SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
DOI : 10.5121/jgraphoc.2017.9201 1
A PROPOSAL ANALYTICAL MODEL AND
SIMULATION OF THE ATTACKS IN ROUTING
PROTOCOLS OF MANETS: IMPLEMENTATION OF A
SECURE MODEL OF MOBILITY
Karim KONATE and Abdourahime GAYE
Department of Mathematics and Computing, University Cheikh Anta DIOP, Dakar
ABSTRACT
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node
mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical
theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole
cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the
number of hops. We conducted a simulation of the attacks with a C implementation of the proposed
mathematical models.
KEYWORDS
Routing, Security, Attacks, Mobility, Modelling, Simulation, Mobile ad hoc
1. INTRODUCTION
Today ad hoc networks (MANET) are a more and more adopted technology. This is mainly due
to the continuing development of networks, the growing need for mobility, miniaturization of
networking devices, universal access to information and its sharing.
In MANETs the other intermediate network nodes will be used as gateways or relays. Indeed, this
routing is a problem of optimization under such constraints like topology changes, volatility of
links, limited storage and processing capacity, low bandwidth, low power level in batteries, etc.
These binding characteristics make MANETs very vulnerable to attacks comparing to wired
networks or infrastructure-based wireless networks.
The document is structured: we presented in the first some of the attacks and the countermeasures
met in the .MANET, in the second we proposed a mathematical model and the end we implanted
our analytical model.
2. BACKGROUND
An attack is an action which aims at compromising the security of the network. They are many
and varied in these MANET:
BlackHole attack: consists in dropping some routing messages that node receives [1, 2, 3, 4, 5]. It
was declined in several particularity alternatives, having different objectives, among which we
can quote:
• Routing loop, which makes it possible for a node to create loops in the network ;
• Grayhole, which lets pass only the packages of routing and diverts the data ;
• Blackmail, which makes it possible for a node attacker to isolate another node.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
2
The selfish attack: consists in not collaborating for the good performance of the network. We can
identify two types of nodes which do not wish to take part in the network. Defective nodes i.e. do
not work perfectly. Those which are malevolent, it is those which intentionally, try to tackle the
system: attack on the integrity of the data, the availability of the services, the authenticity of the
entities (denial-of-service, interception of messages, usurpation of identity, etc). Selfish nodes are
entities economically rational whose objective is to maximize their benefit [4, 5, 10, 11].
Overflow routing tables: consists of malicious nodes to cause the overflow routing tables of nodes
being used as relay [1, 2, 4, 31].
Sleep deprivation: consists to make a node to remain in a state of activity and to make him
consume all its energy [1, 2, 4, 31].
3. ANALYTICAL MODELLING OF THE ATTACKS
In this part we make a modeling of some of these attacks like Overflow, Blackmail and
Cooperative Blackhole by using mathematical tools. I chose these attacks in my analytical model
because in my routing protocol which I would have to implement I would take into account these
attacks i.e. I will propose a mechanism to fend off or reduce the impact of these attacks In the
article [24, 25, 31], the author models the Blackhole attack whose node tries to integrate the
network and tries to provide an optimal way and to be able to reject the packets, not to broadcast
them during the reception. He goes by the size of the network and the attackers to evaluate the
waste of time. For Overflow, Blackmail, Cooperative Blackhole, the attackers try to integrate the
network and to create the fictitious or nonexistent connection so as to cause a loss of the packets
during the transmission. This approach which is based on malicious nodes can be suited to our
simulation of the above mentioned attacks. In the case of our modelling of the attacks (Overflow,
Blackmail, Cooperative Blackhole), we consider an ad hoc network whose size is equal to N
nodes.
We suppose that among N nodes, the A (A<N) nodes of these nodes are malicious nodes. We
note by p the probability that attacker node is randomly selected such as p = A/N. Take the
example of a way crossing h hops [24, 25, 29]. If the selected nodes represent a sample random of
N nodes of the network, then the probability so that a way doesn’t contain attacker nodes is (1-
p)h
. We calculate the percentage in normal transmission according to the time alternated between
the periods of success transmission and the periods of failure transmission. In particular, we note
the time to live of a route determined by factors like the speed and the density of nodes. It is a
form of D/V where D is the distance or the range from emission and V the transmission speed for
node. When a route is defective the fact of mobility, a certain number of delay is shown during
the repair of the route. We note three types of delay [24, 25, 29]:
• Tdiag to diagnose the route ;
• TRL to send a route request ;
• TRR to receive a route replay.
First, duration Tdiag is noted to diagnose that the route is broken (sending of Route Error, Hello.).
Then, the request for a new route can be delayed for duration of limitation so as to attenuate the
impact of flood of the route requests of malicious nodes. We note this time by TRL, which
indicates the minimum time between the route requests authorized by the routing protocol.
Finally, the node must wait to receive one or more messages of route replay; this slot
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
3
time is noted by TRR. After these three phases, node begins to send the data on the new route.
However, the new route comprises at least attacker node with a probability 1-(1-p)h
. If such is the
case, the transmission is blocked and node must redo these three delays before testing again. It
should be noted that even if victim node makes sure that the new route does not contain defective
routes, the new route can contain attacker node. Thus, the node leaves the phase output zero
(before the transmission of the data) only after it established successfully a route without attacker
node. In general, a protocol can change timers granted to the number of attempts. Either n the
number of attempts at route request, Tn
RL indicates the duration of limitation’s rate given
immediately before the nth attempt. Thus, we note E (T0) the anticipated total time of output
zero, i.e., total time wasted to find a new route which doesn’t contain attacker node (time wasted
to find legitimate routes), is given in [24, 25, 29, 31] and is the form of:
is the lost time for a number of attempts equals to n.
To simplify, we suppose that we have the same number of attempts i.e. .the same n for group of
E(Tj) and we have :
The percentage in transmission standardized i.e. time for the normal transmission over total time
wasted to find a new route for a flow is given by:
Under the terms of what precedes and of the assumptions we have the formula represented by:
4. MODELLING OF THE MOBILITY
Adding a mobility aspect to the ad hoc network is equivalent putting movement in known
environment the nodes of the network. The representation of mobility varies enormously
according to the environments considered and some mobility models were developed to cover the
diverse behaviors. Among the models, we can quote Random WayPoint, Random Direction,
Boundless Area Simulation and Gauss-Markov, RPGM (Reference Not Group Model).
A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links.
Each node in the network can be in one of the four states: the node moves and its neighbors fixed,
the node is stable and its neighbors move, the node and its neighbors are moving, the node and its
neighbors are motionless [26, 27, 28].
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
4
To base itself on this simple and frequent report, we can define our mobility measure by the
mobility degree of the nodes in the network which will be evaluated with discrete and regular
time intervals. For each node, the mobility degree value represents at the moment T the variation
undergone by its neighbors compared with moment T-1. Thus, the nodes which leave and/or join
the node neighborhood influence on the evaluation mobility degree of the concerned node.
Mobility is locally quantified and doesn’t depend on the concerned node localization [27, 28, 29,
31].
If we pose M the mobility of node A at the moment T, NbNodes the total nodes number
at moment T-1, NbNodesIn the integrated nodes number and NbNodesOut the left nodes number
the coverage area of node A during the time interval of ∆t duration (in the interval [T-1, T]), we
can quantified M by [26, 27.28, 29, 31]:
In order to control the metric behavior that we defined and to make it adapt to the various
environments, we will define a new mobility parameter Îť which makes it possible the metric
flexible. Thanks to this parameter Îť, we can classify the mobile environments as follows [26,
27.28] :
• an environment incoming flow is important: λ<0,5;
• an environment where outgoing flow is important: λ˃0.5;
• a balanced environment where the nodes are same chance to leave or join the coverage area
each other: Îť=0.5.
We can formally quantify the mobility degree by:
Since the time intervals are discrete and regular, we can use the diagnostic route time and the time
of waiting to receive replay like our interval i.e. t Ďľ [Tdiag, Tdiag+TRR].
If M is the network average mobility measure in the regular time intervals and N the total nodes
number in the network, we have [.28, 29, 31]:
If we take into account of this network mobility metric that we defined, the expression of D
associated with the mobility can write as:
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
5
If we suppose that then
5. SIMULATION OF THE MODEL
To make our simulation we fixed Etl=10 S, Tdiag=2 S, Trl=2 S, Trr=1 S because these values are
the default values of the routing protocol DSR and which represent the time to live of the route
respectively, the period of diagnosis of the defective routes, the interval of the requests for route
and the latency of the route replay [24, 25, 29, 30]. These various variables are defined by the
protocol of selected routing. The following table gives the parameters of the analytical model
simulation.
Table 1. The simulation parameters of the analytical model
Figure 1 gives a variation of the percentage of transmission in time in the presence of attacker
nodes.
Figure 1. Impact of the attack and the length of route on the normal transmission time
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
6
For a number of hops equals to 9 when the fraction of malicious node is 0, the 68% of time are
spent for the transmissions which succeed and this rate decreases and reaches the 49% when the
fraction is of 0.73 and with a fraction equal to 0.98 this rates decreases and reaches the 20%. That
can be explained owing to the fact that when one selects malicious nodes, the lost time
increases because it will have a delay shown for the new discovery of the routes and waiting of
the answer’s messages. For a number of hops equals to 6, with a fraction of malicious nodes equal
to 0.73 the time spent for the transmissions which are successful is of 58% and for this fraction
when the number of hops is equal to 3, the rate in time used is 63 %. Thus we note a reduction in
the rate when the number of hops increases. That finds its explanation of the increase in the time
of transmission. On the other hand in comparison with the normal transmission time and the total
time of transmission which decreases. We vary h i.e. the number of hops to highlight the
characteristics of these MANETs which is the change of topology due to the mobility of nodes.
6. ACKNOWLEDGEMENTS AND DISCUSSIONS
The world needs more and more mobility, the access and the sharing of information. This
mobility materializes by the miniaturization of the peripherals (PDA, digital camera, mobile
phone.). This equipment is characterized by modest computing capacities and storage and also
their energy autonomy. By taking account of the mobility which is defined by a measurement M,
we notice for example with 0% of malicious node probability the transmission rate is
approximately 52% and if the probability is approximately 18% this rate borders on the 50%, is
relatively low difference compared to malicious nodes rate. That finds its explanation on the one
hand by the fact that if topology changes due to mobility the nodes accuse a delay during the
establishment of their routes what influenced the normal transmission. One the other hand the
nodes that we detected as malicious are also mobile nodes so that even if we take in account the
mobility the rate of transmission undergoes the same variation with the malicious nodes
probability.
In addition for the distribution we noticed that the items (60/10), (50/7) and (95/50) are points of
our figure i.e. 7% of probability of presence malicious nodes produce approximately 50% with
the mobility of normal transmission, 10% of probability of presence malicious nodes produce
approximately 60% with the mobility of normal transmission and 95% of the malicious nodes
give 50% of transmission, we can deduce from it that our model follows a Pareto distribution.
7. CONCLUSIONS
In our work, we modelled the mobility and the attacks by using mathematical model to see the
impact of the transmission time. We implemented our model in order to make evaluations of
