International Journal of Advanced Research in Computer Engineering & Technology
MANETs are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for MANETs. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. EAACK is designed based on the Digital Signature Algorithm (DSA) and RSA. Those techniques have drawbacks due to the collusions of packets and distribution of keys between nodes becomes overhead.