SlideShare a Scribd company logo
1 of 8
Download to read offline
International INTERNATIONAL Journal of Electronics and JOURNAL Communication Engineering OF ELECTRONICS & Technology (IJECET), AND 
ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
COMMUNICATION  
ENGINEERING  TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 7, July (2014), pp. 01-08 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
	
	 
1 
 
IJECET 
© I A E M E 
AIS DYMO: AIS BASED SECURE DYMO ROUTING IN MANET 
Parvinder1  Dr. V.K. Suman2 
1Research Scholar, Shri Venkateshwara University, U.P. 
2Professor  Dean, IIMT-IET, Meerut. 
ABSTRACT 
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is 
capable to handle the network layer attack. It means the performance of the network doesn’t get 
degraded under the attack. Various immune algorithms can be used to enhance the performance of 
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the 
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network 
layer attacks by using the clonal selection immune algorithm. 
Keywords: MANET, Routing, Attacks, DYMO, AIS, Clonal selection. 
I. INTRODUCTION 
Mobile Ad-Hoc Networks (MANETs) are comprised of mobile nodes (MNs) that are self-organizing 
and cooperative to ensure efficient and accurate packet routing between nodes (and, 
potentially, base stations).Figure1 shows the structure of MANETS. There are no specific routers, 
servers, access points for MANETs. Because of its fast and easy of deployment, robustness, and low 
cost, Typical MANETs applications could be find in the following areas like Military applications 
(i.e. a temporary network in the battlefield), Search and rescue operations, Temporary networks 
within meeting rooms, airports, Vehicle-to-vehicle communication in smart transportation, Personal 
Area Networks connecting mobile devices like mobile phones, laptops, smart watches, and other 
wearable computers etc. Design issue for developing a routing protocol for wireless environment 
with mobility is very different and more complex than those for wired network with static nodes [1].
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
 
Figure 1: Mobile Ad Hoc Networks-MANETs. [2] 
Routing is the process to send information from one host to another host. Routing means 
route packet to its destination using efficient path. Protocols are set of rules. Ad-Hoc network is 
known as Mobile Ad-Hoc Network (MANET) because of motion of nodes in network. They are 
IBSS (Independent Basic Service Set), because they do not need AP (Access Point) for 
communication in nodes [3]. MANETs is a self-constructing network and form an unaware topology. 
Every node acts as routers in network to route the packet. MANETs are used in those areas where 
wire and wireless infrastructures are unreachable i.e. disaster area, war zone. Due to rapid change of 
topology in MANETs, MANETs routing protocols are required. The routing protocol is required 
whenever the source needs to communicates with destination. 
2 
MANETs routing protocols are classified as:- 
A. Reactive protocols 
B. Proactive protocols 
C. Hybrid protocols 
a. Reactive Routing Protocols 
The reactive routing protocols are based on some sort of query-reply dialog. Reactive 
protocols proceed for establishing route(s) to the destination only when the need arises. They do not 
need periodic transmission of topological information of the network. 
b. Proactive Routing Protocols 
Proactive protocols continuously learn the topology of the network by exchanging 
topological information among the network nodes. Thus, when there is a need for a route to a 
destination, such route information is available immediately. If the network topology changes too 
frequently, the cost of maintaining the network might be very high. If the network activity is low, the 
information about actual topology might even not be used. 
a. Hybrid Routing Protocols 
Often reactive or proactive feature of a particular routing protocol might not be enough; 
instead a mixture might yield better solution. Hence, in the recent days, several hybrid protocols are 
also proposed.
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
 
3 
II. DYMO 
Dynamic MANET On-demand Routing (DYMO) [4] is a reactive routing protocol under 
development by the Mobile Ad hoc Networks Working Group from IETF and is intended for use by 
mobile routers in wireless, multi-hop networks. It offers adaption for topology changes and 
determines unicast routes on-demand. Its main activities are the route discovery and route 
maintenance mechanisms, achieved through its route requisition (RREQ), route reply (RREP) and 
route error (RRER) messages. It employs sequence numbers to ensure loop freedom and also to 
avoid the dissemination of ancient routing information, and its basic operation consists of sending 
RREQ messages through the network for finding the routes it needs. The intermediate nodes 
receiving a RREQ message store the route for the node that originated it and then reforward the 
RREQ. The destination node, upon receiving a RREQ message, replies with a unicast RREP one. 
The same way, every intermediate node receiving a RREP message stores the route for the node that 
originated it. To adapt to topology changes, after receiving a packet that should be sent to a link that 
is no longer available, the node notifies the message sender by sending back a RERR message. IF the 
source node still wants to send packets to given destination, a new route discovery process is to be 
initiated [5]. The DYMO protocol works with source routing, meaning nodes read the routing 
messages to acquire knowledge on the paths involved in the search process, as well as write in the 
search packet the necessary hops needed to reach its destination. This method clearly increases the 
size of the routing packets, with the intention of reducing the number of retransmissions. 
III. ATTACKS In MANET’s 
Due to dynamic, distributed infrastructure less nature of MANETs, and lack of centralized 
authority, the ad hoc networks are vulnerable to various kinds of attacks. The challenges to be faced 
by MANETs are over and above to those to be faced by the traditional wireless networks. The 
accessibility of the wireless channel to both the genuine user and attacker make the MANET 
susceptible to both passive eavesdroppers as well as active malicious attackers. The limited power 
backup and limited computational capability of the individual nodes hinders the implementation of 
complex security algorithms and key exchange mechanisms. There is always a possibility of a 
genuine trusted node to be compromised by the attackers and subsequently used to launch attacks on 
the network. Node mobility makes the network topology dynamic forcing frequent networking 
reconfiguration which creates more chances for attacks [6]. Layer wise attack is further categorized 
into five layers in which an active attack is one where the attacker modifies network packets while 
they are in transit, or sends forged network packets. 
Table 1: Layer wise categorization of attacks
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
 
4 
IV. AIS 
 
Artificial immune systems can be defined as abstract or metaphorical computational systems 
developed using ideas, theories, and components, extracted from the immune system. Most AIS aim 
at solving complex computational or engineering problems, such as pattern recognition, elimination, 
and optimization. This is a crucial distinction between AIS and theoretical immune system models. 
While the former is devoted primarily to computing, the latter is focused on the modelling of the IS 
in order to understand its behaviour, so that contributions can be made to the biological sciences. It is 
not exclusive, however, the use of one approach into the other and, indeed, theoretical models of the 
IS have contributed to the development of AIS [8]. There are various algorithm in AIS. Form all 
clonal selection is as: 
Clonal Selection Algorithm 
Immune Algorithm is derived through the study of immune response. In short, it models how 
antibodies of the immune system learn adaptively the features of the intruding antigen and act upon. 
Clonal Selection Algorithm is a special class of Artificial Immune Systems. The algorithm starts by 
defining a purpose function f(x) which needs to be optimized. Some possible candidate solutions are 
created, antibodies will be used in the purpose function to calculate their affinity and this will 
determine the ones which will be cloned for the next step. The cloned values are changed, mutated 
with a predefined ratio and the affinities are recalculated and sorted. 
V. PROPOSED WORK 
The existing DYMO protocol is not capable of handling any type of attack. It means the 
performance of the protocol gets degraded under attacks. The attacks at the network layer leads to 
the most degradation in the performance. Various network layer attacks are wormhole attack, black 
hole attack, gray hole attack, Sybil attack etc. Any external agent may disturb the nature of any 
particular node that leads to the routing disruption and results in degraded performance. The 
proposed work modifies the DYMO protocol and develops the AIS-DYMO protocol that is capable 
to handle the network layer attack. It means the performance of the network doesn’t get degraded 
under the attack. Various immune algorithms can be used to enhance the performance of the DYMO 
protocol, but the clonal selection algorithm is used in this work to enhance the performance of the 
DYMO protocol. Overall the DYMO protocol is modified to handle the network layer attacks by 
using the clonal selection immune algorithm. 
VI. PROPOSED ALGORITHM 
The working of the AIS-DYMO can be understood by the following algorithm: 
1. Select S and D in the network of node N 
2. Determine the routing path from S to D using the DYMO routing protocol. 
3. If length of path  average length path 
4. Discard the path 
5. go to step 2 
6. end if 
7. Mark each node in the routing path as antibody 
8. When an antigen invades(attack occur) 
9. Avdelay=0; 
10. AVForwarding_ratio=0;
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
 
