An enhancement of EAACK using P2P ACK and RSA public key cryptography

被引:7
|
作者
Thiyagarajan, R. [1 ]
Priya, B. Meenakshi [2 ]
机构
[1] Shreenivasa Engn Coll, Elect & Commun Engn, Dharmapuri 635301, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Mechatron Engn, Perundurai, Erode, India
关键词
MANET; EAACK; Routing overhead; Security level; RSA; P2P ACK; Intrusion detection systems; Misbehaving nodes detection; INTRUSION-DETECTION SYSTEM;
D O I
10.1016/j.measurement.2018.12.031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
MANET - Mobile Adhoc Network is a self-configuring network that connected by the number of mobile nodes with wireless links and it has no fixed infrastructure. In this, each single node can operates as both a transmitter and receiver. It has been exploited in various applications such as disaster stuck areas, military, emergency revival etc. Nevertheless, the open intermediate and broad distribution of nodes in MANET can cause a vulnerable to different malicious attacks and MANET that can operate consistently even in the being there of inside packet drop attackers can be really challenging. Therefore, we need to develop Intrusion Detection System to detect the misbehavior nodes during the packet delivery with acknowledgement for the protection of MANET. In this paper, EAACK (Enhanced Adaptive Acknowledgment) is developed with Enhanced Interior Gateway Routing Protocol (EIGRP) hybrid protocol which consists of P2P ACK and RSA algorithm. At present, the network overhead is caused by the digital signature algorithm if more misbehavior nodes are presented on network. Hence, this proposed system is applied with EIGRP to reduce the network overhead caused by digital signatures in EAACK, and P2P (peer-peer) ACK and RSA (named after Ron Rivest, Adi Shamir and Len Adleman) provides more security to the network. S-ACK (Selective Acknowledgements) cannot differentiate the particular node is malicious node. Therefore, this proposed system introduces the P2P ACK to detect the misbehavior node efficiently. Here, RSA can encrypt the session key that creates the key more secure to improve the security level and P2P ACK use this encrypted key for the acknowledgement. In the P2P ACK, keys are generated by the RSA and distributed for signing and verifying the acknowledgement packets in advance. This proposed P2P ACK is used to enhance the detection of misbehavior nodes. The performance of this proposed method can improve the security level and reduce the routing overhead through the secured acknowledgement. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [41] Merging of P2P Overlays Over Mobile Ad Hoc Network: Evaluation of Three Approaches
    Shah, Nadir
    Qian, Depei
    Wang, Rui
    AD HOC & SENSOR WIRELESS NETWORKS, 2015, 25 (3-4) : 199 - 222
  • [42] A cross-layer approach for partition detection at overlay layer for structured P2P in MANETs
    Shah, Nadir
    Ahmad, Ayaz
    Nazir, Babar
    Qian, Depei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (02) : 356 - 371
  • [43] A cross-layer approach for partition detection at overlay layer for structured P2P in MANETs
    Nadir Shah
    Ayaz Ahmad
    Babar Nazir
    Depei Qian
    Peer-to-Peer Networking and Applications, 2016, 9 : 356 - 371
  • [44] Query Learning-Based Scheme for Pertinent Resource Lookup in Mobile P2P Networks
    Yeferny, Taoufik
    Hamad, Sofian
    Ben Yahia, Sadok
    IEEE ACCESS, 2019, 7 : 49059 - 49068
  • [45] An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone
    Schmidt, S. Ece
    Soysal, Murat
    ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, 2006, : 128 - +
  • [46] Cross-layer design of P2P file sharing over mobile ad hoc networks
    Ren-Hung Hwang
    Cheng-Chang Hoh
    Telecommunication Systems, 2009, 42 : 47 - 61
  • [47] Cross-layer design of P2P file sharing over mobile ad hoc networks
    Hwang, Ren-Hung
    Hoh, Cheng-Chang
    TELECOMMUNICATION SYSTEMS, 2009, 42 (1-2) : 47 - 61
  • [48] A location and time-aware resource searching scheme in mobile P2P ad hoc networks
    Zhou, Shuai
    Meng, Xianfu
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (09) : 6809 - 6833
  • [49] Minimizing redundant messages and improving search efficiency under highly dynamic mobile P2P network
    Arunachalam A.
    Sornil O.
    Journal of Engineering Science and Technology Review, 2016, 9 (01) : 23 - 35
  • [50] Issues of Implementing Random Walk and Gossip Based Resource Discovery Protocols in P2P MANETs & Suggestions for Improvement
    Arunachalam, Ajay
    Sornil, Ohm
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 509 - 518