Secure Intrusion Detection System for MANETs Using Triple-DES Algorithm
Abstract
Networking is the process of accessing, exchanging or sharing the information. Packet switching plays a vital role in data transfer. Compared to wired network, wireless network has more data transferring. MANETs and WSN are the most common forms of Wireless media; in MANETs nodes are deployed or distributed in Ad-hoc way and they are communicating or exchange message using wireless Transmission. Security is a measure concern in Mobile Ad-hoc Network because MANETs have wide distribution of node and open medium; therefore, it becomes vulnerable and is easy for malicious hackers to attack.
References
P. Joshi, P. Nande, A. Pawar, P. Shinde, and R. Umbrae, “Eaack- secure intrusion detection and prevention system for mantes,” in Pervasive Computing (ICPC), International Conference on, January 2015.
S S. Jathe, V. Dhamdhere “Hybrid cryptography for secure superior malicious behavior detection and prevention system for MANET’s,” International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297:2007 Certified Organization) vol. 4, July 2015.
R. Meher, S. Ladhe “Review paper on flooding attack in MANET,” Ruchita Meher et al Int. Journal of Engineering Research and Applications, vol. 4, pp. 39-46, January 2014.
P. D. Nikam, V. Raut “Attacks prevention and detection techniques in MANET: a survey,” Pranjali D. Nikam Int. Journal of Engineering Research and Applications, vol. 4, pp. 15-19, November 2014.
B. Suruthi, N. V. R. Kumar, and M. Tech. “An enhanced intrusion detection system for MANETs using hybrid key cryptography,” vol. 5, 2014.
A. P. Tapaswi, P. P. Nashikkar, R. S. Barge, A. M. Shinde, and P. P. Patil “Extended EAACK an secure intrusion detection system with detection and localization of multiple spoofing attackers in MANET,” vol. 4, pp. 39-46, January 2014.
H. Khatri, A. Gupta, and D. Pal “Mitigation of HTTP-GET flood Attack” International Journal for Research in Applied Science & Engineering,” vol. 2 November 2014.
Ramya K, Beaulah David and Shaheen H, “Hybrid cryptography algorithms for enhanced adaptive acknowledgement secure in MANET,” vol. 16, February 2014.
E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK a secure intrusion-detection system for MANETs,” IEEE Transactions On Industrial Electronics, vol. 60, March 2013.
S. M. Lakshmi, S. Bhavana, T. Sujata, “Enhancement of security levels using a secure intrusion detection system in manets,” K. Anusha, and G.V. Rajyalakshmi,” Secure Adaptive Acknowledgement Algorithm for Intrusion Detection System” Int, vol. 16, May 2014.
B. Thanikaivel, B. Pranisa, Department of Computer Science and Engineering, Sona College of Technology Salem, Tamil Nadu, India, “Fast and secure data transmission in MANET,” 2012 International Conference on Computer Communication and Informatics (ICCCI - 2012), Coimbatore, India, January 2012.
D. Sandhiya, K. Sangeetha, R. S. Latha, “Adaptive acknowledgement technique with key exchange mechanism for MANET,” 2012.
N. Kang, E. Shakshuki, and T. R. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf.AINA, Biopolis, Singapore, pp. 488-494, March 2011.
R. Ferdous, V. Muthukkumarasamy, and A. Sattar, Institute for Integrated and Intelligent Systems Griffith University, Australia, “Trust management scheme for mobile Ad-Hoc Networks” 10th IEEE International Conference on Computer and Information Technology, 2010.
B. Pahlevanzadeh, S. A. Hosseini Seno, T. C. Wan, R. Buldiarto, and M. M. Kadhum, “A cluster based distributed hierarchical IDS for MANETs,” International Conference on Network Applications, Protocols and Services, pp. 1-7, November 2008.
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Computer, vol. 6, pp. 536-550, May 2007.
B. Pahlevanzadeh, and A. Samsudin, “Distributed hierarchical IDS for MANET over AODV” IEEE International Conference on Telecommunications and Communications, pp. 99-104, May 2007.
G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol-a review,” J. Comput. Sci., vol. 3, no. 8, pp. 574-582, 2007.
S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating routing misbehavior in Ad-hoc Networks,” pp. 255-265, 2000.
T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile Ad Hoc Networks,” in Wireless/Mobile Security, New York, 2006.

Submission of a manuscript implies: that the work described has not been published before that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication. Authors can retain copyright of their article with no restrictions. Also, author can post the final, peer-reviewed manuscript version (postprint) to any repository or website.
Since Oct. 01, 2015, PETI will publish new articles with Creative Commons Attribution Non-Commercial License, under The Creative Commons Attribution Non-Commercial 4.0 International (CC BY-NC 4.0) License.
The Creative Commons Attribution Non-Commercial (CC-BY-NC) License permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes