reference paper 1

8
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected] Volume 2, Issue 4, July – August 2013 ISSN 2278-6856 Volume 2, Issue 4 July – August 2013 Page 424 EAACK – Based Intrusion Detection and Prevention for MANETs using ECC Approach Sanjith S 1 , Padmadas M 1 , andKrishnan N 1 1 Centre for Information Technology and Engineering, ManonmaniamSundaranar University, India. Abstract-The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network create its potential in several applications. Among all the up to date wireless net- works, Mobile Ad hoc Network (MANET) is one in every of the foremost necessary and distinctive applications. On the contrary to ancient specification, MANET doesn't need a hard and fast network infrastructure; each single node works as each a transmitter and a receiver. Nodes communicate directly with one another once they are in range intervals constant communication varies. Otherwise, they place confidence in their neighbors to relay messages. The self-configuring ability of nodes in MANET created it fashionable among vital mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes create MANET liable to malicious attackers. Duringthis case, it's crucial to develop economical intrusion-detection mechanisms to defend MANET from attacks. With the enhancements of the technology and cut in hardware prices, we tend to area unit witnessing a current trend of increasing MANET into industrial applications. To regulate to such trend, we tend to powerfully believe that it's very important to handle its potential security problems. During this paper, we tend to propose and implement a brand new intrusion- detection and prevention system named EAACK based Intrusion Detection and prevention system using ECC approach specially designed for MANET. Compared to up to date approaches, our approach demonstrates higher malicious-behavior detection rates in sure circumstances whereas doesn't greatly have an effect on the network performances. Keywords - Digitalsignature , Enhanced Adaptive ACKnowledgment (AACK) (EAACK), Mobile Adhoc NETwork (MANET), Elliptic Curve Cryptography (ECC) . I. INTRODUCTION Due to their natural quality and quantifiability, wireless networks area unit perpetually most popular since the primary day of their invention. Becauseof the improved technologyand reduced prices, wireless networks have gained rather more preferences over wired networks within the past few decades. By definition, Mobile Ad hoc NETwork (MANET) is a set of mobile nodes equipped with each a wireless transmitter and a receiver that communicate with one another via bidirectional wireless links either directly or indirectly. Industrial remote access and management via wireless networks are getting additional and additional in style currently [35]. One in all the key blessings of wireless networks is its ability to permit electronic communication between completely different parties and still maintain their quality. However, this communication is restricted to the vary of transmitters. This implies that 2 nodes cannot communicate with one another once the space between the 2 nodes is on the far side the communication varies of their own. MANET solves this drawback by permitting intermediate par- ties to relay information transmissions. This is often achieved by dividing MANET into 2 varieties of networks, namely, single-hop and multihop. During a single-hop network, all nodes among a similar radio vary communicate directly with one another. On the opposite hand, during a multihop network, nodes admit different intermediate nodes to transmit if the destination node is out of their radio vary. In contrary to the normal wireless network, MANETincorporates a suburbanized network infrastructure. MANET doesn't need a hard and fast infrastructure; therefore, all nodes area unit unengaged to move arbitrarily [10], [27], [29]. MANET is capable of making a self-configuring and self-maintaining network while not the assistance of a centralized infrastructure, that is commonly unfeasible in crucial mission applications like military conflict or emergency recovery. tokenish configuration Associate in fast preparation create MANET able to be utilized in emergency circumstances wherever an infrastructure is unavailable or impracticable to put in in scenarios like natural or human-induced disasters, military conflicts, and medical emergency things [19], [30]. Owing to these distinctive characteristics, MANET is becoming additional and additional wide enforced within the trade [14], [28]. However, considering the very fact that MANET is in style among crucial mission applications, network security is of important importance. sadly, the open medium and remote distribution of MANET create it prone to varied varieties of attacks. for instance, as a result of the nodes’ lack of physical pro-tection, malicious attackers will simply capture and compromise nodes to attain attacks. specially, considering the very fact that the majority routing protocols in MANETs assume that each node within the network behaves hand and glove with different nodes and presumptively not malicious [5], attackers will simply compromise MANETs by inserting malicious or

Upload: rajakumar-srini

Post on 11-Jan-2016

220 views

Category:

Documents


0 download

DESCRIPTION

This is the reference paper of the An Enhanced Secure Communication System for Network Intrusion

