2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087032
|View full text |Cite
|
Sign up to set email alerts
|

EAACK - a secure intrusion detection and prevention system for MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Joshi, et al [6] proposed a system which can detect as well as prevent the malicious attacks. The system is named as Enhanced Adaptive ACKnowledgment (EAACK).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Joshi, et al [6] proposed a system which can detect as well as prevent the malicious attacks. The system is named as Enhanced Adaptive ACKnowledgment (EAACK).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The year 2014-2015 have seen vast advancements in adopting techniques like Intrusion detection with extended EAACK using one-hop ACK [15], which optimized the security of data, nodes and shared key, [16] has extended the findings of [15] by including RSA and DSA in the intrusion detection. The proposed IDS have key management mechanism and better packet delivery ratio.…”
Section: Role Of Cryptographic Algorithms In Mobile Admentioning
confidence: 99%
“…In reference to [15][16][17], intrusion detection system [22], had been further improved using AES and RSA. This technique had improved the packet delivery ratio providing optimum security to the packets transferred.…”
Section: Role Of Cryptographic Algorithms In Mobile Admentioning
confidence: 99%
“…Rajesh Babu and Usha [2] presented a Novel Honeypot Based Detection and Isolation Approach (NHBADI) that supported in detection and isolation of black hole attacks in MANET. Along with the detection of the malicious nodes, the approach had isolated the black hole prone nodes in the network.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the omnipresent existence of remarkable factors, like scalability and mobility, the wireless networks [1] are preferred compared to the wired network. One of the crucial applications of the wireless network is the Mobile Ad-hoc Network (MANET), which has uninterrupted self-configuration, self-maintenance and framework-less network for mobile gadgets interlinked without wires [2]. A MANET is a collection of heterogeneous, self-organized and battery powered mobile nodes with varying availability of resources and computation capacity [5].…”
Section: Introductionmentioning
confidence: 99%