to seek out
multiple routes between 2 nodes.
By adopting an alternate route to the destination node, we
tend to circumvent the misconduct newsperson node.
Once the destination node receives associate MRA packet,
it searches its native knowledge base and compares if the
rumored packet was received. If it's already received, then
it's safe to conclude that this can be a false misconduct
report and whoever generated this report is marked as
malicious. Otherwise, the misconduct report is trusty and
accepted.By the adoption of MRA theme, EAACK is
capable of sleuthing malicious nodes despite the existence
of false misbehavior report.
Volume 2, Issue 4 July August 2013

D. Digital Signature
As
mentioned
before,
EAACK
is
associate
acknowledgment-based IDS. All 3 components of
EAACK, namely, ACK, S-ACK, and MRA, square
measure acknowledgment-based detection schemes. All of
them believe on acknowledgment packets to sight
misbehaviors within the network. Thus, it's
extraordinarily necessary to make sure that every one
acknowledgment packets in EAACK square measure
authentic and untainted. Otherwise, if the attackers
square measure good enough to forge acknowledgment
packets, all of the3 schemescan be vulnerable.
With reference to this imperative concern, we tend to
incorporated digital signature in our projected theme. so
as to make sure the integrity of the IDS, EAACK needs
all acknowledgment packets to be digitally signed before
they're sent out and verified till they're accepted.
However, we tend to absolutely perceive the additional
resources that square measure needed with the
introduction of digital signature in MANETs. To deal
with this concern, we tend to enforced each DSA [33] and
RSA [23] digital signature schemes in our projected
approach. The goal is to seek out the foremost best
resolution for victimization digital signature in MANETs.

V. PERFORMANCEEVALUATION
Inthissection,weconcentrate
ondescribingoursimulation environmentandmethodology
aswellascomparingperformancesthroughsimulationresult
comparison
withWatchdog,
TWOACK,
andEAACKschemes.
A. Simulation Methodologies
To higher investigate the performanceof EAACK
underneath differing kinds of attacks, we tend to propose
3 situation settings to simulate differing kinds of
misbehaviors or attacks.
Scenario 1: during this situation, we tend to simulate a
basic packet- dropping attack. Malicious nodes merely
drop all the packets that they receive. The aim of this
situation is to check the performance of IDSs against 2
weaknesses of Watchdog, namely, receiver collision and
restricted transmission power.
Scenario 2: This situation is meant to check IDSs
performances against false misconduct report. During this
case, malicious nodes continuously drop the packets that
they receive and remand a false misconduct report
whenever it's potential.
Scenario 3: This situation is employed to check the IDSs
performances once the attackers square measure good
enough to forge acknowledgment packets and claiming
positive result whereas, in fact, it's negative. As
Watchdog isn't associate acknowledgment-based theme,
it's not eligible for this situation setting.
B. Elliptic Curve: Some Definitions
Scalar Multiplication: Given an integer k and a point P
on the elliptic curve, the elliptic scalar multiplication kP
is the result of adding Point P to itself k times.
Page 428

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
Order: Order of a point P on the elliptic curve is the
smallest integer r such thatrP = O. Further if c and d are
integers, then cP = dP iff c d (mod r).
Curve Order: The number of points on the elliptic curve
is called its curve order and is denoted #E.
ELLIPTICAL CURVE DISCRETE LOGARITHM PROBLEM
The strength of the Elliptic Curve Cryptography lies in
the Elliptic Curve Discrete Log Problem (ECDLP). The
statement of ECDLP is as follows.
Let E be an elliptic curve and P E be a point of order n.
Given a point Q E with
Q = mP, for a certain m 2, 3, , m 2.
Find the m for which the above equation holds.
When E and P are properly chosen, the ECDLP is
thought to be infeasible. Note that m = 0, 1 and m 1, Q
takes the values O, P and P. One of the conditions is
that the order of P i.e. n be large so that it is infeasible to
check all the possibilities of m.
C. Simulation Configurations
Our simulation is conducted in machine which has java
net beans the coding has been done to simulate the
concept which has been discussed the ECC algorithm is
providing high security while packet are send through the
network from node to node.
D. Simulated Results
The figure given below is the results of our simulation
and these results provide high quality in data delivery
with high Security provided by ECC.

Fig : 8 The nodes are defined in between the source and Destination

Fig : 9 The nodes in between source and Destination and destination are
Scanned for Communication

Volume 2, Issue 4 July August 2013

Fig : 10 The arrows shows the energy effective based path finding

Fig: 11 Hello Message Recived

In terms of machine quality and memory


consumption, we tend to did analysis on standard mobile
sensors. Per our analysis, one in all the foremost standard
sensing element nodes within the market is Tmote Sky
[34]. This kind of sensing element is provided with a TI
MSP430F1611 8-MHz processor and 1070 kilobyte of
memory house. We tend to believe that this can be
enough for handling our simulation settings in terms of
each machine power and memory house.
VI. CONCLUSION AND FUTURE WORK
Packet-dropping attack has continually been a
serious threat to the securityin MANETs. In this analysis
paper, we tend to have planned completely unique IDS
named EAACK protocol specially de- signed for
MANETs and compared it against different standard
mechanisms in several situations through simulations.
The results are positive performances against Watchdog,
TWOACK, and AACK within the cases of receiver
collision, restricted transmission power, and false
wrongful conduct report.
Furthermore, in an endeavor to stop the attackers
from initiating solid acknowledgment attacks, we tend to
extend our analysis to include digital signature in our
planned theme. Although it generates additional ROs in
some cases, as incontestible in our experiment, it will
immensely improve the networks PDR once the
attackersare sensible enough to forge acknowledgment
packets. We predict that this exchange is worth once
network security is that the prime priority. So as to hunt
the best DSAs in MANETs, we tend to enforced each
DSA and RSA schemes in our simulation. Eventually, we
tend to arrived to the conclusion that the DSA theme is
additional appropriate to be enforced in MANETs. So we
used ECC to encrypt the message and the encrypted
message will be send and this provides a good result. To
extend the deserves of our analysis work, we plan to
Page 429

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
Investigate the subsequent problems in our future
research:
1) Potentialities of adopting hybrid cryptography
techniques to additional cut back the network overhead
caused by digital signature;
2) Examine the chances of adopting a key exchange
mechanism to eliminate the necessity of predistributed
keys;
3) Testing the performance of EAACK in real network
environment rather than code simulation.
REFERENCES
[1] K. Al Agha, M.-H.Bertin, T. Dang, A. Guitton,
P. Minet, T. Val, and J.-B. Viollet, Which wireless
technology for industrial wireless sensor networks? The
development of OCARI technol,IEEE Trans.
Ind.Electron., vol. 56, no. 10, pp. 42664278, Oct.
2009.
[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, Mobile
Ad hoc Network Security, inLecture Notes in
ElectricalEngineering, vol. 127. New York:
Springer-Verlag, 2012, pp. 659666.
[3] R. H. Akbani, S. Patel, and D. C. Jinwala, DoS
attacks in mobile ad hoc networks: A survey,
inProc. 2nd Int.Meeting ACCT, Rohtak, Haryana,
India, 2012, pp. 535541.
[4] T. Anantvalee and J. Wu, A Survey on Intrusion
Detection in Mobile Ad Hoc Networks,
inWireless/MobileSecurity.
New
York:
SpringerVerlag, 2008.
[5] L. Buttyan and J. P. Hubaux, Security and
Cooperation in Wireless Networks. Cambridge, U.K.:
CambridgeUniv. Press, Aug. 2007.
[6] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher,
and L. Benini, Modeling and optimization of a solar
energyharvester system for self-powered wireless
sensor networks,IEEE Trans. Ind. Electron., vol. 55,
no. 7, pp.27592766, Jul. 2008.
[7] V. C. Gungor and G. P. Hancke, Industrial wireless
sensor networks: Challenges, design principles,
andtechnical approach,IEEE Trans. Ind. Electron.,
vol. 56, no. 10, pp. 42584265, Oct. 2009.
[8] Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure
efficient distance vector routing for mobile wireless
ad hocnetworks, inProc. 4th IEEE Workshop
Mobile Comput. Syst. Appl., 2002, pp. 313.
[9] Y. Hu, A. Perrig, and D. Johnson, ARIADNE: A
secure on-demand routing protocol for ad hoc
networks,
inProc. 8th ACM Int. Conf. MobiCom, Atlanta, GA,
2002, pp. 1223.
[10] G. Jayakumar and G. Gopinath, Ad hocmobile
wireless networks routing protocolA review, J.
Comput.Sci., vol. 3, no. 8, pp. 574582, 2007.
[11] D. Johnson and D. Maltz, Dynamic Source Routing
inadhocwireless
networks,
inMobile
Computing.Norwell, MA: Kluwer, 1996, ch. 5, pp.
153181.
Volume 2, Issue 4 July August 2013