performance. The derived metric mobility is based on integrate parameters coming from the
graph theory models. These metric exits of the graphs models make call to the parameters
characterizing the links state, the rate of changed link states, the link duration, the average
duration way, which will be able to have an impact on the error count route. The number of
received error messages route can cause two interpretations according to the origin of the element
which transmits the message. We choose these metric according to the characteristics MANET.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
7
REFERENCES
[1] Shikha Jain. Security Threats In Manets. International Journal on Information Theory (IJIT),
Vol.3, No.2, April 2014.
[2] Preeti Gulia, Sumita Sihag. Review and Analysis of the Security Issues in MANET. International
Journal of Computer Applications, Volume 75 - Number 8, 2013.
[3] Curtmola Reza, “Security of Routing Protocols in MANET”. 600.647-Advanced Topics in
Wireless Networks,February 2007, pages 26.
[4] Amandeep Kaur, Dr. Amardeep Singh. Security Attacks in Mobile Ad-hoc Networks.
International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2 014
[5] Chen Ruiliang,Snow Michael,Park Jung-Min,M. Refaei Tamer,Eltoweissy Mohamed, “Defense
against Routing Disruption Denial-of-Service Attacks in MANET”, Department of Electrical and
Computer Engineering Virginia Polytechnic Institute and State University Blacksburg,VA, USA,
November 2005, pages 15.
[6] A.Rajaram,Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad
hoc Networks”, (IJCSE) International Journal on Computer Science and Engineering
Vol.02,No.02,2010,400-408. Anna University Coimbatore, India, March 2010, pages 9.
[7] T.V.P.Sundararajan et Dr.A.Shanmugam, “Behavior Based Anomaly Detection Technique to
Mitigate the Routing Misbehavior in MANET”, Sathyamangalm-638401, Tamilnadu, India, May
2009, pages 14.
[8] Kevin Hoffman,David Zage,and Cristina Nita-Rotaru, “A Survey of Attack and Defense
Techniques for Reputation Systems”, Department of Computer Science and CERIAS Purdue
University, April 2008, pages 19.
[9] Pietro Michiardi, “Cooperation in the ad hoc networks: Application of the evolution and game
theory within the framework of imperfect observability”, Institute Eurecom 2229, road of the
Peaks LP 19306904 Sophia-Antipolis, France, July 2006, pages 17.
[10] Michiardi Pietro and Molva Refik, “CORE: A Collaborative Reputation Mechanism to enforce
node cooperation in MANET”, European Wireless Conference, November 2003, pages 15.
[11] Hu Jiangyi, “Cooperation in Mobile Ad Hoc Networks”, Computer Science Department Florida
State University, January 2005, pages 23.
[12] Buttyan Levente and Hubaux Jean-Pierre, “Nuglets: a virtual Currency to Stimule Cooperation in
Self-Organized Mobile Ad Hoc Networks”, Institute for Computer Communications and
Applications Department of Communication Systems Swiss Federal Institute of Technology
Lausanne, 18 January 2001, pages 15.
[13] Yan Zheng, Zhang Peng,Virtanen Teemupekka, “Trust Evaluation Based Security Solution in Ad
Hoc Networks”, Helsinki University of Technology, Finland, December 2003, pages 14.
[14] Xue Xiaoyun, “Security mechanisms for ad hoc routing protocols”, Computer Science and
Network Department, ENST, thesis September 2006, pages 234.
[15] Pietro Michiardi and Refik Molva, “Analysis of Coalition Formation and Cooperation Strategies in
MANET”, Institut Eurecom May 2004, pages 28.
[16] Levente Buttyan and Jean-Pierre Hubaux, “Report on a Working Session on Security in Wireless
Ad Hoc Networks”, Laboratory for Computer Communications and Applications Swiss Federal
Institute of Technology-Lausanne(EPFL), Switzerland, September 2002, pages 17.
[17] Pietro Michiardi , Refik Molva, “Game theoretic analysis of security in mobile ad hoc networks”,
Institut EurÊcom Research Report N°RR-02-070, juin 2002, pages 10.
[18] Hu Yih-Chun,Perrig Adrian,Johnson David B, “Packet Leashes: A Defense against Wormhole
Attacks in Wireless Networks”, INFOCOM 2003, pages 11.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.9, No.2, June 2017
8
[19] Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis, “Securing AODV Against Wormhole
Attacks in Emergency MANET”, Multimedia Communications,Wireless Multimedia and
Networking(WMN) Research Group Kingston University London, July 2009, pages 7.
[20] Shang-Ming Jen 1,Chi-Sung Laih 1 and Wen-Chung Kuo, “A Hop-Count Analysis Scheme for
Avoiding Wormhole Attacks in MANET”
[21] Payal N. Raj,Prashant B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM
AGAINST BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI International Journal of
Computer Science Issues, Vol.2, Computer Engineering Department, SVMIT Bharuch, Gujarat,
India, September 2009, pages 6.
[22] Ramaswamy Sanjay,Fu Huirong,Sreekantaradhya Manohar,Dixon John and Nygard Kendall,
“Prevention of Cooperative BlackHole Attack in MANET”, Department of Computer
Science,IACC 258 North Dakota State University, Fargo, ND 58105, March 2003, pages 7.
[23] Hesiri Weerasinghe and Huirong Fu, “Preventing Cooperative BlackHole Attacks in Mobile Ad
Hoc Networks: Simulation Implementation and Evaluation”, International Journal of Software
Engineering and Its Application Vol.2,No.3, Oakland University Rochester MI 48309 USA, June
2008, page 16.
[24] Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Impact of Denial of Service Attacks on Ad
Hoc Networks. DoCoMo Euro-Labs EPFL Rice University Munich, Germany Lausanne,
Switzerland Houston, TX, July 2007, pages 14.
[25] Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Denial of Service Resilience in Ad Hoc
Networks; MobiCom’04, Sept. 26Oct. 1, 2004, Philadelphia, Pennsylvania, USA, pages 14.
[26] BĂŠcaye DIOUM, Effetcs of the mobility on the routing protocoles in Ad Hoc Networks,
University of Mouloud Mammeri of Tizi Ouzou (Algeria) 2007
[27] Kamal OUDIDI, Routing et Quality of Service in spontaneous wireless network, university of
Mohammed V, juilly 2010
[28] Cholatip YAWUT, Adaptation of the mobility in Ad Hoc Networks, juilly 2009
[29] Dr K KONATE, A GAYE: Analysis of Attacks in mobile ad hoc networks: Modeling and
Simulation. 2nd International Conference on Intelligence Systems, Modeling and Simulation
(ISMS2011), ISBN 978-0-7695-4262-1 Kuala Lumpur (Malaysia) January 2011.
[30] [48]: David Joyner, Minh Van Nguyen, Nathann Cohen; Algorithmic Graph Theory, Edition
Version 0.7-r1908 December 2011, pages 310
[31] GAYE Abdourahime, Dr Karim KONATE: Attacks analysis and countermeasures in routing
protocols of mobile ad hoc networks,COMPUSOFT, An international journal of advanced
computer technology (IJACT),ISSN: 2320 – 0790, December 2014
Authors
Dr GAYE Abdourahime Student Researcher
Laboratory of Network and Telecommunication
Doctorate Institute of Mathematics and Computing
University Cheikh Anta DIOP, Dakar
Tutor of Virtual University Senegal (UVS)

