SlideShare a Scribd company logo
1 of 19
EAACK—A Secure Intrusion-
Detection System for MANETs
Under the Guidance of,
Mrs. N. Geetha Priya,
AP/CSE,
V.P.M.M Engineering College for Women.
Presented By,
Ms. N. Sonia(953512104073),
Ms. R. Viji (953512104088),
V.P.M.M Engineering College for Women.
VPMMECW/CSE/24-02-2016
CONTENT
 WIRELESS ADHOC NETWORK.
 MANET.
 INTRUSION-DETECTION SYSTEM.
 OBJECTIVE.
 EXISTING SYSTEM.
 PROPOSED SYSTEM-ABSTRACT.
 LITERATURE SURVEY.
 CONFIDANT.
 OCEAN.
 PROS & CONS.
 REFERENCES.
VPMMECW/CSE/24-02-2016
VPMMECW/CSE/24-02-2016
WIRELESS ADHOC
NETWORK
WIRELESS ADHOC NETWORK
• A wireless network is a computer network that uses
wireless data connections for connecting network nodes.
• A wireless ad hoc network (WANET) is a decentralized type
of wireless network.
1. Self-configuring,
2. Dynamic networks
3. Nodes are free to move.
VPMMECW/CSE/24-02-2016
WIRELESS ADHOC NETWORK
VPMMECW/CSE/24-02-2016
• Wireless ad-hoc networks can be classified by
their application:
Mobile ad hoc networks (MANETs).
Vehicular ad hoc networks (VANETs).
Smartphone ad hoc networks (SPANs).
MANETs
• Mobile Adhoc NETworks.
• Mobile Ad hoc NETwork (MANET) is a collection of mobile
nodes equipped with both a wireless transmitter and a
receiver that communicate with each other either directly or
indirectly.
• Because of MANET’s distributed architecture and changing
topology, a traditional centralized monitoring technique is no
longer feasible in MANETs.
• In such case, it is crucial to develop an intrusion-detection
system (IDS)
VPMMECW/CSE/24-02-2016
INTRUSION DETECTION SYSTEM
VPMMECW/CSE/24-02-2016
• An Intrusion Detection System (IDS) is a
Software application that
1. Monitors network for malicious activities
2. Produces electronic reports to a
management station.
• Network Intrusion Detection Systems
Network Intrusion Detection Systems (NIDS) are
placed within the network to monitor traffic to
and from all devices .
• Host Intrusion Detection Systems
Host Intrusion Detection Systems (HIDS) run on
individual hosts or devices on the network.
VPMMECW/CSE/24-02-2016
INTRUSION DETECTION
SYSTEM(Contd.)
OBJECTIVE
VPMMECW/CSE/24-02-2016
• Implementation of IDS for MANETs using
EAACK scheme.
• Comparison of EAACK performance analysis
with other contemporary approaches like ACK
and TWOACK.
EXISTING SYSTEM
VPMMECW/CSE/24-02-2016
• Watchdog detects malicious misbehaviour but
fails at receiver collision.
• The TWOACK scheme successfully solves the
receiver collision but has network overhead.
• AACK fail to detect malicious nodes with the
presence of false misbehavior report
PROPOSED SYSTEM-ABSTRACT
VPMMECW/CSE/24-02-2016
• Implemented a new intrusion-detection system named
Enhanced Adaptive Acknowledgement(EAACK)
specially designed for MANETs.
• Our proposed approach EAACK is designed to tackle
false misbehavior, limited transmission power, and
receiver collision.
• EAACK demonstrates higher malicious- behaviour -
detection rate but does not greatly affect the
Network Performances.
• EAACK is consisted of three major parts, namely, ACK, Secure ACK
(S-ACK), and misbehavior report authentication(MRA).
• ACK is basically an end-to-end acknowledgment scheme, aiming to
reduce network overhead when no network misbehavior is
detected.
• In S-ACK mode, the three consecutive nodes work in a group to
detect misbehaving nodes in the network.
• The core of MRA scheme is to authenticate whether the destination
node has received the reported missing packet through a different
route.
VPMMECW/CSE/24-02-2016
PROPOSED SYSTEM-ABSTRACT(Contd.)
A LITERATURE SURVEY
ON
T. Anantvalee and J. Wu, “A Survey on Intrusion
Detection in Mobile Ad Hoc Networks,” in
Wireless/Mobile Security. New York: Springer-
Verlag, 2008.
VPMMECW/CSE/24-02-2016
CONFIDANT
• CONFIDANT (Cooperation Of Nodes, Fairness
In Dynamic Ad-hoc NeTworks).
• When a node experiences a misbehaving
node, it will send a warning message to other
nodes called as friends, based on trusted
relationship.
VPMMECW/CSE/24-02-2016
OCEAN
VPMMECW/CSE/24-02-2016
• Bansal and Baker also proposed a DSR protocol called
OCEAN (Observation-based Cooperation Enforcement in
Adhoc Networks).
• OCEAN also uses a monitoring system and a reputation
system.
• OCEAN relies only on its own observation to avoid the new
vulnerability of false accusation from second-hand
reputation exchanges.
• OCEAN can be considered as a stand-alone architecture.
PROS & CONS
PROS:
 Node Co-operation.
 Effective Data forwarding.
CONS:
 Network Overhead.
 Low Performance.
VPMMECW/CSE/24-02-2016
REFERENCES
VPMMECW/CSE/24-02-2016
• K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet,
“Which wireless technology for industrial wireless sensor networks? The
development of OCARI technol,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp.
4266–4278, Oct. 2009.
• R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in
Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012
pp. 659–666.
• R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A
survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
• T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc
Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008.
• L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks.
Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
• D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and
optimization of a solar energy harvester system for self-powered wireless sensor
networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.
VPMMECW/CSE/24-02-2016
VPMMECW/CSE/24-02-2016

