Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Authentication Method using Acknowledgment-based IDS for MANET

Dr. G. Komarasamy, G. Gowthaman


Mobile Ad hoc Network (MANET) has been pervasive in many applications, including some procedures such as security in critical applications has been a major threats in MANETs. This exceptional characteristics of MANETs, anticipation methodologies lonely cannot able to be secure the data. In this circumstance secure acknowledgment of each data should have a defensive force before the attackers violate the system. The mechanism of Intrusion Detection System (IDS) is normally used to protect the wireless networks for security purposes in MANETs. In case of MANETs, intrusion detection system is favored since the first day of their invention. Communication is restricted to the transmitters within a radio frequency range. Owing to the superior technology that reduces the cost of infrastructure services to gain more importance in autonomous topology of mobile nodes. A novel IDS, EAACK is mainly a secure authentication method using acknowledgment for MANETs to transmit packets in mobility nodes. In this case, out of range in mobile nodes cases security issues while transmitting data from source to destination nodes. This results that the communication of each mobility nodes take place in radio frequency range and the out of range in communication leads the parties to relay data transmissions to reach the destination node.



Enhanced Adaptive Acknowledgement (EAACK), Hybrid Cryptographic Key Exchange Algorithm, Digital Signature

Full Text:



R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” In Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, pp. 659–666, 2012.

R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” In Proceedings in 2nd International Meeting ACCT, Rohtak, Haryana, India, pp. 535–541, 2012.

T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” In Wireless/Mobile Security. New York: Springer- Verlag, 2008

D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Transactions on Industrial Electronics, vol. 55, no. 7, pp. 2759–2766, Jul. 2008

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” In Proceedings in 12th International Conference WAS, Paris, France, Nov. 8–10,2010, pp. 216–222

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” In Proceedings IEEE 25th International Conference AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494

K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Transransation on Mobile Computing, vol. 6, no. 5, pp. 536–550, 2007.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” In Proceeding 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, pp. 255–265, 2000.

T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence of misbehaving nodes in MANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009

A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micro power generator,” IEEE Transaction Industrial Electronics, vol. 57, no. 3, pp. 840–849, Mar. 2010

A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signature, public-key cryptosystems,” Communication systems in ACM, vol. 21, no. 2, pp. 120–126, Feb. 1983.

K. Stanoevska-Slabeva and M. Heitmann, “Impact of mobile ad-hoc networks on the mobile value system,” In Proceedings on 2nd Conference m-Bus., Vienna, Austria, Jun. 2003.

M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” In Proceeding on ACM Workshop Wireless Security, pp. 1–10, 2002.

L. Zhou and Z. Haas, “Securing ad-hoc networks,” IEEE Networking, vol. 13, no. 6, pp. 24–30, Dec. 1999


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.