SlideShare a Scribd company logo
1 of 4
Download to read offline
Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04
www.ijera.com 1 | P a g e
Secured 7 Layer Security Architecture (S7LSA) For Mobile Ad
Hoc Network
Manu Srivastava1
, Saurabh Mishra2
, Upendra Kumar Soni3
, Shah Fahad4
(1
Assistant Professor, Sagar Group of Institutions, Barabanki, India)
(2, 3, 4
B. Tech (CSE), Sagar Group of Institutions, Barabanki, India)
Abstract
Mobile Ad hoc Networks (MANET) constitutes a group of wireless mobile nodes that transmit information
without any centralized control. MANETs are infrastructure-less and are dynamic in nature that is why; they
require peremptorily new set of networking approach to put through to provide efficacious and successful end-
to-end communication. The wireless and distributed nature of MANET poses a great challenge to system
security designers. Although security problems in MANET have attracted much attention in the last few
years, most research efforts have been focused on specific security areas, such as establishing trust
infrastructure, securing routing protocols, or intrusion detection and response, none of the previous work
proposes security solutions from a system architectural view. In this paper, we propose seven-layer security
architecture for mobile ad hoc networks. A general description of functionalities in each layer is given.
Keywords: MANET, SA, S7SLA, Trust
I. Introduction
A Mobile Ad Hoc Network [1] (MANET) is
a collection of wireless mobile nodes constituting an
impermanent/unstable network which has no fixed
infrastructure where all the nodes configure
themselves. In MANETs, changes in network
topology may dynamically occur in an unpredictable
manner since nodes have liberty to move anywhere
arbitrarily. Routing is an important part of MANETs
as it gives the better selection of paths. Thus they
require efficient routing protocols for providing better
communication. For any data communication packets
are transmitted in store and forward manner from a
source to destination with the help of intermediate
nodes.
The nature of ad hoc networks posses a great
challenge to system security designers due to the
following reasons [2]:
a. The wireless network is more susceptible to
attacks ranging from passive eavesdropping to
active interfering.
b. The lack of an online CA or Trusted Third Party
adds the difficulty to deploy security
mechanisms.
c. Mobile devices tend to have limited
power consumption and computation capabilities
which make it more vulnerable to Denial of
Service attacks and incapable to execute
computation-heavy algorithms like public key
algorithms.
d. In MANET, there are more probabilities for
trusted node being compromised and then being
used by adversary to launch attacks on
networks, in another word, we need to
consider both insider attacks and outsider
attacks in mobile ad hoc networks, in which
insider attacks are more difficult to deal with.
e. Node mobility enforces frequent networking
reconfiguration which creates more chances
for attacks, for example, it is difficult to
distinguish between stale routing information
and faked routing information.
Security has become a primary concern in
order to provide protected communication between
mobile nodes in a hostile environment and the
ultimate goal of the security solutions for
MANETs is to provide security services such as
Confidentiality, Integrity, Availability, Non-
Repudiation and Authentication, Authorization and
Anonymity [2].
1) Confidentiality ensures that Secret information
or data is never disclosed to unauthorized devices.
2) Integrity tells that a received message is not
corrupted.
3) Availability permits the survivability of network
services despite Denial-of-Service attacks.
4) Non-repudiation ensures that the sender of a
message cannot deny having sent the message.
5) Authentication enables a node to ensure the
identity of the Peer node it is communicating with.
6) Authorization is a process in which an entity is
issued a credential, which specifies the privileges
RESEARCH ARTICLE OPEN ACCESS
Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04
www.ijera.com 2 | P a g e
and permissions it has and cannot be falsified, by the
certificate authority.
MANET posses some security challenges
which are given below:
1) Channel Vulnerability: Broadcast Wireless
channels allow message Eavesdropping and Injection
easily.
2) Node Vulnerability: Nodes do not reside in
physically protected places, thus easily fall under
attack.
3) Absence of Infrastructure: Certification/
Authentication Authorities are absent.
4) Dynamically Changing Network Topology puts
security of routing protocols under threat.
5) Power and Computational Limitations prevent the
use of complex Encryption Algorithms.
II. Related Work
Trust Enhanced security Architecture for
MANET [3] (TEAM) has been already proposed for
the Mobile Ad Hoc Network, in which a trust model is
overlaid on other security models such as key
management mechanism, secure routing protocol, and
cooperation model to enhance the network security. In
this architecture, the trust model is designed to capture
the evidence of trustworthiness for other nodes from
the key management mechanism, secure routing
protocol, and cooperation model without introducing
further issues such as honest-elicitation, free-riding,
and recommender’s bias. The trust model enhances
the security decisions of the above security models
depending on the predefined policies and collected
evidence. The secure routing protocol is utilized to
discover secure paths and to protect communications
through the secret associations established and
maintained by the key management mechanism. In
our architecture, the secure routing protocol forwards
evidence for fabrication and modification attacks to
the trust model, and in return takes advantage of the
trust model’s feedback to make better routing
decisions. Although the key management mechanism
does not forward any evidence to the trust model, it
relies on the trust model’s feedback to dynamically
manage the keys. The cooperation model in our
architecture differs from related models [4, 5] by
defending against both flooding and packet drop
attacks. Similar to other security models, it forwards
evidence to the trust model, and takes advantage of
the trust model's feedback to decide whether to
forward a packet on behalf of other nodes. In
summary, the proposed Trust Enhanced security
Architecture for MANET (TEAM) extends our
previous work, Trust Integrated Cooperation
Architecture [6] so that it not only assists security
models such as key management mechanism,
secure routing protocol, and cooperation model to