TRANSCRIPT

Page 1: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 424

EAACK – Based Intrusion Detection and Prevention for MANETs using ECC Approach

Sanjith S 1, Padmadas M1 , andKrishnan N1

1 Centre for Information Technology and Engineering, ManonmaniamSundaranar University, India. Abstract-The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network create its potential in several applications. Among all the up to date wireless net- works, Mobile Ad hoc Network (MANET) is one in every of the foremost necessary and distinctive applications. On the contrary to ancient specification, MANET doesn't need a hard and fast network infrastructure; each single node works as each a transmitter and a receiver. Nodes communicate directly with one another once they are in range intervals constant communication varies. Otherwise, they place confidence in their neighbors to relay messages. The self-configuring ability of nodes in MANET created it fashionable among vital mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes create MANET liable to malicious attackers. Duringthis case, it's crucial to develop economical intrusion-detection mechanisms to defend MANET from attacks. With the enhancements of the technology and cut in hardware prices, we tend to area unit witnessing a current trend of increasing MANET into industrial applications. To regulate to such trend, we tend to powerfully believe that it's very important to handle its potential security problems. During this paper, we tend to propose and implement a brand new intrusion-detection and prevention system named EAACK based Intrusion Detection and prevention system using ECC approach specially designed for MANET. Compared to up to date approaches, our approach demonstrates higher malicious-behavior detection rates in sure circumstances whereas doesn't greatly have an effect on the network performances. Keywords - Digitalsignature , Enhanced Adaptive ACKnowledgment (AACK) (EAACK), Mobile Adhoc NETwork (MANET), Elliptic Curve Cryptography (ECC) . I. INTRODUCTION

Due to their natural quality and quantifiability, wireless networks area unit perpetually most popular since the primary day of their invention. Becauseof the improved technologyand reduced prices, wireless networks have gained rather more preferences over wired networks within the past few decades. By definition, Mobile Ad hoc NETwork (MANET) is a set of mobile

nodes equipped with each a wireless transmitter and a receiver that communicate with one another via

bidirectional wireless links either directly or indirectly. Industrial remote access and management via wireless networks are getting additional and additional in style currently [35]. One in all the key blessings of wireless networks is its ability to permit electronic communication between completely different parties and still maintain their quality. However, this communication is restricted to the vary of transmitters. This implies that 2 nodes cannot communicate with one another once the space between the 2 nodes is on the far side the communication varies of their own. MANET solves this drawback by permitting intermediate par- ties to relay information transmissions. This is often achieved by dividing MANET into 2 varieties of networks, namely, single-hop and multihop. During a single-hop network, all nodes among a similar radio vary communicate directly with one another. On the opposite hand, during a multihop network, nodes admit different intermediate nodes to transmit if the destination node is out of their radio vary. In contrary to the normal wireless network, MANETincorporates a suburbanized network infrastructure. MANET doesn't need a hard and fast infrastructure; therefore, all nodes area unit unengaged to move arbitrarily [10], [27], [29]. MANET is capable of making a self-configuring and self-maintaining network while not the assistance of a centralized infrastructure, that is commonly unfeasible in crucial mission applications like military conflict or emergency recovery. tokenish configuration Associate in fast preparation create MANET able to be utilized in emergency circumstances wherever an infrastructure is unavailable or impracticable to put in in scenarios like natural or human-induced disasters, military conflicts, and medical emergency things [19], [30].

Owing to these distinctive characteristics, MANET is becoming additional and additional wide enforced within the trade [14], [28]. However, considering the very fact that MANET is in style among crucial mission applications, network security is of important importance. sadly, the open medium and remote distribution of MANET create it prone to varied varieties of attacks. for instance, as a result of the nodes’ lack of physical pro-tection, malicious attackers will simply capture and compromise nodes to attain attacks. specially, considering the very fact that the majority routing protocols in MANETs assume that each node within the network behaves hand and glove with different nodes and presumptively not malicious [5], attackers will simply compromise MANETs by inserting malicious or

Page 2: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 425

no cooperative nodes into the network. What is more, as a result of MANET’s distributed design and dynamical topology, a conventional centralized observance technique isn't any longer possible in MANETs. In such case, it's crucial to develop Associate in Nursing intrusion-detection system (IDS). II. BACKGROUND