More Related Content

What's hot

Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemPacket Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecomZep Lao
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...IRJET Journal
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsVijay Karan
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networkscsandit
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using keyijfcstjournal
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityeSAT Journals
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
 
Fair channel allocation and access design for cognitive ad hoc networks
Fair channel allocation and access design for cognitive ad hoc networksFair channel allocation and access design for cognitive ad hoc networks
Fair channel allocation and access design for cognitive ad hoc networksPolytechnique Montreal
 

What's hot (18)

Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
R44089799
R44089799R44089799
R44089799
 
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemPacket Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecom
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using key
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
Fair channel allocation and access design for cognitive ad hoc networks
Fair channel allocation and access design for cognitive ad hoc networksFair channel allocation and access design for cognitive ad hoc networks
Fair channel allocation and access design for cognitive ad hoc networks
 

Similar to A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOLS OF MANETS: IMPLEMENTATION OF A SECURE MODEL OF MOBILITY

Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...ijwmn
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
E0392031034
E0392031034E0392031034
E0392031034ijceronline
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
SIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACHSIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACHcscpconf
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leachcsandit
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022Editor IJCATR
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...cscpconf
 
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...Eswar Publications
 
Modeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on torModeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on toreSAT Journals
 

Similar to A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOLS OF MANETS: IMPLEMENTATION OF A SECURE MODEL OF MOBILITY (20)

Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
50120140501004
5012014050100450120140501004
50120140501004
 
E0392031034
E0392031034E0392031034
E0392031034
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
SIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACHSIMULATION OF SNOOZE ATTACK IN LEACH
SIMULATION OF SNOOZE ATTACK IN LEACH
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 
K1803036872
K1803036872K1803036872
K1803036872
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...Performance Comparison of Cluster based and Threshold based Algorithms for De...
Performance Comparison of Cluster based and Threshold based Algorithms for De...
 
Modeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on torModeling and prevention of cell counting based attacks on tor
Modeling and prevention of cell counting based attacks on tor
 

More from GiselleginaGloria

10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...GiselleginaGloria
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...GiselleginaGloria
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...GiselleginaGloria
 
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesOn the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesGiselleginaGloria
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
A Survey on Area Planning for Heterogeneous Networks
A Survey on Area Planning for Heterogeneous NetworksA Survey on Area Planning for Heterogeneous Networks
A Survey on Area Planning for Heterogeneous NetworksGiselleginaGloria
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...GiselleginaGloria
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)GiselleginaGloria
 
16th International Conference on Networks & Communications (NeCoM 2024)
16th International Conference on Networks & Communications (NeCoM 2024)16th International Conference on Networks & Communications (NeCoM 2024)
16th International Conference on Networks & Communications (NeCoM 2024)GiselleginaGloria
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
11th International Conference on Cybernetics & Informatics (CYBI 2024)
11th International Conference on Cybernetics & Informatics (CYBI 2024)11th International Conference on Cybernetics & Informatics (CYBI 2024)
11th International Conference on Cybernetics & Informatics (CYBI 2024)GiselleginaGloria
 
10th International Conference on Natural Language Processing (NATP 2024)
10th International Conference on Natural Language Processing (NATP 2024)10th International Conference on Natural Language Processing (NATP 2024)
10th International Conference on Natural Language Processing (NATP 2024)GiselleginaGloria
 
2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...GiselleginaGloria
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...GiselleginaGloria
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesGiselleginaGloria
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksGiselleginaGloria
 

More from GiselleginaGloria (20)

10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
 
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesOn the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
A Survey on Area Planning for Heterogeneous Networks
A Survey on Area Planning for Heterogeneous NetworksA Survey on Area Planning for Heterogeneous Networks
A Survey on Area Planning for Heterogeneous Networks
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
 
16th International Conference on Networks & Communications (NeCoM 2024)
16th International Conference on Networks & Communications (NeCoM 2024)16th International Conference on Networks & Communications (NeCoM 2024)
16th International Conference on Networks & Communications (NeCoM 2024)
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
11th International Conference on Cybernetics & Informatics (CYBI 2024)
11th International Conference on Cybernetics & Informatics (CYBI 2024)11th International Conference on Cybernetics & Informatics (CYBI 2024)
11th International Conference on Cybernetics & Informatics (CYBI 2024)
 
10th International Conference on Natural Language Processing (NATP 2024)
10th International Conference on Natural Language Processing (NATP 2024)10th International Conference on Natural Language Processing (NATP 2024)
10th International Conference on Natural Language Processing (NATP 2024)
 
2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOLS OF MANETS: IMPLEMENTATION OF A SECURE MODEL OF MOBILITY

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 DOI : 10.5121/jgraphoc.2017.9201 1 A PROPOSAL ANALYTICAL MODEL AND SIMULATION OF THE ATTACKS IN ROUTING PROTOCOLS OF MANETS: IMPLEMENTATION OF A SECURE MODEL OF MOBILITY Karim KONATE and Abdourahime GAYE Department of Mathematics and Computing, University Cheikh Anta DIOP, Dakar ABSTRACT In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models. KEYWORDS Routing, Security, Attacks, Mobility, Modelling, Simulation, Mobile ad hoc 1. INTRODUCTION Today ad hoc networks (MANET) are a more and more adopted technology. This is mainly due to the continuing development of networks, the growing need for mobility, miniaturization of networking devices, universal access to information and its sharing. In MANETs the other intermediate network nodes will be used as gateways or relays. Indeed, this routing is a problem of optimization under such constraints like topology changes, volatility of links, limited storage and processing capacity, low bandwidth, low power level in batteries, etc. These binding characteristics make MANETs very vulnerable to attacks comparing to wired networks or infrastructure-based wireless networks. The document is structured: we presented in the first some of the attacks and the countermeasures met in the .MANET, in the second we proposed a mathematical model and the end we implanted our analytical model. 2. BACKGROUND An attack is an action which aims at compromising the security of the network. They are many and varied in these MANET: BlackHole attack: consists in dropping some routing messages that node receives [1, 2, 3, 4, 5]. It was declined in several particularity alternatives, having different objectives, among which we can quote: • Routing loop, which makes it possible for a node to create loops in the network ; • Grayhole, which lets pass only the packages of routing and diverts the data ; • Blackmail, which makes it possible for a node attacker to isolate another node.
  • 2. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 2 The selfish attack: consists in not collaborating for the good performance of the network. We can identify two types of nodes which do not wish to take part in the network. Defective nodes i.e. do not work perfectly. Those which are malevolent, it is those which intentionally, try to tackle the system: attack on the integrity of the data, the availability of the services, the authenticity of the entities (denial-of-service, interception of messages, usurpation of identity, etc). Selfish nodes are entities economically rational whose objective is to maximize their benefit [4, 5, 10, 11]. Overflow routing tables: consists of malicious nodes to cause the overflow routing tables of nodes being used as relay [1, 2, 4, 31]. Sleep deprivation: consists to make a node to remain in a state of activity and to make him consume all its energy [1, 2, 4, 31]. 3. ANALYTICAL MODELLING OF THE ATTACKS In this part we make a modeling of some of these attacks like Overflow, Blackmail and Cooperative Blackhole by using mathematical tools. I chose these attacks in my analytical model because in my routing protocol which I would have to implement I would take into account these attacks i.e. I will propose a mechanism to fend off or reduce the impact of these attacks In the article [24, 25, 31], the author models the Blackhole attack whose node tries to integrate the network and tries to provide an optimal way and to be able to reject the packets, not to broadcast them during the reception. He goes by the size of the network and the attackers to evaluate the waste of time. For Overflow, Blackmail, Cooperative Blackhole, the attackers try to integrate the network and to create the fictitious or nonexistent connection so as to cause a loss of the packets during the transmission. This approach which is based on malicious nodes can be suited to our simulation of the above mentioned attacks. In the case of our modelling of the attacks (Overflow, Blackmail, Cooperative Blackhole), we consider an ad hoc network whose size is equal to N nodes. We suppose that among N nodes, the A (A<N) nodes of these nodes are malicious nodes. We note by p the probability that attacker node is randomly selected such as p = A/N. Take the example of a way crossing h hops [24, 25, 29]. If the selected nodes represent a sample random of N nodes of the network, then the probability so that a way doesn’t contain attacker nodes is (1- p)h . We calculate the percentage in normal transmission according to the time alternated between the periods of success transmission and the periods of failure transmission. In particular, we note the time to live of a route determined by factors like the speed and the density of nodes. It is a form of D/V where D is the distance or the range from emission and V the transmission speed for node. When a route is defective the fact of mobility, a certain number of delay is shown during the repair of the route. We note three types of delay [24, 25, 29]: • Tdiag to diagnose the route ; • TRL to send a route request ; • TRR to receive a route replay. First, duration Tdiag is noted to diagnose that the route is broken (sending of Route Error, Hello.). Then, the request for a new route can be delayed for duration of limitation so as to attenuate the impact of flood of the route requests of malicious nodes. We note this time by TRL, which indicates the minimum time between the route requests authorized by the routing protocol. Finally, the node must wait to receive one or more messages of route replay; this slot
  • 3. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 3 time is noted by TRR. After these three phases, node begins to send the data on the new route. However, the new route comprises at least attacker node with a probability 1-(1-p)h . If such is the case, the transmission is blocked and node must redo these three delays before testing again. It should be noted that even if victim node makes sure that the new route does not contain defective routes, the new route can contain attacker node. Thus, the node leaves the phase output zero (before the transmission of the data) only after it established successfully a route without attacker node. In general, a protocol can change timers granted to the number of attempts. Either n the number of attempts at route request, Tn RL indicates the duration of limitation’s rate given immediately before the nth attempt. Thus, we note E (T0) the anticipated total time of output zero, i.e., total time wasted to find a new route which doesn’t contain attacker node (time wasted to find legitimate routes), is given in [24, 25, 29, 31] and is the form