make better decisions, but also enables them to
handle the dynamic behaviours of nodes. Hence,
Secure MANET Routing with Trust Intrigue
(SMRTI) [7, 8], and fellowship [9, 10] are chosen
for trust and cooperation models respectively.
In this paper, we have proposed the seven
layer security solution namely S7SLA using Trust
architecture for the Mobile Ad Hoc Network.
III. S7SLA Model
In this model, we have used the already
existing trust model for security of Mobile Ad Hoc
networks and further added few layers to design a
secured seven layer security architecture for the
mobile Ad Hoc networks so that it can be more
convenient the to secure the MANETs. This model
consist of seven layers namely Co-operation model
(fellowship), Routing Security, Key Management
Mechanism, Overlay Trust Model, Communication
Security, Network Security and End to End
Security. The description of these seven layers is
given below:
a. Secured Layer 1-Co-operation model
(fellowship): Fellowship model defends
against both flooding and packet drop attacks
by adopting obligation-based approach, in
which nodes are enforced to share the
communication channel and forward packets
for other nodes in turn to receive similar
network services from them.
b. Secured Layer 2- Routing Security: This
implies the security features applied on the
routing protocols. In MANET, nodes exchange
the information about their knowledge of
neighbour node connectivity and construct a
view of the network topology so that they can
route the data packets to the correct
destinations. Every node is required to
participate in the routing activity and routing is
an important part to keep the network
connected.
c. Secured Layer 3- Key Management
Mechanism: Key Management mechanisms
are used to discover secure paths and protect
subsequent communication.
d. Secured Layer 4- Overlay Trust Model: This
assists the security models in making decisions
for the following contexts such as whether to
accept or reject a route from a route discovery,
Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04
www.ijera.com 3 | P a g e
record or ignore a route from a forwarded packet,
to forward or discard a packet, to forward a
packet for a previous hop, to send a packet to a
next-hop, refresh or revoke the key for a node,
and which route to choose for the communication.
e. Secured Layer 5- Communication Security:
This refers to security mechanism applied in
transmitting data frames in a node to node
manner, such as security protocol WEP working
in data link layer in OSI or physical protection
mechanism like frequency hopping. Security
mechanism deployed in this layer may keep
data frame from eavesdropping, interception,
alteration or dropping from unauthorized party
along the route from the source to destination.
END TO END SECURITY
NETWORK SECURITY
COMMUNICATION SECURITY
OVERLAY TRUST MODEL
KEY MANAGEMENT MECHANISM
CO-OPERATION MODEL (Fellowship)
Fig: S7SLA Model
f. Secured Layer 6- Network Security: This refers
to the security mechanism used by the network
protocols which perform sub-network access
from end system to end system. For example we
can achieve the security services like peer entity
authentication, confidentiality and integrity as the
network layer security protocol IPsec provides,
another example is SMT mechanism from [8].
g. Secured Layer 7- End to End Security: This
refers end system security such as SSL, SSH
and any application specific security protocol.
The security protocol in this layer is
independent of the underlying networking
topology since the related security mechanism
ROUTING SECURITY
Basic Routing
Protocol (DSR)
Secure Routing
Protocol
Security Layer 7
Security Layer 6
Security Layer 5
Security Layer 4
Security Layer 3
Security Layer 2
Security Layer 1
Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04
www.ijera.com 4 | P a g e
are restricted to only intended parties. The
provision of any security service in this layer is
highly dependent upon security requirements
related to specific applications.
IV. Conclusion
In this paper, we have taken action towards
the security issues Mobile Ad hoc network. We have
analyzed the previously existing architectures to
enhance the security mechanism applied on them and
designed a new secured architecture for the Mobile
Ad hoc networks to make it highly secure. We have
created the seven layer architecture to formulate the
plan making MANET more reliable.
V. Future Work
In this paper, we have designed the seven
layers for providing different security services. We
have only given the content conception that how we
can secure the MANET in seven different ways. This
architecture can be further implemented to apply these
security mechanisms on Mobile Ad hoc network.
References
[1] Charles E. Perkins, “Ad-Hoc Networking”,
Addision Wesley, 2001.
[2] Ankit Jain, Arnika Jain, Pramod Kumar
Sagar, “Various Security Attacks and Trust
based Security Architecture for MANET”,
Global Journal of Computer Science and
Technology, Vol. 10, issue 14, November
2010.
[3] Balakrishnan, V. Varadharajan, U. K.
Tupakula, and P.Lucs, "Trust Integrated
Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE
International Symposium on Wireless
Communication Systems (ISWCS 2007),
Trondheim, Norway, 2007.
[4] L. Buttyan and J. Hubaux, "Nuglets: A
Virtual Currency to Stimulate Cooperation in
Self-organized Ad hoc Networks". Swiss
Federal Institute of Technology, Lausanne
DSC/2001/001, 2001.
[5] S. Zhong, J. Chen, and Y. R. Yang,
"Sprite: A Simple, Cheat-proof, Credit-
based System for Mobile Ad-hoc
Networks". INFOCOM 2003, pp. 1987 -
1997, 2003.
[6] S. Yan Lindsay, Y. Wei, H. Zhu and K. J.
R. Liu, "Information Theoretic
Framework of Trust Modeling and
Evaluation for Ad Hoc Networks". IEEE
Journal on Selected Areas in
Communications, 24(2), pp. 305-317,
2006
[7] V. Balakrishnan, V. Varadharajan, P.
Lucs, and U. K. Tupakula, "Trust
Enhanced Secure Mobile Ad hoc Network
Routing". Proceedings of 21st
IEEE
International Conference on Advanced
Information Networking and Applications
Workshops (AINAW 2007), Canada, pp.
27-33, 2007
[8] V. Balakrishnan, V. Varadharajan, U. K.
Tupakula, and P. Lucs, "Trust and
Recommendations in Mobile Ad hoc
Networks". Proceedings of 3rd
International Conference on Networking
and Services (ICNS 2007), Athens,
Greece, pp. 64-69, 2007.
[9] V. Balakrishnan, and V. Varadharajan,
"Fellowship in Mobile Ad hoc Networks".
Proceedings of 1st IEEE International
Conference on Security and Privacy for
Emerging Areas in Communications
Networks (Secure Comm. 2005), Athens,
Greece, pp. 225-227, 2005.
[10] L Zhou and Z Hass, “Securing Ad hoc
networks”, IEEE network, vol 13, no. 6,
pp 24-30, 1999