A. Intrusion Detection in MANETs:

As mentioned before, as a result of the restrictions of most MANET routing protocols, nodes in MANETs assume that different nodes invariably work with one another to relay information. This assumption leaves the attackers with the opportunities to attain vital impact on the network with only one or 2 compromised nodes. to handle this drawback, associate IDS ought to be additional to reinforce the protection level of MANETs. If MANET will observe the attackers as before long as they enter the network, we'll be able to fully eliminate the potential damages caused by compromised nodes at the primary time. IDSs sometimes act because the second layer in MANETs, and that they area unit an excellent complement to existing proactive approaches [27]. Anantvalee and Wu dialect [4] given a awfully thorough survey on up to date IDSs in MANETs. In this section, we tend to primarily describe 3 exist- ing approaches, namely, Watchdog [17], TWOACK [15], and adjustiveACKnowledgment (AACK) [25]. 1) Watchdog: [17] projected a theme named Watchdog that aims to boost the output of network with the presence of malicious nodes. In fact, the Watchdog theme is consisted of 2 elements, namely, Watchdog and Pathrater. Watchdog is associate IDS for MANETs. It’s liable for police investigation malicious node misbehaviors in the network. Watchdog detects malicious misbehaviors by promiscuously being attentive to its next hop’s transmission. If a Watchdog node overhears that its next node fails to forward the packet among a particular amount of your time, it will increase its failure counter. When- ever a node’s failure counter exceeds a predefined threshold, the Watchdog node reports it as misbehaving. During this case, the Pathrater cooperates with the routing protocols to avoid the reported nodes in future transmission.

Many following analysis studies and implementations have proved that the Watchdog theme is economical. Moreover, compared to another schemes, Watchdog is capable of police investigation malicious nodes instead of links. These benefits have created the Watchdog theme a well-liked alternative within the field. Several MANET IDSs area unit either supported or developed as associate improvement to the Watchdog theme [15], [20], [21], [25]. All the same, as seen by Marti et al. [17], the Watchdog theme fails to observe malicious misbehaviors with the presence of the following: 1) ambiguous collisions; 2) receiver collisions; 3) Restricted transmission power; 4) false misdeed

report;5) collusion; and 6) partial dropping. We tend to discuss these weak- nesses with additional detail in Section III. 2) TWOACK:With regard to the six weaknesses of the Watchdog theme, several researchers projected new approaches to unravel these problems. TWOACK projected by Liu et al. [16] is one in all the foremost necessary approaches among them. Onthe contrary to several different schemes, TWOACK is neither associate sweetening nor a Watchdog-based theme. Getting to resolve the receiver collision and restricted transmission power problems of Watchdog, TWOACK detects misbehaving links by acknowledging each information packet transmitted over each 3 consecutive nodes on the trail from the supply to the destination. Upon retrieval of a packet, every node on the route is needed to challenge associate acknowledgment packet to the node that's 2 hops aloof from it down the route. TWOACK is needed to figure on routing protocols like Dynamic supply Routing (DSR) [11]. The operating method of TWOACK is shown in Fig. one: Node a primary forwards Packet 1 to node B, and then, node B forwards Packet one to node C. once node C receives Packet one, because it is 2 hops aloof from node A, node C is duty-bound to come up with a TWOACK packet, that contains reverse route from node A to node C, and sends it back to node A. The retrieval of this TWOACK packet at node A indicates that the transmission of Packet one from node A to node C is fortunate. Otherwise, if this TWOACK packet isn't received in an exceedingly predefined period, each nodes B and C area unit reported malicious. Identical method applies to each 3 consecutive nodes on the remainder of the route.

Fig.1. TWOACKscheme:Eachnodeisrequiredtosendbackanacknowl-edgment packettothenodethatistwohops awayfromit. The TWOACK theme with success solves the receiver collision and restricted transmission power issues expose by Watchdog. However, the acknowledgment method needed in each packet transmission method additional a big quantity of unwanted network overhead. as a result of the restricted battery power nature of MANETs, such redundant transmission method will simply degrade the lifetime of the whole network. However, several analysis studies area unit operating in energy gathering to handle this drawback [25], [28], [29]. 3) AACK: supported TWOACK, [25] pro- expose a new theme referred to as AACK. almost like TWOACK, AACK is associate acknowledgment-based network layer theme which may be thought-about as a mixture of a theme referred to as TACK (identical to TWOACK)

Page 3: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 426

associated an end-to-end acknowledgment theme referred to as ACKnowledge (ACK). Compared to TWOACK, AACK considerably reduced network overhead whereas still capable of maintaining or perhaps surpassing identical network output. The end-to-end acknowledgment theme in ACK is shown in Fig. 2.

Fig.2.ACKscheme:Thedestinationnodeisrequiredtosendacknowledg-ment packetstothesourcenode.

In the ACK theme shown in Fig. 2, the supply

node S sends out Packet one with none overhead except two b of flag indicating the packet sort. All the intermediate nodes merely forward this packet. Once the destination node D receives Packet one, it's needed to challenge associate ACK acknowledgment packet to the supply node S on the reverse order of identical route. Among a predefined period, if the supply node S receives this ACK acknowledgment packet, then the packet transmission from node S to node D is fortunate. Otherwise, the supply node S can switch to TACK theme by causation out a TACK packet. The conception of adopting a hybrid theme in AACK greatly reduces the network overhead, however each TWOACK and AACK still suffer from the matter that they fail to observe malicious nodes with the presence of false misdeed report and cast acknowledgment packets. B.DigitalSignature

Digital signatures have continually been associate integral a part of cryptography in history. Cryptography is that the study of mathematical techniques associated with aspects of knowledge security like confidentiality, knowledge integrity, entity authentication, and knowledge origin authentication [18]. The event of cryptography technique features a long and interesting history. The pursuit of secure communication has been conducted by person since 4000 years agone in Egypt, in keeping with Kahn’s book [30] in 1963. Such development dramatically accelerated since the globe War II, that some believe is basically because of the economic {process} process.

The security in MANETs is outlined as a mix of processes, procedures, and systems won’t to guarantee confidentiality, authentication, integrity, availableness, and nonrepudiation [18]. Digital signature may be a wide adopted approach to confirm the authentication, integrity, and nonrepudiation of MANETs.

Fig.3.Communicationwithdigitalsignature.

To ensure the validity of the digital signature, the sender Alice is obligated to continually keep her personal key Pr Alice as a secret while not revealing to anyone else. Otherwise, if the assailant Eve gets this secret personal key, she will be able to intercept the message and simply forge malicious messages with Alice’s signature and send them to Bob. As these malicious messages are digitally signed by Alice, Bob sees them as legit and authentic messages from Alice. Thus, Eve will promptly attain malicious attacks to Bob or perhaps the complete network. Next, Alice will send a message m in conjunction with the signature SigAlice to Bob via associate unsecured channel. Bob then computes the received message m against the preagreed hash operate H to urge the message digest d. This method are often generalized asH (m ) = d . (3) Bob will verify the signature by applying Alice’s public keyPk−Alice on SigAlice , by usingcan be generalized as an information string, that associates a message (in digital form) with some originating entity, or associate electronicSPk Alice (SigAlice ) = d. (4) Digital signature schemes are often in the main divided into the subsequent 2 classes. 1) Digital signature with appendix: the initial message is needed within the signature verification formula. Examples embody a digital signature formula (DSA) [33]. 2) Digital signature with message recovery: this sort of theme doesn't need the other info besides the signature itself within the verification method. Examples embody RSA [23]. If d == d, then it's safe to say that the message m transmitted through associate unsecured channel is so sent from Alice and also the message itself is unbroken. III.PROBLEMDEFINITION

Ourproposed approach EAACK with

ECCisdesigned totacklethree of thesixweaknessesof Watchdogscheme,namely, false misbehavior,limitedtransmissionpower,andreceivercollision and to provide Security in packet delivery. In thissection,wediscussthesethreeweaknessesindetail.

Page 4: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 427

Fig.4. Receivercollisions: BothnodesBandXaretryingtosendPacket1and Packet2,respectively,tonodeCatthesame time.

Fig.5. Limitedtransmissionpower:NodeBlimitsitstransmissionpowersothatthepackettransmissioncanbeoverheardbynodeA buttooweaktoreachnode C.

Fig.6. Falsemisbehaviorreport: NodeAsendsbackamisbehaviorreporteven thoughnodeBforwardedthepacketto nodeC.

Fig.7.Systemcontrolflow:ThisfigureshowsthesystemflowofhowtheEAACKschemeworks.

In a typical example of receiver collisions,

shown in Fig. 4, once node A sends Packet one to node B, it tries to take in if node B forwarded this packet to node C; in the meantime, node X is forwarding Packet a pair of to node C. In such case, node A overhears that node B has with success forwarded Packet one to node C however didn't observe that node C failed to receive this packet as a result of a collision between Packet one and Packet a pair of at node C. In the case of restricted transmission power, so as to pre- serve its own battery resources, node B on purpose limits its transmission power in order that it's robust enough to be overheard by node A however not robust enough to be received by node C, as shown in Fig. 5. For false wrongful conduct report, though node A with success overheard that node B forwarded Packet one to node C, node A still rumored node B as misbehaving, as shown in Fig. 6. As a result of the open medium and remote distribution of typical MANETs, attackers will simply capture and compromise one or 2 nodes to attain this false wrongful conduct report attack. As mentioned in previous sections, TWOACK and AACK solve 2 of those 3 weaknesses, namely, receiver collision and restricted transmission power. However,

