EAACK: Secure IDS for Wireless Sensor Networks

Main Article Content

JALAGAM NAGAMANI
K.SUMALATHA

Abstract

The migration to wireless network from wired network has been a global trend in the past few decades.The open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. A new technique EAACK (Enhanced Adaptive Acknowledgement) method designed for MANET was proposed for intrusion detection.EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.

Article Details

How to Cite
[1]
JALAGAM NAGAMANI and K.SUMALATHA, “EAACK: Secure IDS for Wireless Sensor Networks”, Int. J. Comput. Eng. Res. Trends, vol. 1, no. 6, pp. 461–469, Dec. 2014.
Section
Research Articles

References

K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B.Viollet,“Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,” IEEE Trans. Ind. Elec- tron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.

R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Net- work Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.

R. H. Akbani, S. Patel, and D. C. Jinwala,“DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.

T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: SpringerVerlag, 2008.

L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.

D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Model- ing and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.

V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approach,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.

Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in Proc. 4th IEEE Workshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.

Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand rout- ing protocol for ad hoc networks,”- in Proc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.

G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks rout- ing protocol—A review,” J. Comput. Sci., vol. 3, no. 8, pp. 574–582, 2007.

D. Johnson and D. Maltz, “Dynamic Source Routing in ad hoc wireless networks,” in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8– 10, 2010, pp. 216–222.

N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowl- edgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.

K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc commu- nications in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313– 323, 2004.

J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835–1841, Apr. 2008.

K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbe- haviour in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255– 265.

A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37.

N. Nasser and Y. Chen, “Enhanced intrusion detection systems for dis- covering malicious nodes in mobile ad hoc network,” in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.

J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752.

A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wire- less Conf., 2003, pp. 75–78.

A. Patwardhan, J. Parker, A. Joshi, M. Iorga, andT.Karygiannis,“Secureroutingandintrusion detection in ad hoc networks,” in Proc. 3rd Int. Conf. Pervasive Comput. Commun., 2005, pp. 191– 199.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and publickeycryptosystems,”Commun.ACM,vol.21,no.2, pp. 120–126, Feb. 1983.

J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. Lanceros- Mendez, “Energy harvesting from piezoelectric materials fully integratedinfootwear,”IEEETrans. Ind. Electron., vol. 57, no. 3, pp. 813–819, Mar. 2010.

T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Videotransmissionenhancementinpresenceofmisbehavin gnodesinMANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.

A. Singh, M. Maheshwari, and N. Kumar, “Security and trust management in MANET,” in Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387.

B. Sun, “Intrusion detectioninmobile ad hoc networks,”Ph.D.disserta- tion, Texas A&M Univ., College Station, TX, 2004.

K. Stanoevska-Slabeva and M. Heitmann, “Impactofmobilead-hoc net- works on the mobile value system,” in Proc. 2nd Conf. m-Bus., Vienna, Austria, Jun. 2003.

A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010.

M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” in Proc. ACM Workshop Wireless Secur., 2002, pp. 1–10.

L. Zhou and Z. Haas, “Securing ad-hoc networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, Nov./Dec. 1999.

Botan, A Friendly C ++ Crypto Library. [Online]. Available: http:// botan.randombit.net/1098 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013