International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 299

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10


     

Securing Manets with Ticket Granting for Acknowledgement Based Intrusion Detection

Reshma R, Sreerag B M


Abstract: Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network. Dynamic nature and limited transmission range of MANETs leads to many security challenges. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. IDS is a great research area as the applications of MANETs are increasing into various fields. So, an efficient Intrusion Detection System is to be developed which provides the integrity, confidentiality, non-repudiation and authentication. Enhanced Adaptive Acknowledgment (EAACK) has been developed which consists of three parts, namely, ACK, Secure ACK (S-ACK), and Misbehaviour Report Authentication (MRA). Each module works according to ACK received and so for preserving integrity each ACK is being digitally signed using DSA. The system enhances its security by introducing Ticket Granting System (TGS). TGS approves senders request by approving Tickets according to their privilege levels. Movement of each node is monitored by TGS and maintains Black list and White list of nodes. Tickets are granted by checking these lists and three modules of IDS works to find intruders so as to ensure security in the system.


Keywords: MANETs, Ticket Granting System TGS, Digital Signature DSA, Intrusion Detection


Edition: Volume 4 Issue 3, March 2015


Pages: 149 - 152



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Reshma R, Sreerag B M, "Securing Manets with Ticket Granting for Acknowledgement Based Intrusion Detection", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 149-152, https://www.ijsr.net/getabstract.php?paperid=SUB151905, DOI: https://www.doi.org/10.21275/SUB151905



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 158 - 161

MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization

Mithlesh Kumar, Gargishankar Verma

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article
Top