each of them area unit at risk of the false wrongful conduct attack. during this analysis work, our goal is to propose a brand new IDS specially designed for MANETs, that solves not solely receiver collision and restricted transmission power however additionally the false wrongful conduct downside. Furthermore, we have a tendency to extend our analysis to adopt a digital sig- nature theme throughout the packet transmission method. As all told acknowledgment-based IDSs, it's important to make sure the integrity and credibleness of all acknowledgment packets. In this section, we tend to describe our projected EAACK theme thoroughly. The approach delineated during this analysis paper relies on our previous work [12], wherever the backbone of EAACK was projected and evaluated through implementation. During this work, we tend to extend it with the introduction of digital signature to forestall the assaulter from formation acknowledgment packets.

IV. SCHEMEDESCRIPTION EAACK is consisted of 3 major components,

namely, ACK, secure ACK (S-ACK), and misconduct report authentication (MRA). so as totally differentiate to tell apart} different packet varieties in different schemes, we tend to enclosed a 2-b packet header in EAACK. According to the web draft of DSR [11], there's half-dozen b reserved within the DSR header. In EAACK, we tend to use two b of the half-dozen b to flag differing kinds of packets. Fig. 7 (shown later) presents a flow diagram describing the EAACK theme. Please note that, in our projected theme, we tend to assume that the link between every node within the network is bifacial. What is more, for every communication method, each the supply node and also the destination node don't seem to be malicious. Unless nominative, all acknowledgment packets delineated during this analysis square measure needed to be digitally signed by its sender and verified by its receiver. A. ACK As mentioned before, ACK is essentially associate end-to-end acknowledgment theme. It acts as a district of the hybrid theme in EAACK, attending to scale back network overhead once no network misconduct is detected. In Fig. 8, in ACK mode, node S initial sends out associate ACK information packet Pad1 to the destination node D. If all the intermediate nodes on the route between nodes S and D square measure cooperative and node D with success receives Pad1 , node D is needed to remand associate ACK acknowledgment packet Pak1 on a similar route however in a very reverse order. inside a predefined fundamental quantity, if node S receives Pak1 , then the packet transmission from node S to node D is winning. Otherwise, node S can switch to S-ACK mode by causing out associate S-ACK information packet to sight the misbehaving nodes within the route. B. S-ACK

Page 5: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 428

The S-ACK theme is associate improved version of the TWOACK theme projected by Liu et al. [16]. The principle is to let each 3 consecutive nodes add a gaggle to sight misbehaving nodes. for each 3 consecutive nodes within the route, the third node is needed to send associate S-ACK acknowledgment packet to the primary node. The intention of introducing S-ACK mode is to sight misbehaving nodes within the presence of receiver collision or restricted transmission power. As shown in Fig. 9, in S-ACK mode, the 3 consecutive nodes (i.e., F1, F2, and F3) add a gaggle to sight misbehaving nodes within the network. Node F1 initial sends out S-ACK information packet Psad1 to node F2. Then, node F2 forwards this packet to node F3. Once node F3 receives Psad1 , because it is that the third node during this three-node cluster, node F3 is needed to remand associate S-ACK acknowledgment packet Psak1 to node F2. Node F2 forwards Psak1 back to node F1. If node F1 doesn't receive this acknowledgment packet inside a predefined fundamental quantity, each nodes F2 and F3 square measure rumored as malicious. Moreover, a misconduct report are generated by node F1 and sent to the supply node S. Nevertheless, not like the TWOACK theme, wherever the supply node like a shot trusts the misconduct report, EAACK needs the supply node to modify to MRA mode and make sure this misconduct report. This can be an important step to sight false misconduct report in our projected theme. C. MRA The MRA theme is meant to resolve the weakness of Watchdog once it fails to sight misbehaving nodes with the presence of false misconduct report. The false misconduct report may be generated by malicious attackers to incorrectly report innocent nodes as malicious. This attack may be fatal to the complete network once the attackers break down enough nodes and so cause a network division. The core of MRA theme is to attest whether or not the destination node has received the rumored missing packet through a special route. To initiate the MRA mode, the supply node initial searches its native mental object and seeks for an alternate route to the destination node. If there's no alternative that exists, the supply node starts a DSR routing request to seek out another route. Attributable to the character of MANETs, it's common to seek out multiple routes between 2 nodes. By adopting an alternate route to the destination node, we tend to circumvent the misconduct newsperson node. Once the destination node receives associate MRA packet, it searches its native knowledge base and compares if the rumored packet was received. If it's already received, then it's safe to conclude that this can be a false misconduct report and whoever generated this report is marked as malicious. Otherwise, the misconduct report is trusty and accepted.By the adoption of MRA theme, EAACK is capable of sleuthing malicious nodes despite the existence of false misbehavior report.

