SlideShare a Scribd company logo
1 of 42
11/06/13

Dept. of ECE

1
EAACK—A Secure IntrusionDetection
System for MANETs

11/06/13

Dept. of ECE

2
Contents





Introduction
What is MANET????
Need For IDS????
IDS
1.
2.
3.

Watch dog
TWOACK
AACK

 EAACK
 Performance

Evaluation
 Simulation configuration
 Advantages
 Future enhancement
 Conclusion
 Reference
11/06/13

Dept. of ECE

3
Introduction
MANET -Mobile Ad hoc NETworks
IDS

-Intrusion Detection Systems

EAACK-Enhanced Adaptive ACKnowledgement

11/06/13

Dept. of ECE

4
Mobile Ad hoc NETworks
Wireless network
Ad hoc = “for this PURPOSE”
Used to exchange information
NODES = transmitter + receiver


Nodes may be mobile
Each node is willing to forward data to other nodes
Communcation can be direct or indirect
Nodes communicates directly within their ranges
Otherwise rely on neighbours (indirectly)

11/06/13

Dept. of ECE

5
Continuation.....

 Properties

of MANETs

No fixed infrastructure
Self configuring ability
Dynamic topology
Decentralized network

11/06/13

Dept. of ECE

6
Continuation….
 Routes

between nodes may contain multiple hops

Nodes act as routers to forward packets for each other
Node mobility may cause the routes change

B

A

A

B
C

C
D

D

11/06/13

Dept. of ECE

7
Continuation….
Application

of MANETS

Military application
◦ Combat regiment in the field
◦ Perhaps 4000-8000 objects
in constant unpredictable
motion.
◦ Intercommunication of forces
◦ Proximity, plan of battle

Sensor networks
Automotive networks
Industrial application
11/06/13

Dept. of ECE

8
MANET

vulnerable to malicious attackers

o Open medium
o Wide distribution of nodes
Routing

protocols assumes nodes are
always cooperative
Nodes are not physically protected

11/06/13

Dept. of ECE

9
IDS
 Intrusion

Detection System
 Detect and report the malicious activity in ad hoc
networks
 Researchers have proposed a number of
collaborative IDS system
1. Watch dog
2. TWOACK
3. AACK

11/06/13

Dept. of ECE

10
Watch dog

11/06/13

Dept. of ECE

11
Ambiguous collision

11/06/13

Dept. of ECE

12
Receiver collision

11/06/13

Dept. of ECE

13
Limited transmission power

11/06/13

Dept. of ECE

14
False misbehaviour report

11/06/13

Dept. of ECE

15
TWOACK

11/06/13

Dept. of ECE

16
Continuation....
 Acknowledgment-based
 Neither

network layer scheme

an enhancement or watch dog based scheme

 Acknowledge

every data packet transmitted over every

three consecutive nodes
 On

receiving a packet , each node is required to send

back an acknowledgment packet to the node that is two
hops away from it.
 Solves

receiver collision and limited transmission power

problem
 Network

11/06/13

overhead is present
Dept. of ECE

17
AACK
Adaptive ACKnowledgement
Acknowledgment-based

network layer

scheme
Reduce network overhead
Combination of TACK (similar to
TWOACK) and ACK
ACK-End
to end acknowledgment
scheme
11/06/13

Dept. of ECE

18
•ACK

•S will switch to TACK scheme if it doesn’t
get any ACK packet within predefined time
11/06/13

Dept. of ECE

19
The need of new IDS???
Both TWOACK

and AACK fails in

1. False misbehaviour report
2. Forged acknowledgement packet

11/06/13

Dept. of ECE

20
EAACK
Enhanced Adaptive ACKnowledgement
Efficient

and secure intrusion detection
system for MANETs
Higher malicious behaviour detection rates
with minimal effect on network performance
EAACK mechanism can be divided to three
schemes
1. ACK(end to end acknowledgement scheme)
2. S-ACK(Secure ACK)
3. MRA(Misbehaviour Report Authentication)
11/06/13

Dept. of ECE

21
1. ACK
End-to-end

acknowledgment scheme
Brings extremely low network overhead
To preserve the life cycle of battery
 Low network overhead
 Lom memory consumption

11/06/13

Dept. of ECE

22
ACK scheme

11/06/13

Dept. of ECE

23
2.S-ACK
Secure ACK
Extension

of TWOACK with digital

signature
Switch from ACK if S does not receive
any acknowledgement packet
Detect misbehaving nodes by sending SACK packet
Every three consecutive nodes work in a
group to detect misbehaving nodes
11/06/13

Dept. of ECE

24
S-ACK scheme

Who is malicious?? F1,F2 OR F3???
11/06/13

Dept. of ECE

25
NONE IS
MALICIOUS ..............
Route

is F1 F2 F3
F1 sends S-ACK data packet to F3 via the
route F2 F3
Before sending F1 store # value of data
packet and sending time
F2 receives packet from F1 and forward to
F3
F3 receives the data packet and send S-ACK
acknowledgement
◦ Contain # value and digital signature of F3

11/06/13

Dept. of ECE

26
This

S-ACKnowledgement is send back
to the reverse route
F1 receives it and verify digital signature
by computing with F3 public key.
If there is no malicious nodes ,then the
received hash value ==original hash value

11/06/13

Dept. of ECE

27
F1 IS MALICIOUS

•False misbehaviour attack
•In EAACK,it initiates MRA scheme.
11/06/13

Dept. of ECE

28
F2 IS MALICIOUS

•Digital signature of F3 is needed
•Prevent forged acknowledgement
11/06/13

Dept. of ECE

29
F3 IS MALICIOUS

•If F3 refuses to send back acknowledgement
packets, it will be marked as malicious
11/06/13

Dept. of ECE

30
3.MRA
 Misbehaviour

Report Authentication
 Designed to resolve the false misbehaviour report
attack
 Such attack can break the entire network
 Basic idea - Authenticate whether the destination node
has received the reported missing packet
 Alternate route is needed
 MRA packet is send via this alternate route
 MRA packet contains the ID of the packet that has been
reported dropped
 Destination node search if there is a match
11/06/13

Dept. of ECE

31
Continuation...
If

there is match,the report is fake and
node ,whoever sends it, is marked as
malicious
If there is no match,the report is trusted.

11/06/13

Dept. of ECE

32
EAACK SCHEME

11/06/13

Dept. of ECE

33
Performance Evaluation
Packet

delivery ratio (PDR): Ratio of
the number of packets received by the
destination node to the number of
packets sent by the source node.
Routing overhead (RO): RO defines
the ratio of the amount of routingrelated transmissions.

11/06/13

Dept. of ECE

34
Simulation configuration
Scenario

1: Malicious nodes drop all the

packets that pass through it.
Scenario

2: Set all malicious nodes to

send out false misbehavior report to the
source node whenever it is possible
Scenario

3: Provide the malicious nodes

the ability to forge acknowledgment
packets.

11/06/13

Dept. of ECE

35
11/06/13

Dept. of ECE

36
ADVANTAGES
Solves

limited transmission power and
receiver collision problem.
Capable of detecting misbehaviour attack
Ensure authentication and packet integrity
Digital signatures prevents the attack of
forge acknowledgement packets

11/06/13

Dept. of ECE

37
FUTURE ENHANCEMENT
Possibilities of adopting hybrid
cryptography techniques to further
reduce the network overhead caused by
digital signature.
Examine the possibilities of adopting a
key exchange mechanism to eliminate
the requirement of predistributed keys.
Testing the performance of EAACK in
real network environment.


11/06/13

Dept. of ECE

38
Conclusion
EAACK

makes MANETs more secure
The major threats like false mis
behaviour report and forge
acknowledgement can be detected by
using this scheme.

11/06/13

Dept. of ECE

39
REFERENCE
 EAACK—A Secure

Intrusion-Detection System for
MANETs by Elhadi M. Shakshuki, Senior Member,
IEEE, Nan Kang, and Tarek R. Sheltami, Member,
IEEE
 Detecting Misbehaving Nodes in Mobile Ad hoc
Networks by Nan Kang

11/06/13

Dept. of ECE

40
11/06/13

Dept. of ECE

41
11/06/13

Dept. of ECE

42

More Related Content

What's hot

Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWSAccelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWSAmazon Web Services
 
Loops in C# for loops while and do while loop.
Loops in C# for loops while and do while loop.Loops in C# for loops while and do while loop.
Loops in C# for loops while and do while loop.Abid Kohistani
 
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech TalksHow to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech TalksAmazon Web Services
 
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...Amazon Web Services
 
Exothermic and Endothermic Reactions
Exothermic and Endothermic ReactionsExothermic and Endothermic Reactions
Exothermic and Endothermic ReactionsJamie Ayers
 
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...Amazon Web Services
 

What's hot (8)

Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWSAccelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS
 
Loops in C# for loops while and do while loop.
Loops in C# for loops while and do while loop.Loops in C# for loops while and do while loop.
Loops in C# for loops while and do while loop.
 
Selenium Locators
Selenium LocatorsSelenium Locators
Selenium Locators
 
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech TalksHow to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
 
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...
AWS Secrets Manager: Best Practices for Managing, Retrieving, and Rotating Se...
 
Exothermic and Endothermic Reactions
Exothermic and Endothermic ReactionsExothermic and Endothermic Reactions
Exothermic and Endothermic Reactions
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
 

Viewers also liked

Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptslksagar
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overviewvpmmguys
 
Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)AAKASH S
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationSyed Absar
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfBhavani Testone
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetijctet
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...IAEME Publication
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2AAKASH S
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...ijsrd.com
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)smjagadish
 

Viewers also liked (20)

Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.pptEaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
EAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System OverviewEAACK-A Secure Intrusion Detection System Overview
EAACK-A Secure Intrusion Detection System Overview
 
Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
 
Bat Algorithm
Bat AlgorithmBat Algorithm
Bat Algorithm
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Manet
ManetManet
Manet
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 

Similar to eaack-a secure ids for manet

Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKFransiskeran
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarAshok Panwar
 
Computernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptxComputernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptxTejashreeSathya
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Kumar Dlk
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...📡 Sebastien Dudek
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
 
Call processing and handover.eng
Call processing and handover.engCall processing and handover.eng
Call processing and handover.engNeelabh Krishna
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.engsivakumar D
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and HandoverSitha Sok
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsPriyanka Jacob
 
Link layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptxLink layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptxMeenalochini M
 
Danger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentDanger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentMaksym Tulyuk
 

Similar to eaack-a secure ids for manet (20)

Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
 
Computernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptxComputernetworking21CS52vtunotesseminar.pptx
Computernetworking21CS52vtunotesseminar.pptx
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
SSTIC 2019 - V2G injector: Whispering to cars and charging units through the ...
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
50120140507006
5012014050700650120140507006
50120140507006
 
50120140507006
5012014050700650120140507006
50120140507006
 
Call processing and handover.eng
Call processing and handover.engCall processing and handover.eng
Call processing and handover.eng
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and Handover
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Link layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptxLink layer, checksum, ethenet.pptx
Link layer, checksum, ethenet.pptx
 
E017422935
E017422935E017422935
E017422935
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Danger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentDanger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environment
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

eaack-a secure ids for manet