More Related Content

What's hot

Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Kumar Dlk
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSpabitra jena
 
Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Techimec.archive
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 

What's hot (20)

Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Tech
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 

Viewers also liked

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I thinkWim Godden
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Demokrati
DemokratiDemokrati
Demokratiiknoff
 
Art history presentation
Art history presentationArt history presentation
Art history presentationCarolynStocker
 
INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16
 INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16  INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16
INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16 nilve karina bustamante
 
NMunce uCT for CTOs
NMunce uCT for CTOsNMunce uCT for CTOs
NMunce uCT for CTOsNigel Munce
 
Modelos economicos
Modelos economicosModelos economicos
Modelos economicospierinavgm
 

Viewers also liked (19)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I think
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Retention Plan
Retention PlanRetention Plan
Retention Plan
 
Increations Brochure
Increations BrochureIncreations Brochure
Increations Brochure
 
Podcast y su uso en la educación
Podcast y su uso en la educaciónPodcast y su uso en la educación
Podcast y su uso en la educación
 
Demokrati
DemokratiDemokrati
Demokrati
 
Seminar Feb 2016
Seminar Feb 2016Seminar Feb 2016
Seminar Feb 2016
 
Art history presentation
Art history presentationArt history presentation
Art history presentation
 
INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16
 INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16  INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16
INVERSIÓN SEGÚN LAS NIIF PARA PYMES SECCIÓN 16
 
NMunce uCT for CTOs
NMunce uCT for CTOsNMunce uCT for CTOs
NMunce uCT for CTOs
 
Applied_Ethnomusicology_-_Chapter_9
Applied_Ethnomusicology_-_Chapter_9Applied_Ethnomusicology_-_Chapter_9
Applied_Ethnomusicology_-_Chapter_9
 
Modelos economicos
Modelos economicosModelos economicos
Modelos economicos
 
Rodrigo lopez actividad1.2_mapac
Rodrigo lopez actividad1.2_mapacRodrigo lopez actividad1.2_mapac
Rodrigo lopez actividad1.2_mapac
 

Similar to EAACK-A Secure Intrusion Detection System Overview

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksSRAVANIP22
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET Journal
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...IEEEGLOBALSOFTTECHNOLOGIES
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptxsundar602496
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANIRJET Journal
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcway Technologies
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsEcway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane tsecwayerode
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsecway
 

Similar to EAACK-A Secure Intrusion Detection System Overview (20)

ppt-HUNGARY
ppt-HUNGARYppt-HUNGARY
ppt-HUNGARY
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security System
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBAN
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