D. Digital Signature As mentioned before, EAACK is associate acknowledgment-based IDS. All 3 components of EAACK, namely, ACK, S-ACK, and MRA, square measure acknowledgment-based detection schemes. All of them believe on acknowledgment packets to sight misbehaviors within the network. Thus, it's extraordinarily necessary to make sure that every one acknowledgment packets in EAACK square measure authentic and untainted. Otherwise, if the attackers square measure good enough to forge acknowledgment packets, all of the3 schemescan be vulnerable. With reference to this imperative concern, we tend to incorporated digital signature in our projected theme. so as to make sure the integrity of the IDS, EAACK needs all acknowledgment packets to be digitally signed before they're sent out and verified till they're accepted. However, we tend to absolutely perceive the additional resources that square measure needed with the introduction of digital signature in MANETs. To deal with this concern, we tend to enforced each DSA [33] and RSA [23] digital signature schemes in our projected approach. The goal is to seek out the foremost best resolution for victimization digital signature in MANETs. V. PERFORMANCEEVALUATION

Inthissection,weconcentrate ondescribingoursimulation environmentandmethodology aswellascomparingperformancesthroughsimulationresultcomparison withWatchdog, TWOACK, andEAACKschemes. A. Simulation Methodologies To higher investigate the performanceof EAACK underneath differing kinds of attacks, we tend to propose 3 situation settings to simulate differing kinds of misbehaviors or attacks. Scenario 1: during this situation, we tend to simulate a basic packet- dropping attack. Malicious nodes merely drop all the packets that they receive. The aim of this situation is to check the performance of IDSs against 2 weaknesses of Watchdog, namely, receiver collision and restricted transmission power. Scenario 2: This situation is meant to check IDSs’ performances against false misconduct report. During this case, malicious nodes continuously drop the packets that they receive and remand a false misconduct report whenever it's potential. Scenario 3: This situation is employed to check the IDSs’ performances once the attackers square measure good enough to forge acknowledgment packets and claiming positive result whereas, in fact, it's negative. As Watchdog isn't associate acknowledgment-based theme, it's not eligible for this situation setting. B. Elliptic Curve: Some Definitions Scalar Multiplication: Given an integer k and a point P on the elliptic curve, the elliptic scalar multiplication kP is the result of adding Point P to itself k times.

Page 6: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 429

Order: Order of a point P on the elliptic curve is the smallest integer r such thatrP = O. Further if c and d are integers, then cP = dP iff c d (mod r). Curve Order: The number of points on the elliptic curve is called its curve order and is denoted #E.

ELLIPTICAL CURVE DISCRETE LOGARITHM PROBLEM The strength of the Elliptic Curve Cryptography lies in the Elliptic Curve Discrete Log Problem (ECDLP). The statement of ECDLP is as follows. Let E be an elliptic curve and P E be a point of order n. Given a point Q E with Q = mP, for a certain m 2, 3, ……, m – 2. Find the m for which the above equation holds. When E and P are properly chosen, the ECDLP is thought to be infeasible. Note that m = 0, 1 and m – 1, Q takes the values O, P and – P. One of the conditions is that the order of P i.e. n be large so that it is infeasible to check all the possibilities of m. C. Simulation Configurations Our simulation is conducted in machine which has java net beans the coding has been done to simulate the concept which has been discussed the ECC algorithm is providing high security while packet are send through the network from node to node. D. Simulated Results The figure given below is the results of our simulation and these results provide high quality in data delivery with high Security provided by ECC.

Fig : 8 The nodes are defined in between the source and Destination

Fig : 9 The nodes in between source and Destination and destination are Scanned for Communication

Fig : 10 The arrows shows the energy effective based path finding

Fig: 11 Hello Message Recived

In terms of machine quality and memory consumption, we tend to did analysis on standard mobile sensors. Per our analysis, one in all the foremost standard sensing element nodes within the market is Tmote Sky [34]. This kind of sensing element is provided with a TI MSP430F1611 8-MHz processor and 1070 kilobyte of memory house. We tend to believe that this can be enough for handling our simulation settings in terms of each machine power and memory house. VI. CONCLUSION AND FUTURE WORK

Packet-dropping attack has continually been a serious threat to the securityin MANETs. In this analysis paper, we tend to have planned completely unique IDS named EAACK protocol specially de- signed for MANETs and compared it against different standard mechanisms in several situations through simulations. The results are positive performances against Watchdog, TWOACK, and AACK within the cases of receiver collision, restricted transmission power, and false wrongful conduct report.

