Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Intrusion Detection System in MANET by Adopting SEAACK and Hybrid Authentication Techniques

M. Kiruthiga, M. Islabudeen


Mobile Ad hoc Network (MANET) is a self configuring infrastructure less network of mobile devices connected by wireless. It includes some features like distributed operation, dynamic network topology etc. Though it has the above features, it is weaker in security. Here protection of routing information is critical. This open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. Although Enhanced Adaptive Acknowledgement (EAACK) is already implemented, it consists of less malicious behaviour detection rates, did not have any preventive measure to avoid forged acknowledgment attacks, to minimize the network overhead, and to eliminate the requirement of pre distributed keys. So it is a proposal to implement         1) new intrusion-detection system named Secure Enhanced Adaptive Acknowledgment (SEAACK) to demonstrate higher malicious behaviour detection rates with digital signature to prevent forged acknowledgment attacks and        2) adopting hybrid cryptographic techniques to reduce the network overhead caused by digital signature and also avoiding collision attacks using SHA-3.


Mobile Ad hoc Network, Digital signature, Secure Enhanced Adaptive Acknowledgement (SEAACK), SHA-3, DSA.

Full Text:



Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK-A Secure Intrusion Detection System for MANETs”, IEEE Transactions, Vol 60, No 3, March 2013.

G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol-A review,” J.Comp.Sci., Vol 3, No 8, 2007.

B.Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. disseratation, Texas A&M Univ.,College Station. TX. 2004.

L. Buttyan and J.Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in wireless/Mobile Security, NewYork,Springer, 2008.

S.Marti, T.J.Giuli, K.Lai and M.Baker,” Mitigating routing misbehaviour in mobile ad hoc networks,” in Proc, 6th Annu. Int. Conf. Mobile Comp. Net, Boston, MA, 2000.

J.S.Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Const. Vol 55, No 4, Apr 2008.

T.Sheltami Al-Roubaiey,E.Shakshuki and A.Mahmoud,”Video transmission enhancement in presence of misbehaving nodes in MANETs”,Int J.Multimedia Sys. Vol 15, No 5, Oct 2009.

D.Johnson and D.Maltz,”Dynamic Source routing in ad hoc wireless networks,” in Mobile computing, Norwell, MA, Kluwer, 1996.

Nat. Ins. Std. Technol., Digital Signature Standard(DSS) Federal Information Processing Standards Publication, Gathersburg, MD. 2009.

Soumya Thomas, Syam Gopi, “A secure data transmission in MANETs using hybrid technique”, IJERT, Vol 2, Issue 8, Aug 2013.

Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan, “Dynamic Key Cryptography and Applications”, International Journal of Network Security, Vol 10, No 3, May 2010

Guido Berton, Joan Daemen, Michael Peeters, Ronny Van Keer, “Keccak Implementation overview”, version 3.2, May 2012.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.