of: is the lost time for a number of attempts equals to n. To simplify, we suppose that we have the same number of attempts i.e. .the same n for group of E(Tj) and we have : The percentage in transmission standardized i.e. time for the normal transmission over total time wasted to find a new route for a flow is given by: Under the terms of what precedes and of the assumptions we have the formula represented by: 4. MODELLING OF THE MOBILITY Adding a mobility aspect to the ad hoc network is equivalent putting movement in known environment the nodes of the network. The representation of mobility varies enormously according to the environments considered and some mobility models were developed to cover the diverse behaviors. Among the models, we can quote Random WayPoint, Random Direction, Boundless Area Simulation and Gauss-Markov, RPGM (Reference Not Group Model). A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. Each node in the network can be in one of the four states: the node moves and its neighbors fixed, the node is stable and its neighbors move, the node and its neighbors are moving, the node and its neighbors are motionless [26, 27, 28].
  • 4. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 4 To base itself on this simple and frequent report, we can define our mobility measure by the mobility degree of the nodes in the network which will be evaluated with discrete and regular time intervals. For each node, the mobility degree value represents at the moment T the variation undergone by its neighbors compared with moment T-1. Thus, the nodes which leave and/or join the node neighborhood influence on the evaluation mobility degree of the concerned node. Mobility is locally quantified and doesn’t depend on the concerned node localization [27, 28, 29, 31]. If we pose M the mobility of node A at the moment T, NbNodes the total nodes number at moment T-1, NbNodesIn the integrated nodes number and NbNodesOut the left nodes number the coverage area of node A during the time interval of ∆t duration (in the interval [T-1, T]), we can quantified M by [26, 27.28, 29, 31]: In order to control the metric behavior that we defined and to make it adapt to the various environments, we will define a new mobility parameter Îť which makes it possible the metric flexible. Thanks to this parameter Îť, we can classify the mobile environments as follows [26, 27.28] : • an environment incoming flow is important: Îť<0,5; • an environment where outgoing flow is important: Ν˃0.5; • a balanced environment where the nodes are same chance to leave or join the coverage area each other: Îť=0.5. We can formally quantify the mobility degree by: Since the time intervals are discrete and regular, we can use the diagnostic route time and the time of waiting to receive replay like our interval i.e. t Ďľ [Tdiag, Tdiag+TRR]. If M is the network average mobility measure in the regular time intervals and N the total nodes number in the network, we have [.28, 29, 31]: If we take into account of this network mobility metric that we defined, the expression of D associated with the mobility can write as:
  • 5. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 5 If we suppose that then 5. SIMULATION OF THE MODEL To make our simulation we fixed Etl=10 S, Tdiag=2 S, Trl=2 S, Trr=1 S because these values are the default values of the routing protocol DSR and which represent the time to live of the route respectively, the period of diagnosis of the defective routes, the interval of the requests for route and the latency of the route replay [24, 25, 29, 30]. These various variables are defined by the protocol of selected routing. The following table gives the parameters of the analytical model simulation. Table 1. The simulation parameters of the analytical model Figure 1 gives a variation of the percentage of transmission in time in the presence of attacker nodes. Figure 1. Impact of the attack and the length of route on the normal transmission time
  • 6. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 6 For a number of hops equals to 9 when the fraction of malicious node is 0, the 68% of time are spent for the transmissions which succeed and this rate decreases and reaches the 49% when the fraction is of 0.73 and with a fraction equal to 0.98 this rates decreases and reaches the 20%. That can be explained owing to the fact that when one selects malicious nodes, the lost time increases because it will have a delay shown for the new discovery of the routes and waiting of the answer’s messages. For a number of hops equals to 6, with a fraction of malicious nodes equal to 0.73 the time spent for the transmissions which are successful is of 58% and for this fraction when the number of hops is equal to 3, the rate in time used is 63 %. Thus we note a reduction in the rate when the number of hops increases. That finds its explanation of the increase in the time of transmission. On the other hand in comparison with the normal transmission time and the total time of transmission which decreases. We vary h i.e. the number of hops to highlight the characteristics of these MANETs which is the change of topology due to the mobility of nodes. 6. ACKNOWLEDGEMENTS AND DISCUSSIONS The world needs more and more mobility, the access and the sharing of information. This mobility materializes by the miniaturization of the peripherals (PDA, digital camera, mobile phone.). This equipment is characterized by modest computing capacities and storage and also their energy autonomy. By taking account of the mobility which is defined by a measurement M, we notice for example with 0% of malicious node probability the transmission rate is approximately 52% and if the probability is approximately 18% this rate borders on the 50%, is relatively low difference compared to malicious nodes rate. That finds its explanation on the one hand by the fact that if topology changes due to mobility the nodes accuse a delay during the establishment of their routes what influenced the normal transmission. One the other hand the nodes that we detected as malicious are also mobile nodes so that even if we take in account the mobility the rate of transmission undergoes the same variation with the malicious nodes probability. In addition for the distribution we noticed that the items (60/10), (50/7) and (95/50) are points of our figure i.e. 7% of probability of presence malicious nodes produce approximately 50% with the mobility of normal transmission, 10% of probability of presence malicious nodes produce approximately 60% with the mobility of normal transmission and 95% of the malicious nodes give 50% of transmission, we can deduce from it that our model follows a Pareto distribution. 7. CONCLUSIONS In our work, we modelled the mobility and the attacks by using mathematical model to see the impact of the transmission time. We implemented our model in order to make evaluations of performance. The derived metric mobility is based on integrate parameters coming from the graph theory models. These metric exits of the graphs models make call to the parameters characterizing the links state, the rate of changed link states, the link duration, the average duration way, which will be able to have an impact on the error count route. The number of received error messages route can cause two interpretations according to the origin of the element which transmits the message. We choose these metric according to the characteristics MANET.
