An enhancement of EAACK using P2P ACK and RSA public key cryptography

被引:7
|
作者
Thiyagarajan, R. [1 ]
Priya, B. Meenakshi [2 ]
机构
[1] Shreenivasa Engn Coll, Elect & Commun Engn, Dharmapuri 635301, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Mechatron Engn, Perundurai, Erode, India
关键词
MANET; EAACK; Routing overhead; Security level; RSA; P2P ACK; Intrusion detection systems; Misbehaving nodes detection; INTRUSION-DETECTION SYSTEM;
D O I
10.1016/j.measurement.2018.12.031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
MANET - Mobile Adhoc Network is a self-configuring network that connected by the number of mobile nodes with wireless links and it has no fixed infrastructure. In this, each single node can operates as both a transmitter and receiver. It has been exploited in various applications such as disaster stuck areas, military, emergency revival etc. Nevertheless, the open intermediate and broad distribution of nodes in MANET can cause a vulnerable to different malicious attacks and MANET that can operate consistently even in the being there of inside packet drop attackers can be really challenging. Therefore, we need to develop Intrusion Detection System to detect the misbehavior nodes during the packet delivery with acknowledgement for the protection of MANET. In this paper, EAACK (Enhanced Adaptive Acknowledgment) is developed with Enhanced Interior Gateway Routing Protocol (EIGRP) hybrid protocol which consists of P2P ACK and RSA algorithm. At present, the network overhead is caused by the digital signature algorithm if more misbehavior nodes are presented on network. Hence, this proposed system is applied with EIGRP to reduce the network overhead caused by digital signatures in EAACK, and P2P (peer-peer) ACK and RSA (named after Ron Rivest, Adi Shamir and Len Adleman) provides more security to the network. S-ACK (Selective Acknowledgements) cannot differentiate the particular node is malicious node. Therefore, this proposed system introduces the P2P ACK to detect the misbehavior node efficiently. Here, RSA can encrypt the session key that creates the key more secure to improve the security level and P2P ACK use this encrypted key for the acknowledgement. In the P2P ACK, keys are generated by the RSA and distributed for signing and verifying the acknowledgement packets in advance. This proposed P2P ACK is used to enhance the detection of misbehavior nodes. The performance of this proposed method can improve the security level and reduce the routing overhead through the secured acknowledgement. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [21] Network-aware P2P Content Sharing over MANET
    Ko, Seok Kap
    Kim, Young Han
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 661 - 665
  • [22] Efficient ID-based Threshold Signature in P2P and MANETs
    Liu Zhiyuan
    Feng Yunfang
    Li Jun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4884 - +
  • [23] Simulation of P2P Overlays over MANETs: Impediments and Proposed Solution
    Ali, Shabir
    Sewak, Anurag
    Pandey, Mayank
    Tyagi, Neeraj
    2017 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2017, : 338 - 345
  • [24] Design of P2Pnet: An Autonomous P2P Ad-Hoc Group Communication System
    Lien, Yao-Nan
    Jang, Hung-Chin
    Tsai, Tzu-Chieh
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 649 - 654
  • [25] Improving Throughput in Hybrid Wireless Networks Using P2P Based Market Guided Distributed Routing Mechanism
    Poovila, G.
    Kavitha, N. S.
    Philip, Jim Mathew
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [26] Context-aware Query Routing Protocol for P2P Mobile Systems
    Yeferny, Taoufik
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2 (WEBIST), 2016, : 325 - 332
  • [27] A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)
    Gelil, Walid Abdel
    Kunz, Thomas
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 640 - 646
  • [28] Scalable P2P bot detection system based on network data stream
    Shree Garg
    Sateesh K. Peddoju
    Anil K. Sarje
    Peer-to-Peer Networking and Applications, 2016, 9 : 1209 - 1225
  • [29] A Routing Scheme Based on Autonomous Clustering and P2P Overlay Network in MANETs
    Nakahara, Shoma
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 518 - 524
  • [30] Scalable P2P bot detection system based on network data stream
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (06) : 1209 - 1225