Furthermore, in an endeavor to stop the attackers from initiating solid acknowledgment attacks, we tend to extend our analysis to include digital signature in our planned theme. Although it generates additional ROs in some cases, as incontestible in our experiment, it will immensely improve the network’s PDR once the attacker’sare sensible enough to forge acknowledgment packets. We predict that this exchange is worth once network security is that the prime priority. So as to hunt the best DSAs in MANETs, we tend to enforced each DSA and RSA schemes in our simulation. Eventually, we tend to arrived to the conclusion that the DSA theme is additional appropriate to be enforced in MANETs. So we used ECC to encrypt the message and the encrypted message will be send and this provides a good result. To extend the deserves of our analysis work, we plan to

Page 7: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 430

Investigate the subsequent problems in our future research: 1) Potentialities of adopting hybrid cryptography techniques to additional cut back the network overhead caused by digital signature; 2) Examine the chances of adopting a key exchange mechanism to eliminate the necessity of predistributed keys; 3) Testing the performance of EAACK in real network environment rather than code simulation. REFERENCES [1] K. Al Agha, M.-H.Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The

development of OCARI technol,”IEEE Trans. Ind.Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.

[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” inLecture Notes in ElectricalEngineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.

[3] R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” inProc. 2nd Int.Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.

[4] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” inWireless/MobileSecurity. New York: SpringerVerlag, 2008.

[5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: CambridgeUniv. Press, Aug. 2007.

[6] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energyharvester system for self-powered wireless sensor networks,”IEEE Trans. Ind. Electron., vol. 55, no. 7, pp.2759–2766, Jul. 2008.

[7] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, andtechnical approach,”IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.

[8] Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hocnetworks,” inProc. 4th IEEE Workshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.

[9] Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand routing protocol for ad hoc networks,”

inProc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.

[10] G. Jayakumar and G. Gopinath, “Ad hocmobile wireless networks routing protocol—A review,” J. Comput.Sci., vol. 3, no. 8, pp. 574–582, 2007.

[11] D. Johnson and D. Maltz, “Dynamic Source Routing inadhocwireless networks,” inMobile Computing.Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.

[12] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” in Proc. 12th Int. Conf.iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.

[13] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” inProc. IEEE25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.

[14] K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobilead-hoccommunications in AEC industry,”J. Inf.Technol. Const., vol. 9, pp. 313–323, 2004.

[15] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,”IEEE Trans.Ind. Electron., vol. 55, no. 4, pp. 1835–1841, Apr. 2008.

[16] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detectionof routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

[17] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,”inProc.6th Annu.Int. Conf. Mobile Comput.Netw., Boston, MA, 2000, pp. 255–265.

[18] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC,1996, T-37.

[19] N. Nasser and Y. Chen, “Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,” inProc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.

[20] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hocnetworks,” in Proc. IEEE Int. Conf. Perform., Comput.,Commun., 2004, pp. 747–752.

[21] A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” inProc. Radio Wireless Conf., 2003, pp. 75–78.

[22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, “Secure routing and intrusion detection in ad hoc networks,” inProc.3rd Int. Conf. Pervasive Comput.Commun., 2005, pp. 191–199.

[23] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-keycryptosystems,”Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1983.

[24] J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. LancerosMendez, “Energy harvesting frompiezoelectric materials fully integrated in footwear,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 813–819, Mar. 2010.

[25] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancementin presence of misbehaving nodes in MANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.

Page 8: Reference Paper 1

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected], [email protected]

Volume 2, Issue 4, July – August 2013 ISSN 2278-6856

Volume 2, Issue 4 July – August 2013 Page 431

[26] A. Singh, M. Maheshwari, and N. Kumar, “Security and trust management in MANET,” in Communications inComputer and Information Science, vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387.

[27] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., CollegeStation, TX, 2004.

[28] K. Stanoevska-Slabeva and M. Heitmann, “Impact of mobile ad-hoc networks on the mobile value system,”inProc. 2nd Conf. m-Bus., Vienna, Austria, Jun. 2003.

