Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Hybrid Crypto-System Approach use in Secure Intrusion Detection System for MANET

Author : Mr. Ajit N. Gedam 1 Prof. M. P. Wankhade 2

Date of Publication :10th August 2017

Abstract: Recent emerging trends in the world, many firewalls and Crypto-System mechanism play a vital part in network security. However, many of them protection mechanisms are not adequate and effective. Therefore, the study of (intrusion detection system) IDS goes increasing to monitor the network that notices misbehavior or anomalies and notifies to other nodes in the network to avoid the nodes misbehaving. Authentication and encryption acts as first phase of defense while an IDS acts as a second phase of defense. In Mobile Ad hoc Networks (MANET), many schemes are existing for intrusion detection system. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK), which is based on acknowledgement packets for detection of malicious activities. This system increases the network overhead significantly relative to other system. So, in this paper we adopt the hybrid Crypto-System Approach to reduce the network overhead cause by using digital signature in EAACK. The system is termed as Hybrid Crypto-System as it gives an improved security than the fundamental approaches. The concept of Hybrid Crypto-System used which include AES and RSA algorithm. This system proves advanced malicious behavior detection rates and packet delivery factor is improved and enhance the security

Reference :

    1. Shakshuki Elhadi M, Senior Member, IEEE, Nan Kang, and Sheltami Tarek R., Member, IEEE, “EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE transactions on Industrial electronics, Vol. 60, No. 3 March 2013
    2. Marti S., Giuli T. J., Lai K., and Baker M.. “Mitigating Routing Misbehavior In Mobile Ad hoc Networks”. In the Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM, pp. 255-265, Boston, Massachusetts, US, 2000.
    3. Balakrishnan K.; Jing Deng; Varshney, V. K., 2005 “TWOACK: preventing selfishness in mobile ad hoc networks”, In Proceedings of Wireless Communications and Networking Conference, 2005 IEEE , vol.4, no., pp.2137-2142(March 2005).
    4. Liu K., Deng J., Varshney P. K. and Balakrishnan K., 2007, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”. IEEE Transactions on Mobile Computing, May, 536-550.
    5. William Stallings, “Cryptography and Network Security”, Fourth Edition, June 3, 2010.
    6. Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
    7. Kang, N., Shakshuki, E and Sheltami, T., 2010.” Detecting Misbehaving Nodes in MANETs”, In Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010), ACM, pp. 216-222.
    8. Kang, N., Shakshuki E and Sheltami T. 2011 “Detecting Forged Acknowledgements in MANETs”, The 25thInternational Conference on Advanced Information Networking and Applications (AINA), IEEE Computer Society, Biopolis, Singapore.
    9. Alriyami Qasim M., Asimakopoulou Eleana, NikBessis School of Computing and Mathematics, University of Derby, UK “A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks”. 2014 International Conference on Intelligent Networking and Collaborative Systems
    10. Samreen Shirina , G. Narasimha “An Efficient Approach for the Detection of Node Misbehaviour in a MANET based on Link Misbehaviour” 2013 3rd IEEE International Advance Computing Conference (IACC).

Recent Article