An enhancement of EAACK using P2P ACK and RSA public key cryptography

被引:7
|
作者
Thiyagarajan, R. [1 ]
Priya, B. Meenakshi [2 ]
机构
[1] Shreenivasa Engn Coll, Elect & Commun Engn, Dharmapuri 635301, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Mechatron Engn, Perundurai, Erode, India
关键词
MANET; EAACK; Routing overhead; Security level; RSA; P2P ACK; Intrusion detection systems; Misbehaving nodes detection; INTRUSION-DETECTION SYSTEM;
D O I
10.1016/j.measurement.2018.12.031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
MANET - Mobile Adhoc Network is a self-configuring network that connected by the number of mobile nodes with wireless links and it has no fixed infrastructure. In this, each single node can operates as both a transmitter and receiver. It has been exploited in various applications such as disaster stuck areas, military, emergency revival etc. Nevertheless, the open intermediate and broad distribution of nodes in MANET can cause a vulnerable to different malicious attacks and MANET that can operate consistently even in the being there of inside packet drop attackers can be really challenging. Therefore, we need to develop Intrusion Detection System to detect the misbehavior nodes during the packet delivery with acknowledgement for the protection of MANET. In this paper, EAACK (Enhanced Adaptive Acknowledgment) is developed with Enhanced Interior Gateway Routing Protocol (EIGRP) hybrid protocol which consists of P2P ACK and RSA algorithm. At present, the network overhead is caused by the digital signature algorithm if more misbehavior nodes are presented on network. Hence, this proposed system is applied with EIGRP to reduce the network overhead caused by digital signatures in EAACK, and P2P (peer-peer) ACK and RSA (named after Ron Rivest, Adi Shamir and Len Adleman) provides more security to the network. S-ACK (Selective Acknowledgements) cannot differentiate the particular node is malicious node. Therefore, this proposed system introduces the P2P ACK to detect the misbehavior node efficiently. Here, RSA can encrypt the session key that creates the key more secure to improve the security level and P2P ACK use this encrypted key for the acknowledgement. In the P2P ACK, keys are generated by the RSA and distributed for signing and verifying the acknowledgement packets in advance. This proposed P2P ACK is used to enhance the detection of misbehavior nodes. The performance of this proposed method can improve the security level and reduce the routing overhead through the secured acknowledgement. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [31] A partial key exposure attack on RSA using a 2-dimensional lattice
    Jochemsz, Ellen
    de Weger, Berme
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 203 - 216
  • [32] p2pTraf: An Open library implementing p2p vehicular network for preliminary real-field experiments
    Pandey, Aman
    Kumar, Ujjwal
    Sharma, Hrishahh
    Arkatkar, Shriniwas S.
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 753 - 758
  • [33] AN ENHANCED DOUBLE-LAYERED P2P SYSTEM FOR THE RELIABILITY IN DYNAMIC MOBILE ENVIRONMENTS
    Kim, Ji-Hoon
    Song, Jin-Woo
    Kim, Taek-Hun
    Yang, Sung-Bong
    COMPUTING AND INFORMATICS, 2011, 30 (03) : 467 - 489
  • [34] A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
    Yang, Hwan-Seok
    Sun, Jae-Hoon
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 578 - 587
  • [35] A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
    Hwan-Seok Yang
    Jae-Hoon Sun
    Peer-to-Peer Networking and Applications, 2016, 9 : 578 - 587
  • [36] Rock, Paper, Scissors Game Based Model for Content Discovery in P2P MANETs
    Ajay Arunachalam
    Wireless Personal Communications, 2020, 113 : 1315 - 1330
  • [37] Rock, Paper, Scissors Game Based Model for Content Discovery in P2P MANETs
    Arunachalam, Ajay
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (02) : 1315 - 1330
  • [38] VANET Based p-RSA Scheduling Algorithm Using Dynamic Cloud Storage
    Singh, Smita
    Negi, Sarita
    Verma, Shashi Kant
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (04) : 3527 - 3547
  • [39] VANET Based p-RSA Scheduling Algorithm Using Dynamic Cloud Storage
    Smita Singh
    Sarita Negi
    Shashi Kant Verma
    Wireless Personal Communications, 2018, 98 : 3527 - 3547
  • [40] Action-triggered public-key system for GSM using RSA with phone-dependent encryption
    El Nemr, Rehab K.
    Ismail, Imane Aly Saroit
    Ahmed, S. H.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 175 - +