[29] A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit for harvesting energy from apiezoelectric micropowergenerator,”IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010.

[30] M. Zapata and N. Asokan, “Securingadhocrouting protocols,” inProc. ACM Workshop Wireless Secur., 2002,pp. 1–10

AUTHOR:

Sanjith S was born in Tamilnadu, India, in 1984. He received the M.Sc. degree in Software Engineering from Anna University, India, in 2007, M.Phil. degree in Computer Science from PRIST University, India, in 2011 and now he is pursuing his M.Tech degree in computer and

Information Technology in ManonmaniamSundaranar University, India. Currently he is working as Systems Analyst in Dept. of Nanotechnology, Noorul Islam University. His research interest includes MANETs and Network Security.

Padmadas M is a Sub divisional Engineer in the IT Cell of Bharat Sanchar Nigam Limited (BSNL) which is a public sector unit under Government of India at the Office of Chief General

Manager Telecom. Trivandrum, India. He has been managing the design and development of many software projects for more than ten years, some of which are for national level deployment within the organization. He did his Engineering Masters in Computer and Information Technology with specialization in Digital Image Processing and acquired Masters in Management with specialization in Financial Management. He acquired in-depth knowledge and hands-on experience in Telecommunication Switching, Transmission and Radio Systems External Plant, Internal Plant and Power Plant, Data Communication, GSM, CDMA, Computer Networks, MPLS, Broadband Technologies, Software Engineering and Software Project Management, Data Centers and Database Management, Digital Image Processing using IDL and MATLAB and Expert Systems using CLIPS. He presented his paper on "A Deployable Architecture of Intelligent Transportation Systems - A Developing Country Perspective" in the IEEE international conference-ICCIC-Coimbatore with a publication of the same in the IEEE Explore and made a live demonstration of the project implementation along with Dr.KrishananNallaperumal a renowned Professor-in the ITS conference Pune which is organized by Center for Development of Advanced Computing(CDAC) sponsored by Department of IT, Government of India in coordination with IIT Bombay, IIT

Madras and IIM Calcutta .He is the National Level Topper of the Technical Competitive Examination conducted by BSNL in which he selected Data Communication as a special subject. He was awarded for the outstanding performance in BSNL during the year 2006. Now he is undergoing research in Network Security in which he is concentrating on the area of attacks on Network Nodes.

Dr.(Prof.) Krishnan Nallaperumal is a Passionate Researcher, Academic leader and Research Manager with substantial organizational experience. He completed his Doctorate in

Computer Science and Engineering-Image Processing and did his masters in Computer and Information Sciences. He is a Senior Member of IEEE. In the initial stage of his career, he served in Indian Space Research Organization(ISRO) and IIT,Kharagpur. Currently he is in the chair of IEEE SIPCICOM: IEEE Signal Processing, Computational Intelligence and Computer Joint Societies Chapter of IEEE Madras Section. He is also in the Chair of – IEEE PODHIGAI Subsection of IEEE Madras Section. He was in the General Chair for the IEEE SIPCICOM Technically Co-sponsored International Conference on Advanced Computing and Communication – ICACC2007 held on February 9-10, 2007 at Madurai, INDIA, served as General Chair for the 2010 IEEE International Conference on Computational Intelligence and Computing Research – IEEE 2010ICCIC, December 28-29, 2010 at Coimbatore, INDIA and served as the General Chair for the 2011 IEEE International Conference on Computational Intelligence and Computing Research – IEEE 2011ICCIC, December 16-18, 2011 at Cape, Kanniyakumari, INDIA. He has got extensive experience in handling a wide range of research projects involving Image Processing, image analysis and data mining. He got adequate experience in developing novel algorithms for applications in computer vision and medical imaging. He is an author of about 60 publications. 3 books and 1 book chapters, 3 lab manuals and more than 4 authored software products. He supervised many researches leading to Ph.D. degree: 12 scholars have successfully completed their Ph.D. degree under his supervision and 8 candidates are pursuing Ph.D. He has been leading an Image Processing and Computer Vision laboratory handling three externally funded research projects. He has been offering advising and consultancy in Image Processing, Analysis and Vision related tasks to corporations for many years. Being an academician having excellent track record, he has been offering advice to educational institutions on research, consultancy and curricula design. His area of interests include Image Processing, Computer Vision, Machine Learning, Nonlinear filters for signal and image processing, Wide Dynamic range Imaging, ALPR techniques, Biomedical image analysis, Image Data Mining, biometric and Biometric Security.