Title :
A node authentication clustering based security for ADHOC network
Author :
Murugesan, Rajamanickam ; Saravanan, M. ; Vijyaraj, Mariappan
Author_Institution :
Dept. of ECE, Bharath Niketan Eng. Coll., Aundipatty, India
Abstract :
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
Keywords :
message authentication; mobile ad hoc networks; pattern clustering; telecommunication security; E2AACK mechanism; EAACK; IDS mechanism; IP-trace back; critical mission based application; end-to-end adaptive acknowledgment mechanism; enhanced adaptive acknowledgement; intrusion detection system; malicious attack prevention; malicious nodes detection; mobile ad hoc network protection; mobility based node; node authentication clustering based security; relay message; relay node; scalability based node; self-configuration ability; wired network; wireless network delay; wireless network throughput; Ad hoc networks; Communication system security; Mobile computing; Receivers; Relays; Wireless networks; ADHOC Networks; Delay; E2AACK; Intrusion Detection System; Malicious Nodes; Throughput;
Conference_Titel :
Communications and Signal Processing (ICCSP), 2014 International Conference on
Conference_Location :
Melmaruvathur
Print_ISBN :
978-1-4799-3357-0
DOI :
10.1109/ICCSP.2014.6950038