An enhancement of EAACK using P2P ACK and RSA public key cryptography

被引:7
|
作者
Thiyagarajan, R. [1 ]
Priya, B. Meenakshi [2 ]
机构
[1] Shreenivasa Engn Coll, Elect & Commun Engn, Dharmapuri 635301, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Mechatron Engn, Perundurai, Erode, India
关键词
MANET; EAACK; Routing overhead; Security level; RSA; P2P ACK; Intrusion detection systems; Misbehaving nodes detection; INTRUSION-DETECTION SYSTEM;
D O I
10.1016/j.measurement.2018.12.031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
MANET - Mobile Adhoc Network is a self-configuring network that connected by the number of mobile nodes with wireless links and it has no fixed infrastructure. In this, each single node can operates as both a transmitter and receiver. It has been exploited in various applications such as disaster stuck areas, military, emergency revival etc. Nevertheless, the open intermediate and broad distribution of nodes in MANET can cause a vulnerable to different malicious attacks and MANET that can operate consistently even in the being there of inside packet drop attackers can be really challenging. Therefore, we need to develop Intrusion Detection System to detect the misbehavior nodes during the packet delivery with acknowledgement for the protection of MANET. In this paper, EAACK (Enhanced Adaptive Acknowledgment) is developed with Enhanced Interior Gateway Routing Protocol (EIGRP) hybrid protocol which consists of P2P ACK and RSA algorithm. At present, the network overhead is caused by the digital signature algorithm if more misbehavior nodes are presented on network. Hence, this proposed system is applied with EIGRP to reduce the network overhead caused by digital signatures in EAACK, and P2P (peer-peer) ACK and RSA (named after Ron Rivest, Adi Shamir and Len Adleman) provides more security to the network. S-ACK (Selective Acknowledgements) cannot differentiate the particular node is malicious node. Therefore, this proposed system introduces the P2P ACK to detect the misbehavior node efficiently. Here, RSA can encrypt the session key that creates the key more secure to improve the security level and P2P ACK use this encrypted key for the acknowledgement. In the P2P ACK, keys are generated by the RSA and distributed for signing and verifying the acknowledgement packets in advance. This proposed P2P ACK is used to enhance the detection of misbehavior nodes. The performance of this proposed method can improve the security level and reduce the routing overhead through the secured acknowledgement. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [1] On the Fog of RSA Key Lengths Verifying Public Key Cryptography Strength Recommendations
    Kiviharju, Mikko
    2017 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2017,
  • [2] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography
    Thomas, Aswathi
    Manuel, Ebin M.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917
  • [3] Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol
    Jeon, Seok Hee
    Gil, Sang Keun
    CURRENT OPTICS AND PHOTONICS, 2020, 4 (02) : 103 - 114
  • [4] An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method
    Saxena, Sapna
    Kapoor, Bhanu
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 850 - 854
  • [5] Montgomery implantation of ECC over RSA on FPGA for Public Key Cryptography application
    Bhadada, Rajesh
    Sharma, Aditi
    PROCEEDINGS ON 2014 2ND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGY TRENDS IN ELECTRONICS, COMMUNICATION AND NETWORKING (ET2ECN), 2014,
  • [6] Designing Acknowledgement based MANET using Public Key Cryptography
    Kashikar, Moresh
    Nimbhorkar, Sonali
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 228 - 233
  • [7] P2P multimedia sharing over MANET
    Wu Huafeng
    Han Peng
    Zhou Qiang
    Yang Min
    Sun Bing
    Yu Bo
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 635 - +
  • [8] MANET adaptive structured P2P overlay
    Nadir Shah
    Depei Qian
    Rui Wang
    Peer-to-Peer Networking and Applications, 2012, 5 : 143 - 160
  • [9] MANET adaptive structured P2P overlay
    Shah, Nadir
    Qian, Depei
    Wang, Rui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 143 - 160
  • [10] A survey of P2P content sharing in MANETs
    Shah, Nadir
    Abid, S. A.
    Qian, Depei
    Mehmood, Wagar
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 57 : 55 - 68