EAACK-A Secure Intrusion Detection System Overview
1. EAACK—A Secure Intrusion-
Detection System for MANETs
Under the Guidance of,
Mrs. N. Geetha Priya,
AP/CSE,
V.P.M.M Engineering College for Women.
Presented By,
Ms. N. Sonia(953512104073),
Ms. R. Viji (953512104088),
V.P.M.M Engineering College for Women.
VPMMECW/CSE/24-02-2016
4. WIRELESS ADHOC NETWORK
• A wireless network is a computer network that uses
wireless data connections for connecting network nodes.
• A wireless ad hoc network (WANET) is a decentralized type
of wireless network.
1. Self-configuring,
2. Dynamic networks
3. Nodes are free to move.
VPMMECW/CSE/24-02-2016
5. WIRELESS ADHOC NETWORK
VPMMECW/CSE/24-02-2016
• Wireless ad-hoc networks can be classified by
their application:
Mobile ad hoc networks (MANETs).
Vehicular ad hoc networks (VANETs).
Smartphone ad hoc networks (SPANs).
6. MANETs
• Mobile Adhoc NETworks.
• Mobile Ad hoc NETwork (MANET) is a collection of mobile
nodes equipped with both a wireless transmitter and a
receiver that communicate with each other either directly or
indirectly.
• Because of MANET’s distributed architecture and changing
topology, a traditional centralized monitoring technique is no
longer feasible in MANETs.
• In such case, it is crucial to develop an intrusion-detection
system (IDS)
VPMMECW/CSE/24-02-2016
7. INTRUSION DETECTION SYSTEM
VPMMECW/CSE/24-02-2016
• An Intrusion Detection System (IDS) is a
Software application that
1. Monitors network for malicious activities
2. Produces electronic reports to a
management station.
8. • Network Intrusion Detection Systems
Network Intrusion Detection Systems (NIDS) are
placed within the network to monitor traffic to
and from all devices .
• Host Intrusion Detection Systems
Host Intrusion Detection Systems (HIDS) run on
individual hosts or devices on the network.
VPMMECW/CSE/24-02-2016
INTRUSION DETECTION
SYSTEM(Contd.)
10. EXISTING SYSTEM
VPMMECW/CSE/24-02-2016
• Watchdog detects malicious misbehaviour but
fails at receiver collision.
• The TWOACK scheme successfully solves the
receiver collision but has network overhead.
• AACK fail to detect malicious nodes with the
presence of false misbehavior report
11. PROPOSED SYSTEM-ABSTRACT
VPMMECW/CSE/24-02-2016
• Implemented a new intrusion-detection system named
Enhanced Adaptive Acknowledgement(EAACK)
specially designed for MANETs.
• Our proposed approach EAACK is designed to tackle
false misbehavior, limited transmission power, and
receiver collision.
• EAACK demonstrates higher malicious- behaviour -
detection rate but does not greatly affect the
Network Performances.
12. • EAACK is consisted of three major parts, namely, ACK, Secure ACK
(S-ACK), and misbehavior report authentication(MRA).
• ACK is basically an end-to-end acknowledgment scheme, aiming to
reduce network overhead when no network misbehavior is
detected.
• In S-ACK mode, the three consecutive nodes work in a group to
detect misbehaving nodes in the network.
• The core of MRA scheme is to authenticate whether the destination
node has received the reported missing packet through a different
route.
VPMMECW/CSE/24-02-2016
PROPOSED SYSTEM-ABSTRACT(Contd.)
13. A LITERATURE SURVEY
ON
T. Anantvalee and J. Wu, “A Survey on Intrusion
Detection in Mobile Ad Hoc Networks,” in
Wireless/Mobile Security. New York: Springer-
Verlag, 2008.
VPMMECW/CSE/24-02-2016
14. CONFIDANT
• CONFIDANT (Cooperation Of Nodes, Fairness
In Dynamic Ad-hoc NeTworks).
• When a node experiences a misbehaving
node, it will send a warning message to other
nodes called as friends, based on trusted
relationship.
VPMMECW/CSE/24-02-2016
15. OCEAN
VPMMECW/CSE/24-02-2016
• Bansal and Baker also proposed a DSR protocol called
OCEAN (Observation-based Cooperation Enforcement in
Adhoc Networks).
• OCEAN also uses a monitoring system and a reputation
system.
• OCEAN relies only on its own observation to avoid the new
vulnerability of false accusation from second-hand
reputation exchanges.
• OCEAN can be considered as a stand-alone architecture.
17. REFERENCES
VPMMECW/CSE/24-02-2016
• K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet,
“Which wireless technology for industrial wireless sensor networks? The
development of OCARI technol,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp.
4266–4278, Oct. 2009.
• R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in
Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012
pp. 659–666.
• R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A
survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
• T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc
Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008.
• L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks.
Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
• D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and
optimization of a solar energy harvester system for self-powered wireless sensor
networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.