More Related Content

What's hot

Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksZainab Nayyar
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET Journal
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Secon2007 bsmr
Secon2007 bsmrSecon2007 bsmr
Secon2007 bsmrchandan_v8
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
 

What's hot (19)

Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN Security
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
G041124047
G041124047G041124047
G041124047
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Secon2007 bsmr
Secon2007 bsmrSecon2007 bsmr
Secon2007 bsmr
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETA REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANET
 

Viewers also liked

Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentIJERA Editor
 
Memristor Modeling Using PSPICE
Memristor Modeling Using PSPICEMemristor Modeling Using PSPICE
Memristor Modeling Using PSPICEIJERA Editor
 
Tree Based Mining for Discovering Patterns of Human Interactions in Meetings
Tree Based Mining for Discovering Patterns of Human Interactions in MeetingsTree Based Mining for Discovering Patterns of Human Interactions in Meetings
Tree Based Mining for Discovering Patterns of Human Interactions in MeetingsIJERA Editor
 
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...IJERA Editor
 
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...IJERA Editor
 
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...IJERA Editor
 
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...IJERA Editor
 
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm Technology
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm TechnologyComparative Study of CMOS Op-Amp In 45nm And 180 Nm Technology
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm TechnologyIJERA Editor
 
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...IJERA Editor
 
Comparison of Multilevel Inverter Topologies for STATCOM Applications
Comparison of Multilevel Inverter Topologies for STATCOM ApplicationsComparison of Multilevel Inverter Topologies for STATCOM Applications
Comparison of Multilevel Inverter Topologies for STATCOM ApplicationsIJERA Editor
 
Presentacion Diario de Gestion SD08
Presentacion Diario de Gestion SD08Presentacion Diario de Gestion SD08
Presentacion Diario de Gestion SD08Eduardo Betas
 
Noticias Cnt Malaga
Noticias Cnt MalagaNoticias Cnt Malaga
Noticias Cnt Malagaguest5c336a
 

Viewers also liked (20)

F0442935
F0442935F0442935
F0442935
 
Aa04405152157
Aa04405152157Aa04405152157
Aa04405152157
 
Bt044436441
Bt044436441Bt044436441
Bt044436441
 
Bq044417425
Bq044417425Bq044417425
Bq044417425
 
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
Memristor Modeling Using PSPICE
Memristor Modeling Using PSPICEMemristor Modeling Using PSPICE
Memristor Modeling Using PSPICE
 
Tree Based Mining for Discovering Patterns of Human Interactions in Meetings
Tree Based Mining for Discovering Patterns of Human Interactions in MeetingsTree Based Mining for Discovering Patterns of Human Interactions in Meetings
Tree Based Mining for Discovering Patterns of Human Interactions in Meetings
 
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
 
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...
Conceptual Cost Estimate of Libyan Highway Projects Using Artificial Neural N...
 
