Using Hybrid Cryptography and Improved EAACK Develop Secure Intrusion Detection System for MANETs

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)


MANET is widely used in different areas, because it supports lots of feature. Day by day importance of wireless network increases. The issue in mantes are security, broadcasting, Packet dropping there for giving security to mantes is important. There are different types of attack such as misbehaving attack, wormhole attack, gray whole attack and flooding attack. In this paper, we study how the attack is detected or prevented. And finally using specific parameter, we measure performance. We study the EAACK algorithm, and it uses hybrid cryptography technique for reducing network overhead.


Digital signature Intrusion detection systems (IDS) Denial of service (DOS) MANET EAACK 



I am mainly thankful to my guide Prof. Pankaj Chandre, who has provided guidance, expertise, and encouragement. Thanks to all those who helped me in completion of this work knowingly or unknowingly.


  1. 1.
    Lakshmi SM, Bhavana S, Sujata T (2014) Enhancement of security levels using intrusion detection system in MANETs. IOSR–JCE. e-ISSN 2278-0661, ISSN 2278-8727Google Scholar
  2. 2.
    Anantvalee T, Wu J (2006) A survey on intrusion detection in mobile ad hoc networks. In: Wireless/mobile security. Springer, New YorkGoogle Scholar
  3. 3.
    Ruchita M, Seema L (2014) Review paper on flooding attack in MANET. Int J Eng Res Appl 4(1, Version 2):39–46. ISSN 2248-9622Google Scholar
  4. 4.
    Hally K, Gupta A, Pal D (2014) Mitigation of HTTP-GET flood attack. Int J Res Appl Sci Eng 2(XI). ISSN 2321-9653Google Scholar
  5. 5.
    Shakshuki LM (Senior Member, IEEE), Kang N, Sheltami TR (Member, IEEE) (2013) EAACK a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3)Google Scholar
  6. 6.
    Jathe SS, Dhamdhere V (2007) Hybrid cryptography for secure superior malicious behavior detection and prevention system for MANET’s. Int J Innov Res Sci Eng Technol (An ISO 3297:2007 Certified Organization) 4(7)Google Scholar
  7. 7.
    Nikam PD, Raut V (2014) Attacks prevention and detection techniques in MANET: a survey. J Eng Res Appl 4(11, Version 2):15–19. ISSN 2248-9622Google Scholar
  8. 8.
    Ramya K, Beaulah David and Shaheen (2014) Hybrid cryptography algorithms for enhanced adaptive acknowledgement secure in MANET. IOSR–JCE 16(1, Ver. VIII). e-ISSN 2278-0661, ISSN 2278-8727Google Scholar
  9. 9.
    Kang N, Shakshuki E, Sheltami T (2011) Detecting forged acknowledgements in MANETs. In: IEEE 25th international conference on AINA, Biopolis, Singapore, 22–25 Mar 2011, pp 488–494Google Scholar
  10. 10.
    Joshi P, Nande P, Pawar A, Shinde P, Umbrae R (2015) EAACK—secure intrusion detection system for MANETs. In: 2015 international conference on pervasive computing (ICPC), Jan 2015Google Scholar
  11. 11.
    Ferdous R, Muthukkumarasamy V (2010) Trust management scheme for mobile ad-hoc networks. In: 2010 10th IEEE international conference on computer and information technology (CIT 2010)Google Scholar
  12. 12.
    Suruthi B, Kumar NVR (2014) An enhanced intrusion detection system for MANETs using hybrid key cryptography. IJCSIT 5Google Scholar
  13. 13.
    Pattnaik O, Pani S (2012) Application of IDS in WSN: a survey. Int J Res Comput Commun Technol IJRCCT 1(7). ISSN 2278-5814Google Scholar
  14. 14.
    Thanikaivel B, Pranisa B (2012) Fast and secure data transmission in MANET. In: 2012 international conference on computer communication and informatics (ICCCI-2012), 10–12 Jan 2012, Coimbatore, IndiaGoogle Scholar
  15. 15.
    Andhiya D, Sangeetha K, Latha RS (2012) Adaptive acknowledgement technique with key exchange mechanism for MANETGoogle Scholar
  16. 16.
    Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mobile Comput 6(5):536–550CrossRefGoogle Scholar
  17. 17.
    Buttyan L, Hubaux JP (2007) Security and cooperation in wireless networks. Cambridge University Press, Cambridge, U.K.CrossRefGoogle Scholar
  18. 18.
    Pahlevanzadeh B, Samsudin A (2007) Distributed hierarchical IDS for MANET over AODV. In: IEEE international conference on telecommunications an communications, May 2007, pp 99–104Google Scholar
  19. 19.
    Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocol—a review. J Comput Sci 3(8):574–582CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringFlora Institute of TechnologyPuneIndia

Personalised recommendations