5 
 
11. For each node in the routing path say i 
12. Avdelay=Avdelay+ current node delay 
13. AVForwarding_ratio=AVForwarding_ratio +current node forwarding ratio 
14. End 
15. Avdelay=Avdelay/number of nodes in routing path 
16. AVForwarding_ratio= AVForwarding_ratio/number of nodes in routing path. 
17. For each node in the routing path say i 
18. If forwarding ratioAVForwarding_ratio || delayAvdelay 
19. Then mark node as antigen 
20. End if 
21. End for 
22. Discard the antigen node 
23. Go to step 2. 
The above algorithm is capable to handle various attacks. The attack which increases the delay or 
attract the data packet to pass through wrong path or the attack in which any node consumes all or 
some data packets. All of these attacks can be easily handled by using above algorithm. 
VII. RESULTS 
Table 2: Parameter analysis of AODV 
Table 3: Parameter analysis of DYMO 
Number 
of Nodes 
Packet 
delivery 
ratio 
Loss ratio End 2 End 
delay(ms) 
Throughput Routing 
Overhead 
20 87.4575 0.1254252 3.47 440.27 0.16 
40 84.3813 0.1561872 4.42 392.42 0.16 
50 82.4872 0.1751275 5.52 320.68 0.16 
100 80.1684 0.1983158 5.93 256.53 0.15 
Number 
of 
Nodes 
Packet 
delivery 
ratio 
Loss ratio End 2 End 
delay(ms) 
Throughput Routing 
Overhead 
20 91.6245 0.0428516 2.21 471.56 0.16 
40 91.4112 0.0589323 3.33 441.84 0.16 
50 91.3565 0.0766925 3.78 421.63 0.16 
100 88.8025 0.0794268 4.03 410.05 0.13
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 
 
Table 4: Parameter Analysis of AIS-DYMO
Figure 2: Comparison of PDR between AODV, DYMO, AIS-DYMO 
 
 
 
 
 
		 
Figure 3: Comparison of Loss ratio between AODV, DYMO, AIS-DYMO 
6
Number 
of Nodes 
Packet 
delivery 
ratio 
Loss ratio E2 E 
delay(ms) 
Throughput Routing 
Overhead 
20 98.1352 0.018648 1.61 663.37 0.16 
40 97.7291 0.0227091 1.88 661.57 0.16 
50 97.1422 0.0285782 2.19 662.25 0.16 
100 96.1074 0.0389257 3.03 580.05 0.13

More Related Content

What's hot

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
Pcf investigation to improve the
Pcf investigation to improve thePcf investigation to improve the
Pcf investigation to improve theIJCSES Journal
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoIJARIIT
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 

What's hot (16)

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Br33421423
Br33421423Br33421423
Br33421423
 
Pcf investigation to improve the
Pcf investigation to improve thePcf investigation to improve the
Pcf investigation to improve the
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
IJMNDI.2015.069218
IJMNDI.2015.069218IJMNDI.2015.069218
IJMNDI.2015.069218
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 

Viewers also liked

Viewers also liked (8)

Design and development of 4 cylinder gasoline engine model for the verificati...
Design and development of 4 cylinder gasoline engine model for the verificati...Design and development of 4 cylinder gasoline engine model for the verificati...
Design and development of 4 cylinder gasoline engine model for the verificati...
 
20320140503028
2032014050302820320140503028
20320140503028
 
30120130406016
3012013040601630120130406016
30120130406016
 
30120140501001
3012014050100130120140501001
30120140501001
 
30420130403005
3042013040300530420130403005
30420130403005
 
30120130406014
3012013040601430120130406014
30120130406014
 
30120140504024
3012014050402430120140504024
30120140504024
 
20320140503030
2032014050303020320140503030
20320140503030
 

Similar to 40120140507001

Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
Investigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wirelessInvestigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wirelessIAEME Publication
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIJECEIAES
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...IJECEIAES
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2IAEME Publication
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...IJECEIAES
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 

Similar to 40120140507001 (20)

20120130405026
2012013040502620120130405026
20120130405026
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
Investigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wirelessInvestigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wireless
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networks
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
 
50120140501004
5012014050100450120140501004
50120140501004
 
50120140506010
5012014050601050120140506010
50120140506010
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
 
40120140506010
4012014050601040120140506010
40120140506010
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

40120140507001

  • 1. International INTERNATIONAL Journal of Electronics and JOURNAL Communication Engineering OF ELECTRONICS & Technology (IJECET), AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME COMMUNICATION ENGINEERING TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 1 IJECET © I A E M E AIS DYMO: AIS BASED SECURE DYMO ROUTING IN MANET Parvinder1 Dr. V.K. Suman2 1Research Scholar, Shri Venkateshwara University, U.P. 2Professor Dean, IIMT-IET, Meerut. ABSTRACT This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is capable to handle the network layer attack. It means the performance of the network doesn’t get degraded under the attack. Various immune algorithms can be used to enhance the performance of the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network layer attacks by using the clonal selection immune algorithm. Keywords: MANET, Routing, Attacks, DYMO, AIS, Clonal selection. I. INTRODUCTION Mobile Ad-Hoc Networks (MANETs) are comprised of mobile nodes (MNs) that are self-organizing and cooperative to ensure efficient and accurate packet routing between nodes (and, potentially, base stations).Figure1 shows the structure of MANETS. There are no specific routers, servers, access points for MANETs. Because of its fast and easy of deployment, robustness, and low cost, Typical MANETs applications could be find in the following areas like Military applications (i.e. a temporary network in the battlefield), Search and rescue operations, Temporary networks within meeting rooms, airports, Vehicle-to-vehicle communication in smart transportation, Personal Area Networks connecting mobile devices like mobile phones, laptops, smart watches, and other wearable computers etc. Design issue for developing a routing protocol for wireless environment with mobility is very different and more complex than those for wired network with static nodes [1].
  • 2. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME Figure 1: Mobile Ad Hoc Networks-MANETs. [2] Routing is the process to send information from one host to another host. Routing means route packet to its destination using efficient path. Protocols are set of rules. Ad-Hoc network is known as Mobile Ad-Hoc Network (MANET) because of motion of nodes in network. They are IBSS (Independent Basic Service Set), because they do not need AP (Access Point) for communication in nodes [3]. MANETs is a self-constructing network and form an unaware topology. Every node acts as routers in network to route the packet. MANETs are used in those areas where wire and wireless infrastructures are unreachable i.e. disaster area, war zone. Due to rapid change of topology in MANETs, MANETs routing protocols are required. The routing protocol is required whenever the source needs to communicates with destination. 2 MANETs routing protocols are classified as:- A. Reactive protocols B. Proactive protocols C. Hybrid protocols a. Reactive Routing Protocols The reactive routing protocols are based on some sort of query-reply dialog. Reactive protocols proceed for establishing route(s) to the destination only when the need arises. They do not need periodic transmission of topological information of the network. b. Proactive Routing Protocols Proactive protocols continuously learn the topology of the network by exchanging topological information among the network nodes. Thus, when there is a need for a route to a destination, such route information is available immediately. If the network topology changes too frequently, the cost of maintaining the network might be very high. If the network activity is low, the information about actual topology might even not be used. a. Hybrid Routing Protocols Often reactive or proactive feature of a particular routing protocol might not be enough; instead a mixture might yield better solution. Hence, in the recent days, several hybrid protocols are also proposed.
  • 3. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 3 II. DYMO Dynamic MANET On-demand Routing (DYMO) [4] is a reactive routing protocol under development by the Mobile Ad hoc Networks Working Group from IETF and is intended for use by mobile routers in wireless, multi-hop networks. It offers adaption for topology changes and determines unicast routes on-demand. Its main activities are the route discovery and route maintenance mechanisms, achieved through its route requisition (RREQ), route reply (RREP) and route error (RRER) messages. It employs sequence numbers to ensure loop freedom and also to avoid the dissemination of ancient routing information, and its basic operation consists of sending RREQ messages through the network for finding the routes it needs. The intermediate nodes receiving a RREQ message store the route for the node that originated it and then reforward the RREQ. The destination node, upon receiving a RREQ message, replies with a unicast RREP one. The same way, every intermediate node receiving a RREP message stores the route for the