Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Dona George, L.Raja

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121 

Page no: 70-73

Abstract—Mobile Ad-hoc network (MANET) is a collection of nodes that dynamically form a temporal network capable of communicating with each other without network infrastructure or any centralized administration. A MANET is a type of ad hoc network that can change locations and configure itself by using wireless connections to connect to various networks.  The dynamic and cooperative nature of ad-hoc networking without a centralized authority for authentication and monitoring is susceptible to attacks that breaks down or exploits the cooperative behaviour of the ad-hoc routing. Routing attack will lead to the most devastating damage to the MANET. This project aims to provide security to routing attacks in MANETs. Here the intrusion detection is based on DAHT (Dual Authentication Hash Technique which is based on end to end communication between the source and the  destination. This technique will provide good security with much less overhead and  delay than the existing system  to protect the routing information.

Keywords Digital Signature Algorithm, Enhanced Adaptive Acknowledgement (EAACK), Mobile Ad-hoc Network, (MANET), Dual Authentication Hash Technique (DAHT).


[1]. K. Liu, J. Deng, P. K. Varshney, and K.Balakrishnan, May (2007) “An acknowledgment based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Computing, Vol. 6, No. 5,pp. 536–550,
[2] T.Sheltami, A.AlRoubaiey, E.Shakshuki, and Mahmoud,Oct.(2009) “Video transmission enhancement presence of misbehaving nodes in MANETs”, Int .J. Multimedia Syst., Vol. 15,No 5,pp273–282.
[3] R. Rivest, A. Shamir, and L. Adleman, Feb. 1983. “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, Vol. 21, No. 2, pp. 120–126.
[4] K. Balakrishnan, J. Deng, and P.K. Varshney, Mar. (2005). “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05).
[5] Xinjun Du, Ying Wang ,Jianhua Ge, Yumin Wang, (2003), “A Method for Security Enhancements in AODV Protocol” Proceedings of the 17th International Conference on Advanced Information Networking and Applications.
[6] Elhadi M. Shakshuki, nan kang, and tarek R. Sheltami, “IEEE EAACK—A secure intrusion-detection system for manets” IEEE Trans. On industrial electronics, vol. 60, No. 3, pp. 1089-1098 March (2013).
[7] Syeda Iffat Naqvi, Adeel Akram,(2011), IEEE,“Faculty of Telecom & Information Engineering” Pseudo-random Key Generation for Secure HMAC-MD5 .
[8] Gary Locke, Patrick Gallagher , “Digital Signature Standard (DSS)”, Federal Information Processing Standards Publication (2009).
[9] Vanesa Daza et.al,(2007) “Cryptographic techniques for mobile ad-hoc networks” Elsevier Computer Networks Vol. 51, pp.4938–4950.

Full Pdf Paper-Click Here