Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure - Acknowledgment Based Detection Approach for MANET’S

V. Sathya


Mobile ad hoc networks (MANETs) consist of mobile nodes that work independently without an infrastructure. They are useful in application areas like disaster management emergency and rescue operations where it is not possible to have well-defined infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bidirectional wireless links either directly or indirectly. A new intrusion detection system named Enhanced. Adaptive Acknowledgement (EAACK) specially designed for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite the existence of false misbehavior report. As the MRA scheme will demonstrate positive performances against Watchdog, TWOACK and AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances.


Digital Signature, DSA Algorithm, EAACK, MANET, MRA, TWOACK.

Full Text:



. Y. Kim, “Remote sensing and control of an irrigation system using a distributed wireless sensor network,” IEEE Trans. Instrum.Meas., vol. 57, no. 7, pp. 1379–1387, Jul. 2008.

. H. Miranda and L. Rodrigues, “Preventing Selfishness in Open Mobile Ad Hoc Networks,” Proc. Seventh CaberNet Radicals Workshop, Oct. 2002.

. L. Buttyan and J.-P. Hubaux, “Security and Cooperation in Wireless Networks,”, 2006.

. L.M. Feeney and M. Nilsson, “Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment,” Proc. IEEE INFOCOM, 2001.

. L. Buttyan and J.-P. Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc, Aug. 2000.

. L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.

. F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks,” Proc. Seventh Int’l Workshop Security Protocols, 1999.

. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’01), 2001.

. I. Aad, J.-P. Hubaux, and E-W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. MobiCom, 2004.

. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.

. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence ofmisbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.

. B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004.

. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

. L. Buttyan and J.-P. Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc, Aug. 2000.

. J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, “Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project,” IEEE Comm. Magazine, Jan. 2001.

. M. Jakobsson, J.-P. Hubaux, and L. Buttyan, “A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,” Proc. Financial Cryptography Conf., Jan. 2003.

. L. Buttyan and J.-P. Hubaux, “Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, 2003.

. S. Zhong, J. Chen, and Y.R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc. INFOCOM, Mar.-Apr. 2003.

. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, Aug. 2000.

. S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc, June 2002.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.