Professional Documents
Culture Documents
Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research
Institute University, Chennai
Professor, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute
University, Chennai
E-mail: vishwapriya13@gmail.com, vijivinod@gmail.com
ABSTRACT
The migration to wireless network from wired network has been a global trend in the past few
decades. The mobility and scalability brought by wireless network made it possible in many
applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MOBILE ADHOC NETWORK) is one of the most important and unique applications. On the contrary to
traditional network architecture, MOBILE AD-HOC NETWORK does not require a fixed network
infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate
directly with each other when they are both within the same communication range. It is crucial to
develop efficient intrusion-detection mechanisms to protect MOBILE AD-HOC NETWORK from
attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a
current trend of expanding MOBILE AD-HOC NETWORKs into industrial application
I.Introduction
Wireless networks are always preferred since
the rst day of their invention. Owing to the
improved technology and reduced costs,
wireless networks have gained much more
preferences over wired networks in the past
few decades.Mobile Ad hoc NETwork
(MOBILE AD-HOC NETWORK) is a
collection of mobile nodes equipped with both
a wireless transmitter and a receiver that
communicate with each other via bidirectional
wireless
links
either
directly
or
indirectly.MOBILE AD-HOC NETWORK
solves this problem by allowing intermediate
parties to relay data transmissions. This is
achieved by dividing MOBILE AD-HOC
NETWORK into two types of networks,
namely, single-hop and multihop. In a singlehop network, all nodes within the same radio
range communicate directly with each other.
On the other hand, in a multihop network,
nodes rely on other intermediate nodes to
transmit if the destination node is out of their
radio range.
S.
Year
No.
Author
Work
2012
R. H.
Akbani,
S. Patel
A
Survey
on
Intrusion Detection
in Mobile Ad Hoc
Networks
2011
Ms.
Usha
Sakthiv
el
Introduced
a
powerful decision
support tool, data
mining, in the
context
of
knowledge
management
2010
Sunilku
mar S.
Manvia
Routing
Misbehavior
Detection
in
MANETs Using
2ACK
2007
Kejun
Liu
Detection
of
Routing
Misbehavior
in
mobile ad-hoc net.
II.Review of Literature
The review of literature for secure disclosure
for trespassing mobile ad-hoc network
1048
Misbehavior
(MRA):
Report
Authentication
SIGNATURE:
Trespassing Mechanism
The unauthorized entering into or upto tribal
premises or private property by any one person
1049
Step2:
ARCHITECTURE
SIGNATURE
FOR
DIGITAL
SP
rVishwa(d)
= Sig Vishwa
Step3:
To ensure the validity of the digital signature,
the sender Vishwa is obliged to always keep
her private key PrVishwa as a secret without
revealing to anyone else. Otherwise, if the
attacker Eve gets this secret private key, she
can intercept the message and easily forge
malicious messages with Vishwas signature
and send them to Tamil. As these malicious
messages are digitally signed by Vishwa,
Tamil sees them as legit and authentic
messages from Vishwa. Next, Vishwa can
send a message m along with the signature
Vishwa to Tamil via an unsecured channel.
Tamil then computes the received message m
against the pre agreed hash function H to get
the message digest d. This process can be
generalized as,
H (m) = d
(SigVishwa)
=
d
If d == d, then it is safe to claim that the
message m_ transmitted through an unsecured
channel is indeed sent from Vishwa and the
messages itself are intact.
DIGITAL SIGATURE PROCESS:
Vishwa
Integrated Intelligent Research (IIR)
Tamil
1050
Cipher text
VI Result
Process Input
Client Request is the sample input of the
project to get responses from the server
without disturbance of malicious nodes. After
given client request we have to check the
trusted nodes to send the request to server.
Process Output
Client Responses is the sample output of the
project to receive the datas from server
without disturbance of malicious nodes. A
server gets the request from client and its
verified the node and message without reached
without disturbance of the hackers.
VII Analysis
Using an algorithm to implement get best
result
ONE PACKET DELIVERY RATIO
PDR
Malicious
node 0%
Malicious
node 10%
Malicious
node 20%
DSI
.82
.73
WATC
H DOG
.83
.77
2ACK
.97
.96
AACK
.96
.96
EAACK
.96
.97
.96
.97
(DSA)
EAACK
(RSA)
1051
R O/H
Malicio
us node
0%
Malicious
node 10%
Malicious
node 20%
DSI
.02
.023
.023
WATCH
DOG
.02
.025
.025
2ACK
.18
.4
.43
AACK
.03
.23
.32
EAACK
.15
.28
.35
.16
.3
.37
1)
Possibilities
of
adopting
hybrid
cryptography techniques to further reduce the
network overhead caused by digital signature.
(DSA)
EAACK
(RSA)
DSI
WATCH
DOG
2ACK
4)
Possibilities of implementing hybrid
cryptography techniques to further reduce the
network overhead caused by security.
AACK
IX REFERENCES:
EAACK(DS
A)
EAACK(RSA
)
1052
1053