International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Publisher

IJCNIS Vol.8, No.2, Feb. 2016

CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs

Full Text (PDF, 570KB), PP.64-71

Views:3   Downloads:0


J.Sathiamoorthy, B.Ramakrishnan

Index Terms

Mobile Ad hoc NETwork (MANET);Enhanced Adaptive Acknowledgment (EAACK);Clustered Enhanced Adaptive Acknowledgment (CEAACK);Cluster;Base Station


A MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. Hence MANETs do not use any centralized administration for communication due to this reason they are more vulnerable to attacks. So MANET uses special technique called EAACK, which uses special acknowledgment messages to avoid intruder communication. So due to this type of authentication, more acknowledgment messages are transferred in between two nodes, which increases delay in communication. Hence this drawback reduces system performance. 
In this paper we propose a new clustering technique in EAACK called CEAACK. Our proposed technique shows better performance when compare to the normal EAACK technique, which drastically reduces the number of acknowledgment packets during authentication process which achieves a good energy efficiency network and better data transmission.
Further, this technique consumes low energy and in the process provides better efficiency in data transmission in MANETs.

Cite This Paper

J.Sathiamoorthy, B.Ramakrishnan,"CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.64-71, 2016.DOI: 10.5815/ijcnis.2016.02.08


[1]Chinmay K.Nayak, G.K.AbaniKumar, Parida, Das," Detection of Routing misbehavior in MANET with 2ACK schene, Vol.2, No.1, Jan. 2011.

[2]R.Balakrishna, M.MuralimohanReddy, U.Rajeswar Rao, G.A, Ramachanndra, "Detection of Routing Minbehavior in MANET", using 2ACK", IEEE International Advance Computing Conference (IACC 2009), Patiala, India, pp 6-7 March 2009.

[3]Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE" EAACK—A Secure Intrusion-Detection System for MANETs" IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, March 2013.

[4]Prof. Poonam Gupta, Sarita Chopde," Detection of routing misbehavior in MANET using improved 2ACK ", IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 1 (Jan. - Feb. 2013), pp 53-60.

[5]Aishwarya Sagar Anand Ukey, Meenu Chawla, "Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET", IJCSI- International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010.

[6]Yongguang Zhang HRL Laboratories, Wenke Lee Department of Computer Science North Carolina State University Raleigh," Intrusion Detection in Wireless AdHoc Networks "MobiCom 'Proceedings of the 6th annual international conference on Mobile computing and networking pages 275-283, 2000.

[7]A. Singh, M. Maheshwari and N. Kumar, "Security and trust management in MANET," in Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, pp. 384–387, 2011.

[8]B. Sun, "Intrusion detection in mobile ad hoc networks," Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004.

[9]S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Computer Network, Boston, MA, pp. 255–265, 2000.

[10]K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

[11]Sunilkumar, S. Manvia, Lokesh B. Bhajantrib, and Vittalkumar K. Vaggac, "Routing Misbehavior Detection in MANETs Using 2ACK", journal of telecommunication and information technology, pp. 105–11, April 2010.

[12]Kiran Maraiya, Kamal Kant, Nitin Gupta," Efficient Cluster Head Selection Scheme for Data Aggregation in Wireless Sensor Network "International Journal of Computer Applications (0975 – 8887) Volume 23– No.9, June 2011.

[13]Indranil Gupta, Denis Riordan , Srinivas Sampalli," Cluster-head Election using Fuzzy Logic for Wireless Sensor Networks " CNSR 'proceedings of the 3rd Annual Communication Networks and Services Research Conference page 255-260, 2005. 

[14]K.Ramesh and Dr. K.Somasundaram "A Comparative Study of Cluster head Selection Algorithms in Wireless Sensor Networks "International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011.