[12] N. Kang, E. Shakshuki, and T. Sheltami, Detecting


misbehaving nodes in MANETs, in Proc. 12th Int.
Conf.iiWAS, Paris, France, Nov. 810, 2010, pp.
216222.
[13] N. Kang, E. Shakshuki, and T. Sheltami, Detecting
forged acknowledgements in MANETs, inProc.
IEEE25th Int. Conf. AINA, Biopolis, Singapore,
Mar. 2225, 2011, pp. 488494.
[14] K. Kuladinith, A. S. Timm-Giel, and C. Grg,
Mobilead-hoccommunications in AEC industry,J.
Inf.Technol. Const., vol. 9, pp. 313323, 2004.
[15] J.-S. Lee, A Petri net design of command filters for
semiautonomous mobile sensor networks,IEEE
Trans.Ind. Electron., vol. 55, no. 4, pp. 18351841,
Apr. 2008.
[16] K. Liu, J. Deng, P. K. Varshney, and K.
Balakrishnan, An acknowledgment-based approach
for the detectionof routing misbehaviour in
MANETs, IEEE Trans. Mobile Comput., vol. 6, no.
5, pp. 536550, May 2007.
[17] S. Marti, T. J. Giuli, K. Lai, and M. Baker,
Mitigating routing misbehaviour in mobile ad hoc
networks,inProc.6th Annu.Int. Conf. Mobile
Comput.Netw., Boston, MA, 2000, pp. 255265.
[18] A. Menezes, P. van Oorschot, and S. Vanstone,
Handbook of Applied Cryptography. Boca Raton, FL:
CRC,1996, T-37.
[19] N. Nasser and Y. Chen, Enhanced intrusion
detection systems for discovering malicious nodes in
mobile ad hoc network, inProc. IEEE Int. Conf.
Commun., Glasgow, Scotland, Jun. 2428, 2007, pp.
11541159.
[20] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi,
On intrusion detection and response for mobile ad
hocnetworks, in Proc. IEEE Int. Conf. Perform.,
Comput.,Commun., 2004, pp. 747752.
[21] A. Patcha and A. Mishra, Collaborative security
architecture for black hole attack prevention in
mobile ad hoc networks, inProc. Radio Wireless
Conf., 2003, pp. 7578.
[22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T.
Karygiannis, Secure routing and intrusion detection
in ad hoc networks, inProc.3rd Int. Conf. Pervasive
Comput.Commun., 2005, pp. 191199.
[23] R. Rivest, A. Shamir, and L. Adleman, A method
for obtaining digital signatures and publickeycryptosystems,Commun. ACM, vol. 21, no. 2,
pp. 120126, Feb. 1983.
[24] J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P.
Silva, and S. LancerosMendez, Energy harvesting
frompiezoelectric materials fully integrated in
footwear, IEEE Trans. Ind. Electron., vol. 57, no. 3,
pp. 813819, Mar. 2010.
[25] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A.
Mahmoud, Video transmission enhancementin
presence of misbehaving nodes in MANETs, Int. J.
Multimedia Syst., vol. 15, no. 5, pp. 273282, Oct.
2009.
Page 430

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: [email protected], [email protected]
Volume 2, Issue 4, July August 2013
ISSN 2278-6856
[26] A. Singh, M. Maheshwari, and N. Kumar, Security
and trust management in MANET, in
Communications inComputer and Information
Science, vol. 147. New York: Springer-Verlag, 2011,
pt. 3, pp. 384387.
[27] B. Sun, Intrusion detection in mobile ad hoc
networks, Ph.D. dissertation, Texas A&M Univ.,
CollegeStation, TX, 2004.
[28] K. Stanoevska-Slabeva and M. Heitmann, Impact of
mobile ad-hoc networks on the mobile value
system,inProc. 2nd Conf. m-Bus., Vienna, Austria,
Jun. 2003.
[29] A. Tabesh and L. G. Frechette, A low-power standalone adaptive circuit for harvesting energy from
apiezoelectric micropowergenerator,IEEE Trans.
Ind. Electron., vol. 57, no. 3, pp. 840849, Mar.
2010.
[30] M. Zapata and N. Asokan, Securingadhocrouting
protocols, inProc. ACM Workshop Wireless Secur.,
2002,pp. 110

AUTHOR:
Sanjith S was born in Tamilnadu, India, in 1984.
He received the M.Sc. degree in Software
Engineering from Anna University, India, in
2007, M.Phil. degree in Computer Science from
PRIST University, India, in 2011 and now he is
pursuing his M.Tech degree in computer and
Information
Technology
in
ManonmaniamSundaranar
University, India. Currently he is working as Systems Analyst in
Dept. of Nanotechnology, Noorul Islam University. His research
interest includes MANETs and Network Security.
Padmadas M is a Sub divisional Engineer in the
IT
Cell of
Bharat Sanchar Nigam Limited
(BSNL) which is a public sector unit under
Government of India at the Office of Chief General
Manager Telecom. Trivandrum, India. He has been managing
the design and development of many software projects for more
than ten years, some of which are for national level deployment
within the organization. He did his Engineering Masters in
Computer and Information Technology with specialization in
Digital Image Processing and acquired Masters in Management
with specialization in Financial Management. He acquired indepth
knowledge
and
hands-on
experience
in
Telecommunication Switching, Transmission and Radio
Systems External Plant, Internal Plant and Power Plant, Data
Communication, GSM, CDMA, Computer Networks, MPLS,
Broadband Technologies, Software Engineering and Software
Project Management, Data Centers and Database Management,
Digital Image Processing using IDL and MATLAB and Expert
Systems using CLIPS.
He presented his paper on "A
Deployable Architecture of Intelligent Transportation Systems A Developing Country Perspective" in the IEEE international
conference-ICCIC-Coimbatore with a publication of the same in
the IEEE Explore and made a live demonstration of the project
implementation along with Dr.KrishananNallaperumal a
renowned Professor-in the ITS conference Pune which is
organized by Center for Development of Advanced
Computing(CDAC) sponsored by Department of IT,
Government of India in coordination with IIT Bombay, IIT

Volume 2, Issue 4 July August 2013

Madras and IIM Calcutta .He is the National Level Topper of


the Technical Competitive Examination conducted by BSNL in
which he selected Data Communication as a special subject. He
was awarded for the outstanding performance in BSNL during
the year 2006. Now he is undergoing research in Network
Security in which he is concentrating on the area of attacks on
Network Nodes.
Dr.(Prof.) Krishnan Nallaperumal is a Passionate
Researcher, Academic leader and Research
Manager
with
substantial
organizational
experience. He completed his Doctorate in
Computer Science and Engineering-Image Processing and did
his masters in Computer and Information Sciences. He is a
Senior Member of IEEE. In the initial stage of his career, he
served in Indian Space Research Organization(ISRO) and
IIT,Kharagpur. Currently he is in the chair of IEEE SIPCICOM:
IEEE Signal Processing, Computational Intelligence and
Computer Joint Societies Chapter of IEEE Madras Section. He
is also in the Chair of IEEE PODHIGAI Subsection of IEEE
Madras Section. He was in the General Chair for the IEEE
SIPCICOM Technically Co-sponsored International Conference
on Advanced Computing and Communication ICACC2007
held on February 9-10, 2007 at Madurai, INDIA, served as
General Chair for the 2010 IEEE International Conference on
Computational Intelligence and Computing Research IEEE
2010ICCIC, December 28-29, 2010 at Coimbatore, INDIA and
served as the General Chair for the 2011 IEEE International
Conference on Computational Intelligence and Computing
Research IEEE 2011ICCIC, December 16-18, 2011 at Cape,
Kanniyakumari, INDIA. He has got extensive experience in
handling a wide range of research projects involving Image
Processing, image analysis and data mining. He got adequate
experience in developing novel algorithms for applications in
computer vision and medical imaging. He is an author of about
60 publications. 3 books and 1 book chapters, 3 lab manuals
and more than 4 authored software products. He supervised
many researches leading to Ph.D. degree: 12 scholars have
successfully completed their Ph.D. degree under his supervision
and 8 candidates are pursuing Ph.D. He has been leading an
Image Processing and Computer Vision laboratory handling
three externally funded research projects. He has been offering
advising and consultancy in Image Processing, Analysis and
Vision related tasks to corporations for many years. Being an
academician having excellent track record, he has been offering
advice to educational institutions on research, consultancy and
curricula design. His area of interests include Image Processing,
Computer Vision, Machine Learning, Nonlinear filters for
signal and image processing, Wide Dynamic range Imaging,
ALPR techniques, Biomedical image analysis, Image Data
Mining, biometric and Biometric Security.

Page 431

You might also like