SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Enhanced Adaptive Acknowledgement[EAACK] -
A Secure Intrusion Detection Sysytem for MANETs
Akshaya Arunan
Guided By: Mrs Vrinda
Assistant Proffessor
MKALEIT041
February 12, 2015
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
OUTLINE
1 OBJECTIVE
2 INTRODUCTION
Mobile Ad Hoc Networks(MANET)[3]
Attacks
3 LITERATURE SURVEY
4 PROPOSED SYSTEM
5 SCHEME DECRIPTION
6 CONCLUSION
7 REFERENCE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
OBJECTIVE
EAACK demonstrates higher malicious behavior detection rates in certain
circumstances while does not greatly affect the network performances.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
INTRODUCTION
Most used networks - Wireless Local Area Network (WLAN).
A set of mobile nodes are connected to a fixed wired backbone.
Short range
Risky
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
Mobile Ad Hoc Networks[3]
Self-configuring.
Infrastructure-less network - without wires.
Each device is free to move independently in any direction
Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to
communicate with roadside equipment.
Disadvantage - More vulnerable to attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
Atacks
Denial of service.
Eavesdropping.
Spoofing.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
Figure : MANET
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
LITERATURE SURVEY
WATCHDOG[4]
TWOACK[5]
AACK[7]
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
WATCHDOG[4]
Aim: To improve throughput of network with the presence of malicious
nodes.
Consists of two parts:
Watchdog
Pathrater
Detection - Promiscuously listens to its next hops transmission.
If overhears that its next node failed - increases its failure counter.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
Watchdog Limitations
Three problems of Watchdog scheme, namely:
Receiver collision
Limited transmission power
False misbehavior
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : RECIEVER COLLISION: Both node B and node X are trying to send
packet 2 to node c at the same time
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission
power so that the packet transmission can be overheard by node A but too weak
to reach node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour
report even though node B forwarded the packet to node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
TWOACK[5]
Aim: To resolve the receiver collision and limited transmission power
problems of Watchdog
TWOACK detects misbehaving links by
Acknowledging every data packets.
From the source to the destination.
Upon retrieval of a packet
Sends back an acknowledgement packet
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
Figure : TWOACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
AACK[7]
Similar to TWOACK, AACK is an acknowledgement based network layer
scheme.
ACK (identical to TWOACK) + End-to-End acknowledgement scheme
called ACK.
Reduces network overhead.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
PROPOSED SYSTEM - EAACK[1]
Steps:
LOCAL INTEGRATION
GLOBAL INTEGRATION
HOME AGENT
CLASSIFIER
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
Description
LOCAL INTEGRATION: Self system and finds out the local anomaly
attacks.
GLOBAL INTEGRATION: Finds the intrusion result for entire network.
HOME AGENT: Gathers information about its system from application
layer to routing layer.
CLASSIFIER: The Home Agent calls the classifier construction to find out
the attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
Figure : PROPOSED SYSTEM ARCHITECTURE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
SCHEME DESCRIPTION
EAACK consists of three major parts, namely:
Acknowledge (ACK)
Secure-Acknowledge (S-ACK)
Misbehaviour Report Authentication (MRA)
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
Figure : FLOW CHART OF EAACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
CONCLUSION
A comparative study of Secure Intrusion Detection Systems (SIDS) for
discovering malicious nodes and attacks on MANETs is presented.
Prevention mechanisms alone are not adequate to manage the secure
networks.
Thus, detection should be focused as another part before an attacker can
damage the structure of the system.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
REFERENCE
[1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System
for MANETs” - International Journal of Latest Trends and Technology in
Engineering, 2013.
[2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network
Security” - Springer, 2012.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
[3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc
Wireless Networks” - Mobile Computing, Kluwer Academic Publishers,
1996.
[4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving
Nodes in MANETs” - The 12th International Conference on Information
Integration and Web-based Applications Services, 2010.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
[5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged
Acknowledgements in MANETs” - The 25th International Conference on
Advanced Information Networking and Applications, 2011.
[6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a
Distributed Wireless Sensor Network”- IEEE Transactions on
Instrumentation and Measurement, 2008.
[7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for
Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and
Wireless Conference, 2003.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
THANK YOU.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19

Mais conteúdo relacionado

Semelhante a Akshayappt

EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overviewvpmmguys
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
A Review of Cybersecurity in Power Substations
A Review of Cybersecurity in Power SubstationsA Review of Cybersecurity in Power Substations
A Review of Cybersecurity in Power SubstationsIRJET Journal
 
Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentationpacomeambassa
 
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptslksagar
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Kumar Dlk
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)Sunghun Kim
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
 
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...IRJET Journal
 
Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 

Semelhante a Akshayappt (20)

EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2
 
A Review of Cybersecurity in Power Substations
A Review of Cybersecurity in Power SubstationsA Review of Cybersecurity in Power Substations
A Review of Cybersecurity in Power Substations
 
Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
 
Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
 
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
 
Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approach
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A044060107
A044060107A044060107
A044060107
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 

Akshayappt

  • 1. Enhanced Adaptive Acknowledgement[EAACK] - A Secure Intrusion Detection Sysytem for MANETs Akshaya Arunan Guided By: Mrs Vrinda Assistant Proffessor MKALEIT041 February 12, 2015 Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
  • 2. OUTLINE 1 OBJECTIVE 2 INTRODUCTION Mobile Ad Hoc Networks(MANET)[3] Attacks 3 LITERATURE SURVEY 4 PROPOSED SYSTEM 5 SCHEME DECRIPTION 6 CONCLUSION 7 REFERENCE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
  • 3. OBJECTIVE EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
  • 4. INTRODUCTION Most used networks - Wireless Local Area Network (WLAN). A set of mobile nodes are connected to a fixed wired backbone. Short range Risky Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
  • 5. Mobile Ad Hoc Networks[3] Self-configuring. Infrastructure-less network - without wires. Each device is free to move independently in any direction Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to communicate with roadside equipment. Disadvantage - More vulnerable to attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
  • 6. Atacks Denial of service. Eavesdropping. Spoofing. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
  • 7. Figure : MANET Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 8. LITERATURE SURVEY WATCHDOG[4] TWOACK[5] AACK[7] Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 9. WATCHDOG[4] Aim: To improve throughput of network with the presence of malicious nodes. Consists of two parts: Watchdog Pathrater Detection - Promiscuously listens to its next hops transmission. If overhears that its next node failed - increases its failure counter. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
  • 10. Watchdog Limitations Three problems of Watchdog scheme, namely: Receiver collision Limited transmission power False misbehavior Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 11. Figure : RECIEVER COLLISION: Both node B and node X are trying to send packet 2 to node c at the same time Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 12. Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission power so that the packet transmission can be overheard by node A but too weak to reach node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 13. Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour report even though node B forwarded the packet to node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 14. TWOACK[5] Aim: To resolve the receiver collision and limited transmission power problems of Watchdog TWOACK detects misbehaving links by Acknowledging every data packets. From the source to the destination. Upon retrieval of a packet Sends back an acknowledgement packet Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 15. Figure : TWOACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 16. AACK[7] Similar to TWOACK, AACK is an acknowledgement based network layer scheme. ACK (identical to TWOACK) + End-to-End acknowledgement scheme called ACK. Reduces network overhead. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 17. PROPOSED SYSTEM - EAACK[1] Steps: LOCAL INTEGRATION GLOBAL INTEGRATION HOME AGENT CLASSIFIER Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
  • 18. Description LOCAL INTEGRATION: Self system and finds out the local anomaly attacks. GLOBAL INTEGRATION: Finds the intrusion result for entire network. HOME AGENT: Gathers information about its system from application layer to routing layer. CLASSIFIER: The Home Agent calls the classifier construction to find out the attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
  • 19. Figure : PROPOSED SYSTEM ARCHITECTURE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 20. SCHEME DESCRIPTION EAACK consists of three major parts, namely: Acknowledge (ACK) Secure-Acknowledge (S-ACK) Misbehaviour Report Authentication (MRA) Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 21. Figure : FLOW CHART OF EAACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 22. CONCLUSION A comparative study of Secure Intrusion Detection Systems (SIDS) for discovering malicious nodes and attacks on MANETs is presented. Prevention mechanisms alone are not adequate to manage the secure networks. Thus, detection should be focused as another part before an attacker can damage the structure of the system. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 23. REFERENCE [1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System for MANETs” - International Journal of Latest Trends and Technology in Engineering, 2013. [2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network Security” - Springer, 2012. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
  • 24. [3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc Wireless Networks” - Mobile Computing, Kluwer Academic Publishers, 1996. [4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving Nodes in MANETs” - The 12th International Conference on Information Integration and Web-based Applications Services, 2010. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
  • 25. [5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged Acknowledgements in MANETs” - The 25th International Conference on Advanced Information Networking and Applications, 2011. [6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network”- IEEE Transactions on Instrumentation and Measurement, 2008. [7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and Wireless Conference, 2003. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
  • 26. THANK YOU. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19