SlideShare ist ein Scribd-Unternehmen logo
1 von 17
ENHANCED ADAPTIVE
ACKNOWLEDGMENT (EAACK)
S. Aakash, B.Tech-IT
SYSTEM
 EAACK is consisted of three major parts,
namely, ACK, secure ACK (S-ACK), and
misbehavior report authentication (MRA).
 All acknowledgment packets described in
this
research are required to be digitally signed
by its sender and verified by its receiver.
PROBLEMS TO TACKLE- RECEIVER COLLISION
LIMITED TRANSMISSION POWER
FALSE MISBEHAVIOR REPORT
EAACK SCHEME
MODULES
 ACK Mode
 SACK Mode
 MRA
 SEAACK
 CNDA
ACK
 ACK is basically an end-to-end
acknowledgment scheme. It acts as a part of
the hybrid scheme in EAACK, aiming to
reduce network overhead when no network
misbehavior is detected.
S-ACK
 The S-ACK scheme is an improved version of the
TWOACK scheme.
 Every three consecutive nodes work in a group to detect
misbehaving nodes. For every three consecutive nodes in
the route, the third node is required to send an S-ACK
acknowledgment packet to the first node.
 The intention of introducing S-ACKmode is to detect
misbehaving nodes in the presence of receiver collision or
limited transmission power.
 source node immediately trusts the misbehavior report,
EAACK requires the source node to switch to MRA mode
and confirm this misbehavior report. This is a vital step to
detect false misbehavior report.
MRA SCHEME
 The MRA scheme is designed to resolve the
weakness of Watchdog when it fails to detect
misbehaving nodes with the presence of false
misbehavior report.
 The false misbehavior report can be generated by
malicious attackers to falsely report innocent nodes
as malicious.
 This attack can be lethal to the entire network when
the attackers break down sufficient nodes and thus
cause a network division.
 The core of MRA scheme is to authenticate whether
the destination node has received the reported
missing packet through a different route
 EAACK requires all acknowledgment packets
to be digitally signed before they are sent out
and verified until they are accepted.
DISADVANTAGES
 It tackles only 3 problems of watch dog
concept.
PROPOSED SYSTEM’S DESCRIPTION
 SEAACK – A Secure Enhanced Adaptive
Acknowledgement Scheme.
It resolves the remaining two
problems of watch dog such as Partial
dropping and Ambiguous collisions by
monitoring the Energy of all nodes which are
in the network.
 Energy is the main problem in networks. The
threshold value is fixed to each and every
sensor. The sensor will be reconfigured when
the energy touch its threshold value.
CNDA
 For detecting colluding misbehaving nodes without the use of
cryptography,
 The (Leak Detector) mechanism to detect colluding malicious
nodes. It can be used in combination with any proactive,
multipath, non-broadcasting, secure routing algorithm.
 A simulation study using the contemporary IEEE 802.16 Mesh
mode to quantify the effects of colluding misbehaving nodes in
WMNs.
 The Leak Detector is able to efficiently tackle this problem and
presents good detection results, as seen from the evaluation. The
Leak Detector is one of the first mechanisms for addressing the
problem of malicious colluding nodes in WMNs.
 To detect colluding misbehavior and to identify malicious nodes.
This information can be used to adapt routing strategies and to
enable more dependable routing in MANETs.

Weitere ähnliche Inhalte

Was ist angesagt?

Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Tech
imec.archive
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Imran Khan
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Nexgen Technology
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 

Was ist angesagt? (20)

Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
50120140507006
5012014050700650120140507006
50120140507006
 
Wba5 Sanet En Tech
Wba5 Sanet En TechWba5 Sanet En Tech
Wba5 Sanet En Tech
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
2013 14-ns2-project-titles-me-mtech
2013 14-ns2-project-titles-me-mtech2013 14-ns2-project-titles-me-mtech
2013 14-ns2-project-titles-me-mtech
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
569
569569
569
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 

Andere mochten auch

Acknowledgment receipt
Acknowledgment receiptAcknowledgment receipt
Acknowledgment receipt
Green Minds
 

Andere mochten auch (11)

Example of acknowledgment
Example of acknowledgmentExample of acknowledgment
Example of acknowledgment
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
 
Bat Algorithm
Bat AlgorithmBat Algorithm
Bat Algorithm
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Acknowledgment receipt
Acknowledgment receiptAcknowledgment receipt
Acknowledgment receipt
 
Sample Acknowledgement of Project Report
Sample Acknowledgement of Project ReportSample Acknowledgement of Project Report
Sample Acknowledgement of Project Report
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 

Ähnlich wie Enhanced Adaptive ACKnowledgment (EAACK)

Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
 
power efficient rake receiver for interference reduction in
power efficient rake receiver for  interference reduction inpower efficient rake receiver for  interference reduction in
power efficient rake receiver for interference reduction in
AKASH VIJAYAN
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
Gregorio Toro Rivera
 

Ähnlich wie Enhanced Adaptive ACKnowledgment (EAACK) (20)

Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSA SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKS
 
50120140507006
5012014050700650120140507006
50120140507006
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
UNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptxUNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptx
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
 
power efficient rake receiver for interference reduction in
power efficient rake receiver for  interference reduction inpower efficient rake receiver for  interference reduction in
power efficient rake receiver for interference reduction in
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 
Prediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and CostPrediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and Cost
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
50120140504011
5012014050401150120140504011
50120140504011
 
Form.pptx
Form.pptxForm.pptx
Form.pptx
 
G0361052058
G0361052058G0361052058
G0361052058
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 

Mehr von AAKASH S

A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
AAKASH S
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
AAKASH S
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
AAKASH S
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
AAKASH S
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AAKASH S
 
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
AAKASH S
 

Mehr von AAKASH S (15)

Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPT
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
 
Capability Maturity Model Integration
Capability Maturity Model IntegrationCapability Maturity Model Integration
Capability Maturity Model Integration
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 

Kürzlich hochgeladen

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Kürzlich hochgeladen (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Enhanced Adaptive ACKnowledgment (EAACK)

  • 2. SYSTEM  EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report authentication (MRA).  All acknowledgment packets described in this research are required to be digitally signed by its sender and verified by its receiver.
  • 3. PROBLEMS TO TACKLE- RECEIVER COLLISION
  • 7. MODULES  ACK Mode  SACK Mode  MRA  SEAACK  CNDA
  • 8. ACK  ACK is basically an end-to-end acknowledgment scheme. It acts as a part of the hybrid scheme in EAACK, aiming to reduce network overhead when no network misbehavior is detected.
  • 9.
  • 10. S-ACK  The S-ACK scheme is an improved version of the TWOACK scheme.  Every three consecutive nodes work in a group to detect misbehaving nodes. For every three consecutive nodes in the route, the third node is required to send an S-ACK acknowledgment packet to the first node.  The intention of introducing S-ACKmode is to detect misbehaving nodes in the presence of receiver collision or limited transmission power.  source node immediately trusts the misbehavior report, EAACK requires the source node to switch to MRA mode and confirm this misbehavior report. This is a vital step to detect false misbehavior report.
  • 11. MRA SCHEME  The MRA scheme is designed to resolve the weakness of Watchdog when it fails to detect misbehaving nodes with the presence of false misbehavior report.  The false misbehavior report can be generated by malicious attackers to falsely report innocent nodes as malicious.  This attack can be lethal to the entire network when the attackers break down sufficient nodes and thus cause a network division.  The core of MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route
  • 12.
  • 13.  EAACK requires all acknowledgment packets to be digitally signed before they are sent out and verified until they are accepted.
  • 14. DISADVANTAGES  It tackles only 3 problems of watch dog concept.
  • 15. PROPOSED SYSTEM’S DESCRIPTION  SEAACK – A Secure Enhanced Adaptive Acknowledgement Scheme. It resolves the remaining two problems of watch dog such as Partial dropping and Ambiguous collisions by monitoring the Energy of all nodes which are in the network.
  • 16.  Energy is the main problem in networks. The threshold value is fixed to each and every sensor. The sensor will be reconfigured when the energy touch its threshold value.
  • 17. CNDA  For detecting colluding misbehaving nodes without the use of cryptography,  The (Leak Detector) mechanism to detect colluding malicious nodes. It can be used in combination with any proactive, multipath, non-broadcasting, secure routing algorithm.  A simulation study using the contemporary IEEE 802.16 Mesh mode to quantify the effects of colluding misbehaving nodes in WMNs.  The Leak Detector is able to efficiently tackle this problem and presents good detection results, as seen from the evaluation. The Leak Detector is one of the first mechanisms for addressing the problem of malicious colluding nodes in WMNs.  To detect colluding misbehavior and to identify malicious nodes. This information can be used to adapt routing strategies and to enable more dependable routing in MANETs.