node that originated it. To adapt to topology changes, after receiving a packet that should be sent to a link that is no longer available, the node notifies the message sender by sending back a RERR message. IF the source node still wants to send packets to given destination, a new route discovery process is to be initiated [5]. The DYMO protocol works with source routing, meaning nodes read the routing messages to acquire knowledge on the paths involved in the search process, as well as write in the search packet the necessary hops needed to reach its destination. This method clearly increases the size of the routing packets, with the intention of reducing the number of retransmissions. III. ATTACKS In MANET’s Due to dynamic, distributed infrastructure less nature of MANETs, and lack of centralized authority, the ad hoc networks are vulnerable to various kinds of attacks. The challenges to be faced by MANETs are over and above to those to be faced by the traditional wireless networks. The accessibility of the wireless channel to both the genuine user and attacker make the MANET susceptible to both passive eavesdroppers as well as active malicious attackers. The limited power backup and limited computational capability of the individual nodes hinders the implementation of complex security algorithms and key exchange mechanisms. There is always a possibility of a genuine trusted node to be compromised by the attackers and subsequently used to launch attacks on the network. Node mobility makes the network topology dynamic forcing frequent networking reconfiguration which creates more chances for attacks [6]. Layer wise attack is further categorized into five layers in which an active attack is one where the attacker modifies network packets while they are in transit, or sends forged network packets. Table 1: Layer wise categorization of attacks
  • 4. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 4 IV. AIS Artificial immune systems can be defined as abstract or metaphorical computational systems developed using ideas, theories, and components, extracted from the immune system. Most AIS aim at solving complex computational or engineering problems, such as pattern recognition, elimination, and optimization. This is a crucial distinction between AIS and theoretical immune system models. While the former is devoted primarily to computing, the latter is focused on the modelling of the IS in order to understand its behaviour, so that contributions can be made to the biological sciences. It is not exclusive, however, the use of one approach into the other and, indeed, theoretical models of the IS have contributed to the development of AIS [8]. There are various algorithm in AIS. Form all clonal selection is as: Clonal Selection Algorithm Immune Algorithm is derived through the study of immune response. In short, it models how antibodies of the immune system learn adaptively the features of the intruding antigen and act upon. Clonal Selection Algorithm is a special class of Artificial Immune Systems. The algorithm starts by defining a purpose function f(x) which needs to be optimized. Some possible candidate solutions are created, antibodies will be used in the purpose function to calculate their affinity and this will determine the ones which will be cloned for the next step. The cloned values are changed, mutated with a predefined ratio and the affinities are recalculated and sorted. V. PROPOSED WORK The existing DYMO protocol is not capable of handling any type of attack. It means the performance of the protocol gets degraded under attacks. The attacks at the network layer leads to the most degradation in the performance. Various network layer attacks are wormhole attack, black hole attack, gray hole attack, Sybil attack etc. Any external agent may disturb the nature of any particular node that leads to the routing disruption and results in degraded performance. The proposed work modifies the DYMO protocol and develops the AIS-DYMO protocol that is capable to handle the network layer attack. It means the performance of the network doesn’t get degraded under the attack. Various immune algorithms can be used to enhance the performance of the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network layer attacks by using the clonal selection immune algorithm. VI. PROPOSED ALGORITHM The working of the AIS-DYMO can be understood by the following algorithm: 1. Select S and D in the network of node N 2. Determine the routing path from S to D using the DYMO routing protocol. 3. If length of path average length path 4. Discard the path 5. go to step 2 6. end if 7. Mark each node in the routing path as antibody 8. When an antigen invades(attack occur) 9. Avdelay=0; 10. AVForwarding_ratio=0;
