Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs

Author(s): C. Atheeq* and M. Munir A. Rabbani

Volume 14, Issue 3, 2021

Published on: 09 August, 2019

Page: [837 - 847] Pages: 11

DOI: 10.2174/2213275912666190809104054

Price: $65

Abstract

Background: The evolution of wireless network from wired network presents a worldwide pattern in the previous couple of decades. All the mobile nodes in MANET act as router as well as host at the same time send and receive messages directly to one another until they are in the communication range and use multiple hops if the nodes are outside the communication range. The self-organizing property of nodes in MANET made it prominent among the principal applications like military and or emergency rescue sites. In spite of, the openness and dynamic nature of mobile nodes, MANET suffers from malicious nodes. Studies show that the existing mechanism lacks with cost effective and reduced overhead in the network.

Objective: It is vital to design a system that detects the malicious nodes to guard MANET from attackers. With the enhancements of the innovation and cost effective and minimum overhead, our visualization presents a tremendous expansion of MANETs into modern applications.

Methods: In this article, we present our proposed model Counter based authenticated acknowledgement uniquely developed for MANETs that uses chebyshev polynomials and digested acknowledgment message for detection of misbehaving nodes in MANET.

Results: Implementation shows that the proposed model outperforms in terms of reduced overhead, delay and packet delivery by mitigating attacks.

Conclusion: Finally we conclude that we design an effective intrusion detection system that can be adaptable in MANET applications.

Keywords: Digital signature, acknowledgment, counter, authentication, MANET, Ad hoc network.

Graphical Abstract

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy