International Journal of P2P Network Trends and Technology (IJPTT) Volume 6 Issue 3 May to June 2016 ISSN: 2249-2615 http://www.ijpttjournal.org Page 1 Detection of Routing Misbehaving Links in MANET by Advance EAACK Scheme Shraddha Kamble #1 , Dr.B.K Mishra *2 , Dr.Rajesh Bansode #3 #1 PG student, Electronics and Telecommunication Department, Mumbai University *2 Principal, Electronics and Telecommunication Department, Mumbai University #3 Associate Professor, Information Technology Department, Mumbai University Mumbai, India Abstract-- Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and they use radio frequencies in air to transmit and receive the data. MANETS is used in many critical and tactical operations due to flexibility provided by their dynamic structure. Hence security becomes a primary concern to have safe communication between two nodes and this itself emphasis the need for an efficient intrusion detection system in MANETs. Enhanced Adaptive Acknowledgment (EAACK) was introduced in our earlier research which has overcome the drawback of Watchdog, ACK and TWOACK to some extent. In our paper, we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness Due to continuous and changing nature of nodes MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes. In order to send the data from one node other broadcast mechanism is used which increase the overhead between two nodes. Hence, in order to increase overall efficiency and security parameters that are considered are routing overhead and throughput. Keyword Adaptive acknowledgment (AACK), Dynamic source routing (DSR) , Digital Signature Algorithm (DSA),EAACK (Enhanced Adaptive Acknowledgment) ,Misbehaviour Report Analysis (MRA),MANETS (Mobile Ad-hoc Networks) , IDS (Intrusion Detection System) I. INTRODUCTION Mobile Ad Hoc Networks (MANETs) is one of the most widespread areas of research recently because of the challenges of the related protocols. MANET (Mobile Ad-hoc Network) technology which enables users to communicate with each other without any physical infrastructure regardless of their location, that’s why it is referred as infrastructure less network. Mobile Ad hoc Network, or MANET, consists of a group of nodes that dynamically constructs a self-configuring network without the support of a centralized network infra-structure. The mobile nodes can be cell- phones, PDAs and laptops and Bluetooth, etc. Device in mobile ad hoc network should able to detect the presence of other devices and perform necessary set up in order to communicate and share the data. One advantage of wireless networks is they can transmit data even after remaining mobile. Mobile Ad hoc networks makes less saviour, the problem of out of range nodes by routing data through intermediate nodes intermediate acts as a middle man in between two nodes. The MANET[1][2] operates independently and can be connected to the larger Internet. MANETS require less space and quick configuration due to this feature it is mainly used in emergency situation like medical emergency and military application where infrastructure is not available. Due to these unique characteristics, MANET is becoming more and more widely implemented. Being incorporated in critical operation security is of vital importance . Unfortunately, the open medium and remote distribution of MANET make it vulnerable to various types of attacks. An effective way of incorporating defective nodes in network in implementing intrusion detection system. It act as second layer of security it scans the whole system and detect undesirable and intruder activities . The remainder of the paper is organized as follows. Section II presents the background review and related work that are important for the understanding of the material to follow. Section III introduces our intrusion detection and EAACK(Enhanced Acknowledgment system). Section IV reports the simulation results and discussion. Finally, conclusions drawn from the paper and future work are given in Section V. II. BACKGROUND A. Intrusion detection in MANETs In Mobile Ad-hoc Network it is always assumed that the each node cooperates with other in order to send the data to each other. This assumption leaves the attackers opportunities to attack the system with just one or two compromised nodes .In order to address this problem Intrusion detection System[3] should be added to improve the security level of MANETs. Intrusion detection have the ability to detect and report the malicious activity in the network so it may be possible to stop that activities before they cause damage to the network . Intrusion in this section, we mainly describe three existing approaches, namely, TWOACK, AACK and EAACK.