Secure Intrusion Detection System for MANETs Using Triple-DES Algorithm

  • Abhiram Shashank N Department of Computer science and engineering
  • Bharathi C Saveetha School of Engineering, Saveetha University, Thandalam, India
Keywords: Mobile Adhoc Network (MANET), Intrusion Detection System (IDS)

Abstract

Networking is the process of accessing, exchanging or sharing the information. Packet switching plays a vital role in data transfer. Compared to wired network, wireless network has more data transferring. MANETs and WSN are the most common forms of Wireless media; in MANETs nodes are deployed or distributed in Ad-hoc way and they are communicating or exchange message using wireless Transmission. Security is a measure concern in Mobile Ad-hoc Network because MANETs have wide distribution of node and open medium; therefore, it becomes vulnerable and is easy for malicious hackers to attack.

References

P. Joshi, P. Nande, A. Pawar, P. Shinde, and R. Umbrae, “Eaack- secure intrusion detection and prevention system for mantes,” in Pervasive Computing (ICPC), International Conference on, January 2015.

S S. Jathe, V. Dhamdhere “Hybrid cryptography for secure superior malicious behavior detection and prevention system for MANET’s,” International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297:2007 Certified Organization) vol. 4, July 2015.

R. Meher, S. Ladhe “Review paper on flooding attack in MANET,” Ruchita Meher et al Int. Journal of Engineering Research and Applications, vol. 4, pp. 39-46, January 2014.

P. D. Nikam, V. Raut “Attacks prevention and detection techniques in MANET: a survey,” Pranjali D. Nikam Int. Journal of Engineering Research and Applications, vol. 4, pp. 15-19, November 2014.

B. Suruthi, N. V. R. Kumar, and M. Tech. “An enhanced intrusion detection system for MANETs using hybrid key cryptography,” vol. 5, 2014.

A. P. Tapaswi, P. P. Nashikkar, R. S. Barge, A. M. Shinde, and P. P. Patil “Extended EAACK an secure intrusion detection system with detection and localization of multiple spoofing attackers in MANET,” vol. 4, pp. 39-46, January 2014.

H. Khatri, A. Gupta, and D. Pal “Mitigation of HTTP-GET flood Attack” International Journal for Research in Applied Science & Engineering,” vol. 2 November 2014.

Ramya K, Beaulah David and Shaheen H, “Hybrid cryptography algorithms for enhanced adaptive acknowledgement secure in MANET,” vol. 16, February 2014.

E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK a secure intrusion-detection system for MANETs,” IEEE Transactions On Industrial Electronics, vol. 60, March 2013.

S. M. Lakshmi, S. Bhavana, T. Sujata, “Enhancement of security levels using a secure intrusion detection system in manets,” K. Anusha, and G.V. Rajyalakshmi,” Secure Adaptive Acknowledgement Algorithm for Intrusion Detection System” Int, vol. 16, May 2014.

B. Thanikaivel, B. Pranisa, Department of Computer Science and Engineering, Sona College of Technology Salem, Tamil Nadu, India, “Fast and secure data transmission in MANET,” 2012 International Conference on Computer Communication and Informatics (ICCCI - 2012), Coimbatore, India, January 2012.

D. Sandhiya, K. Sangeetha, R. S. Latha, “Adaptive acknowledgement technique with key exchange mechanism for MANET,” 2012.

N. Kang, E. Shakshuki, and T. R. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf.AINA, Biopolis, Singapore, pp. 488-494, March 2011.

R. Ferdous, V. Muthukkumarasamy, and A. Sattar, Institute for Integrated and Intelligent Systems Griffith University, Australia, “Trust management scheme for mobile Ad-Hoc Networks” 10th IEEE International Conference on Computer and Information Technology, 2010.

B. Pahlevanzadeh, S. A. Hosseini Seno, T. C. Wan, R. Buldiarto, and M. M. Kadhum, “A cluster based distributed hierarchical IDS for MANETs,” International Conference on Network Applications, Protocols and Services, pp. 1-7, November 2008.

K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Computer, vol. 6, pp. 536-550, May 2007.

B. Pahlevanzadeh, and A. Samsudin, “Distributed hierarchical IDS for MANET over AODV” IEEE International Conference on Telecommunications and Communications, pp. 99-104, May 2007.

G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol-a review,” J. Comput. Sci., vol. 3, no. 8, pp. 574-582, 2007.

S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating routing misbehavior in Ad-hoc Networks,” pp. 255-265, 2000.

T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile Ad Hoc Networks,” in Wireless/Mobile Security, New York, 2006.

Published
2019-04-01
How to Cite
N, A., & C, B. (2019). Secure Intrusion Detection System for MANETs Using Triple-DES Algorithm. Proceedings of Engineering and Technology Innovation, 12, 39-46. Retrieved from http://ojs.imeti.org/index.php/PETI/article/view/2770
Section
Articles