  • 7. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 7 REFERENCES [1] Shikha Jain. Security Threats In Manets. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014. [2] Preeti Gulia, Sumita Sihag. Review and Analysis of the Security Issues in MANET. International Journal of Computer Applications, Volume 75 - Number 8, 2013. [3] Curtmola Reza, “Security of Routing Protocols in MANET”. 600.647-Advanced Topics in Wireless Networks,February 2007, pages 26. [4] Amandeep Kaur, Dr. Amardeep Singh. Security Attacks in Mobile Ad-hoc Networks. International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2 014 [5] Chen Ruiliang,Snow Michael,Park Jung-Min,M. Refaei Tamer,Eltoweissy Mohamed, “Defense against Routing Disruption Denial-of-Service Attacks in MANET”, Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksburg,VA, USA, November 2005, pages 15. [6] A.Rajaram,Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks”, (IJCSE) International Journal on Computer Science and Engineering Vol.02,No.02,2010,400-408. Anna University Coimbatore, India, March 2010, pages 9. [7] T.V.P.Sundararajan et Dr.A.Shanmugam, “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, Sathyamangalm-638401, Tamilnadu, India, May 2009, pages 14. [8] Kevin Hoffman,David Zage,and Cristina Nita-Rotaru, “A Survey of Attack and Defense Techniques for Reputation Systems”, Department of Computer Science and CERIAS Purdue University, April 2008, pages 19. [9] Pietro Michiardi, “Cooperation in the ad hoc networks: Application of the evolution and game theory within the framework of imperfect observability”, Institute Eurecom 2229, road of the Peaks LP 19306904 Sophia-Antipolis, France, July 2006, pages 17. [10] Michiardi Pietro and Molva Refik, “CORE: A Collaborative Reputation Mechanism to enforce node cooperation in MANET”, European Wireless Conference, November 2003, pages 15. [11] Hu Jiangyi, “Cooperation in Mobile Ad Hoc Networks”, Computer Science Department Florida State University, January 2005, pages 23. [12] Buttyan Levente and Hubaux Jean-Pierre, “Nuglets: a virtual Currency to Stimule Cooperation in Self-Organized Mobile Ad Hoc Networks”, Institute for Computer Communications and Applications Department of Communication Systems Swiss Federal Institute of Technology Lausanne, 18 January 2001, pages 15. [13] Yan Zheng, Zhang Peng,Virtanen Teemupekka, “Trust Evaluation Based Security Solution in Ad Hoc Networks”, Helsinki University of Technology, Finland, December 2003, pages 14. [14] Xue Xiaoyun, “Security mechanisms for ad hoc routing protocols”, Computer Science and Network Department, ENST, thesis September 2006, pages 234. [15] Pietro Michiardi and Refik Molva, “Analysis of Coalition Formation and Cooperation Strategies in MANET”, Institut Eurecom May 2004, pages 28. [16] Levente Buttyan and Jean-Pierre Hubaux, “Report on a Working Session on Security in Wireless Ad Hoc Networks”, Laboratory for Computer Communications and Applications Swiss Federal Institute of Technology-Lausanne(EPFL), Switzerland, September 2002, pages 17. [17] Pietro Michiardi , Refik Molva, “Game theoretic analysis of security in mobile ad hoc networks”, Institut EurĂŠcom Research Report N°RR-02-070, juin 2002, pages 10. [18] Hu Yih-Chun,Perrig Adrian,Johnson David B, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, INFOCOM 2003, pages 11.
  • 8. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.9, No.2, June 2017 8 [19] Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis, “Securing AODV Against Wormhole Attacks in Emergency MANET”, Multimedia Communications,Wireless Multimedia and Networking(WMN) Research Group Kingston University London, July 2009, pages 7. [20] Shang-Ming Jen 1,Chi-Sung Laih 1 and Wen-Chung Kuo, “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET” [21] Payal N. Raj,Prashant B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI International Journal of Computer Science Issues, Vol.2, Computer Engineering Department, SVMIT Bharuch, Gujarat, India, September 2009, pages 6. [22] Ramaswamy Sanjay,Fu Huirong,Sreekantaradhya Manohar,Dixon John and Nygard Kendall, “Prevention of Cooperative BlackHole Attack in MANET”, Department of Computer Science,IACC 258 North Dakota State University, Fargo, ND 58105, March 2003, pages 7. [23] Hesiri Weerasinghe and Huirong Fu, “Preventing Cooperative BlackHole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, International Journal of Software Engineering and Its Application Vol.2,No.3, Oakland University Rochester MI 48309 USA, June 2008, page 16. [24] Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Impact of Denial of Service Attacks on Ad Hoc Networks. DoCoMo Euro-Labs EPFL Rice University Munich, Germany Lausanne, Switzerland Houston, TX, July 2007, pages 14. [25] Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Denial of Service Resilience in Ad Hoc Networks; MobiCom’04, Sept. 26Oct. 1, 2004, Philadelphia, Pennsylvania, USA, pages 14. [26] BĂŠcaye DIOUM, Effetcs of the mobility on the routing protocoles in Ad Hoc Networks, University of Mouloud Mammeri of Tizi Ouzou (Algeria) 2007 [27] Kamal OUDIDI, Routing et Quality of Service in spontaneous wireless network, university of Mohammed V, juilly 2010 [28] Cholatip YAWUT, Adaptation of the mobility in Ad Hoc Networks, juilly 2009 [29] Dr K KONATE, A GAYE: Analysis of Attacks in mobile ad hoc networks: Modeling and Simulation. 2nd International Conference on Intelligence Systems, Modeling and Simulation (ISMS2011), ISBN 978-0-7695-4262-1 Kuala Lumpur (Malaysia) January 2011. [30] [48]: David Joyner, Minh Van Nguyen, Nathann Cohen; Algorithmic Graph Theory, Edition Version 0.7-r1908 December 2011, pages 310 [31] GAYE Abdourahime, Dr Karim KONATE: Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks,COMPUSOFT, An international journal of advanced computer technology (IJACT),ISSN: 2320 – 0790, December 2014 Authors Dr GAYE Abdourahime Student Researcher Laboratory of Network and Telecommunication Doctorate Institute of Mathematics and Computing University Cheikh Anta DIOP, Dakar Tutor of Virtual University Senegal (UVS)