• DocumentCode
    147122
  • Title

    A node authentication clustering based security for ADHOC network

  • Author

    Murugesan, Rajamanickam ; Saravanan, M. ; Vijyaraj, Mariappan

  • Author_Institution
    Dept. of ECE, Bharath Niketan Eng. Coll., Aundipatty, India
  • fYear
    2014
  • fDate
    3-5 April 2014
  • Firstpage
    1168
  • Lastpage
    1172
  • Abstract
    The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
  • Keywords
    message authentication; mobile ad hoc networks; pattern clustering; telecommunication security; E2AACK mechanism; EAACK; IDS mechanism; IP-trace back; critical mission based application; end-to-end adaptive acknowledgment mechanism; enhanced adaptive acknowledgement; intrusion detection system; malicious attack prevention; malicious nodes detection; mobile ad hoc network protection; mobility based node; node authentication clustering based security; relay message; relay node; scalability based node; self-configuration ability; wired network; wireless network delay; wireless network throughput; Ad hoc networks; Communication system security; Mobile computing; Receivers; Relays; Wireless networks; ADHOC Networks; Delay; E2AACK; Intrusion Detection System; Malicious Nodes; Throughput;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Signal Processing (ICCSP), 2014 International Conference on
  • Conference_Location
    Melmaruvathur
  • Print_ISBN
    978-1-4799-3357-0
  • Type

    conf

  • DOI
    10.1109/ICCSP.2014.6950038
  • Filename
    6950038