EAACK-A Secure Intrusion Detection System Overview

  • 1. EAACK—A Secure Intrusion- Detection System for MANETs Under the Guidance of, Mrs. N. Geetha Priya, AP/CSE, V.P.M.M Engineering College for Women. Presented By, Ms. N. Sonia(953512104073), Ms. R. Viji (953512104088), V.P.M.M Engineering College for Women. VPMMECW/CSE/24-02-2016
  • 2. CONTENT  WIRELESS ADHOC NETWORK.  MANET.  INTRUSION-DETECTION SYSTEM.  OBJECTIVE.  EXISTING SYSTEM.  PROPOSED SYSTEM-ABSTRACT.  LITERATURE SURVEY.  CONFIDANT.  OCEAN.  PROS & CONS.  REFERENCES. VPMMECW/CSE/24-02-2016
  • 4. WIRELESS ADHOC NETWORK • A wireless network is a computer network that uses wireless data connections for connecting network nodes. • A wireless ad hoc network (WANET) is a decentralized type of wireless network. 1. Self-configuring, 2. Dynamic networks 3. Nodes are free to move. VPMMECW/CSE/24-02-2016
  • 5. WIRELESS ADHOC NETWORK VPMMECW/CSE/24-02-2016 • Wireless ad-hoc networks can be classified by their application: Mobile ad hoc networks (MANETs). Vehicular ad hoc networks (VANETs). Smartphone ad hoc networks (SPANs).
  • 6. MANETs • Mobile Adhoc NETworks. • Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other either directly or indirectly. • Because of MANET’s distributed architecture and changing topology, a traditional centralized monitoring technique is no longer feasible in MANETs. • In such case, it is crucial to develop an intrusion-detection system (IDS) VPMMECW/CSE/24-02-2016
  • 7. INTRUSION DETECTION SYSTEM VPMMECW/CSE/24-02-2016 • An Intrusion Detection System (IDS) is a Software application that 1. Monitors network for malicious activities 2. Produces electronic reports to a management station.
  • 8. • Network Intrusion Detection Systems Network Intrusion Detection Systems (NIDS) are placed within the network to monitor traffic to and from all devices . • Host Intrusion Detection Systems Host Intrusion Detection Systems (HIDS) run on individual hosts or devices on the network. VPMMECW/CSE/24-02-2016 INTRUSION DETECTION SYSTEM(Contd.)
  • 9. OBJECTIVE VPMMECW/CSE/24-02-2016 • Implementation of IDS for MANETs using EAACK scheme. • Comparison of EAACK performance analysis with other contemporary approaches like ACK and TWOACK.
  • 10. EXISTING SYSTEM VPMMECW/CSE/24-02-2016 • Watchdog detects malicious misbehaviour but fails at receiver collision. • The TWOACK scheme successfully solves the receiver collision but has network overhead. • AACK fail to detect malicious nodes with the presence of false misbehavior report
  • 11. PROPOSED SYSTEM-ABSTRACT VPMMECW/CSE/24-02-2016 • Implemented a new intrusion-detection system named Enhanced Adaptive Acknowledgement(EAACK) specially designed for MANETs. • Our proposed approach EAACK is designed to tackle false misbehavior, limited transmission power, and receiver collision. • EAACK demonstrates higher malicious- behaviour - detection rate but does not greatly affect the Network Performances.
  • 12. • EAACK is consisted of three major parts, namely, ACK, Secure ACK (S-ACK), and misbehavior report authentication(MRA). • ACK is basically an end-to-end acknowledgment scheme, aiming to reduce network overhead when no network misbehavior is detected. • In S-ACK mode, the three consecutive nodes work in a group to detect misbehaving nodes in the network. • The core of MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route. VPMMECW/CSE/24-02-2016 PROPOSED SYSTEM-ABSTRACT(Contd.)
  • 13. A LITERATURE SURVEY ON T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. VPMMECW/CSE/24-02-2016
  • 14. CONFIDANT • CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks). • When a node experiences a misbehaving node, it will send a warning message to other nodes called as friends, based on trusted relationship. VPMMECW/CSE/24-02-2016
  • 15. OCEAN VPMMECW/CSE/24-02-2016 • Bansal and Baker also proposed a DSR protocol called OCEAN (Observation-based Cooperation Enforcement in Adhoc Networks). • OCEAN also uses a monitoring system and a reputation system. • OCEAN relies only on its own observation to avoid the new vulnerability of false accusation from second-hand reputation exchanges. • OCEAN can be considered as a stand-alone architecture.
  • 16. PROS & CONS PROS:  Node Co-operation.  Effective Data forwarding. CONS:  Network Overhead.  Low Performance. VPMMECW/CSE/24-02-2016
  • 17. REFERENCES VPMMECW/CSE/24-02-2016 • K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. • R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012 pp. 659–666. • R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. • T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. • L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007. • D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.