  • 5. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 5 11. For each node in the routing path say i 12. Avdelay=Avdelay+ current node delay 13. AVForwarding_ratio=AVForwarding_ratio +current node forwarding ratio 14. End 15. Avdelay=Avdelay/number of nodes in routing path 16. AVForwarding_ratio= AVForwarding_ratio/number of nodes in routing path. 17. For each node in the routing path say i 18. If forwarding ratioAVForwarding_ratio || delayAvdelay 19. Then mark node as antigen 20. End if 21. End for 22. Discard the antigen node 23. Go to step 2. The above algorithm is capable to handle various attacks. The attack which increases the delay or attract the data packet to pass through wrong path or the attack in which any node consumes all or some data packets. All of these attacks can be easily handled by using above algorithm. VII. RESULTS Table 2: Parameter analysis of AODV Table 3: Parameter analysis of DYMO Number of Nodes Packet delivery ratio Loss ratio End 2 End delay(ms) Throughput Routing Overhead 20 87.4575 0.1254252 3.47 440.27 0.16 40 84.3813 0.1561872 4.42 392.42 0.16 50 82.4872 0.1751275 5.52 320.68 0.16 100 80.1684 0.1983158 5.93 256.53 0.15 Number of Nodes Packet delivery ratio Loss ratio End 2 End delay(ms) Throughput Routing Overhead 20 91.6245 0.0428516 2.21 471.56 0.16 40 91.4112 0.0589323 3.33 441.84 0.16 50 91.3565 0.0766925 3.78 421.63 0.16 100 88.8025 0.0794268 4.03 410.05 0.13
  • 6. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME Table 4: Parameter Analysis of AIS-DYMO
  • 7. Figure 2: Comparison of PDR between AODV, DYMO, AIS-DYMO Figure 3: Comparison of Loss ratio between AODV, DYMO, AIS-DYMO 6
  • 8. Number of Nodes Packet delivery ratio Loss ratio E2 E delay(ms) Throughput Routing Overhead 20 98.1352 0.018648 1.61 663.37 0.16 40 97.7291 0.0227091 1.88 661.57 0.16 50 97.1422 0.0285782 2.19 662.25 0.16 100 96.1074 0.0389257 3.03 580.05 0.13
  • 9. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME Figure 4: Comparison of E2E Delay between AODV, DYMO, AIS-DYMO Figure 5: Comparison of Through put between AODV, DYMO, AIS-DYMO Figure 5: Comparison of Throughput between AODV, DYMO, AIS-DYMO 7
  • 10. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 7, July (2014), pp. 01-08 © IAEME 8 CONCLUSION This paper proposes AIS-DYMO algorithm and compare the performance of the of DYMO , AODV and AIS-DYMO protocol by using e2edelay, routing overhead, pdr and the throughput. The performance of the AIS-DYMO is better than the existing protocols. The improved PDR and throughput shows the better performance. In future the algorithm can be applied to handle other layer attacks. REFERENCES [1] Murthy, S. and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networksˇ, ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97. [2] M. Vijaya Lakshmi, Dr. S. Venkatachalam, “Comparative analysis of QoS routing protocols in MANETS: Unicast Multicast”, Volume 2, Issue 4, April 2012. [3] Gupta, M., Kaushik, S. (2012). Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS. International Journal Of Computational Engineering Research, 2(3), 704-711.. [4] Gupta, A. K., Kaur, J., Kaur, S. (2011). COMPARISON OF DYMO, AODV, DSR AND DSDV MANET ROUTING PROTOCOLS OVER VARYING TRAFFIC. International Journal of Research in Engineering Applied Science, 1(2), 71-83. [5] Martins, J. A. P., Correia, S. L. O., Celestino, J. (2010, April). Ant-DYMO: A bio-inspired algorithm for manets. In Telecommunications (ICT), 2010 IEEE 17th International Conference on (pp. 748-754). IEEE. [6] Agrawal, S., Jain, S., Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc networks. arXiv preprint arXiv:1105.5623. [7] Raghavendran, C. H. V., Satish, G. N., Varma, P. S. (2013). Security Challenges and Attacks in Mobile Ad Hoc Networks. [8] Forrest, S., Perelson, A. S., Allen, L., Cherukuri, R. (1994, May). Self-nonself discrimination in a computer. In 2012 IEEE Symposium on Security and Privacy (pp. 202-202). IEEE Computer Society. [9] Ulker, E. D., Ulker, S. (2012). Comparison Study for Clonal Selection Algorithm and Genetic Algorithm. arXiv preprint arXiv:1209.2717. [10] Sunita Kushwaha, Bhavna Narain, Deepti Verma and Sanjay kumar,, “Effect of Scenario Environment on the Performance of MANETS Routing Protocol: AODV”, International journal of Computer Engineering Technology (IJCET), Volume 2, Issue 1, 2011, pp. 33 - 38, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] R.Boopathi and R.Vishnupriya, “Performance Evaluation of AODV and OLSR in Vanet under Realistic Mobility Pattern”, International Journal of Electronics and Communication Engineering Technology (IJECET), Volume 4, Issue 2, 2013, pp. 58 - 71, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [12] Aarti Bairagi and Shweta Yadav, “A New Parameter Proposed for Route Selection in Routing Protocol for Manet”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 1, 2013, pp. 31 - 37, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413. [13] Parvinder and Dr. V.K. Suman, “A Review on Routing Protocol in Manet”, International Journal of Advanced Research in Engineering Technology (IJARET), Volume 4, Issue 5, 2013, pp. 243 - 250, ISSN Print: 0976-6480, ISSN Online: 0976-6499.