D49032225
D49032225D49032225
D49032225
 
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
 
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...
Sanitation Coverage And Impact Of Open Defecation Free (ODF) Zone With Specia...
 
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm Technology
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm TechnologyComparative Study of CMOS Op-Amp In 45nm And 180 Nm Technology
Comparative Study of CMOS Op-Amp In 45nm And 180 Nm Technology
 
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...
Experimental Analysis of a Producer Gas Generated by a Chir Pine Needle (Leaf...
 
Comparison of Multilevel Inverter Topologies for STATCOM Applications
Comparison of Multilevel Inverter Topologies for STATCOM ApplicationsComparison of Multilevel Inverter Topologies for STATCOM Applications
Comparison of Multilevel Inverter Topologies for STATCOM Applications
 
Presentacion Diario de Gestion SD08
Presentacion Diario de Gestion SD08Presentacion Diario de Gestion SD08
Presentacion Diario de Gestion SD08
 
Feliz dia
Feliz diaFeliz dia
Feliz dia
 
Noticias Cnt Malaga
Noticias Cnt MalagaNoticias Cnt Malaga
Noticias Cnt Malaga
 

Similar to A44080104

Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKSAN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKScscpconf
 
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...IJNSA Journal
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 

Similar to A44080104 (20)

Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
ant2
ant2ant2
ant2
 
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKSAN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
 
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
 
40120140506010
4012014050601040120140506010
40120140506010
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
A017320105
A017320105A017320105
A017320105
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

A44080104

  • 1. Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04 www.ijera.com 1 | P a g e Secured 7 Layer Security Architecture (S7LSA) For Mobile Ad Hoc Network Manu Srivastava1 , Saurabh Mishra2 , Upendra Kumar Soni3 , Shah Fahad4 (1 Assistant Professor, Sagar Group of Institutions, Barabanki, India) (2, 3, 4 B. Tech (CSE), Sagar Group of Institutions, Barabanki, India) Abstract Mobile Ad hoc Networks (MANET) constitutes a group of wireless mobile nodes that transmit information without any centralized control. MANETs are infrastructure-less and are dynamic in nature that is why; they require peremptorily new set of networking approach to put through to provide efficacious and successful end- to-end communication. The wireless and distributed nature of MANET poses a great challenge to system security designers. Although security problems in MANET have attracted much attention in the last few years, most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response, none of the previous work proposes security solutions from a system architectural view. In this paper, we propose seven-layer security architecture for mobile ad hoc networks. A general description of functionalities in each layer is given. Keywords: MANET, SA, S7SLA, Trust I. Introduction A Mobile Ad Hoc Network [1] (MANET) is a collection of wireless mobile nodes constituting an impermanent/unstable network which has no fixed infrastructure where all the nodes configure themselves. In MANETs, changes in network topology may dynamically occur in an unpredictable manner since nodes have liberty to move anywhere arbitrarily. Routing is an important part of MANETs as it gives the better selection of paths. Thus they require efficient routing protocols for providing better communication. For any data communication packets are transmitted in store and forward manner from a source to destination with the help of intermediate nodes. The nature of ad hoc networks posses a great challenge to system security designers due to the following reasons [2]: a. The wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering. b. The lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms. c. Mobile devices tend to have limited power consumption and computation capabilities which make it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms. d. In MANET, there are more probabilities for trusted node being compromised and then being used by adversary to launch attacks on networks, in another word, we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with. e. Node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment and the ultimate goal of the security solutions for MANETs is to provide security services such as Confidentiality, Integrity, Availability, Non- Repudiation and Authentication, Authorization and Anonymity [2]. 1) Confidentiality ensures that Secret information or data is never disclosed to unauthorized devices. 2) Integrity tells that a received message is not corrupted. 3) Availability permits the survivability of network services despite Denial-of-Service attacks. 4) Non-repudiation ensures that the sender of a message cannot deny having sent the message. 5) Authentication enables a node to ensure the identity of the Peer node it is communicating with. 6) Authorization is a process in which an entity is issued a credential, which specifies the privileges RESEARCH ARTICLE OPEN ACCESS
  • 2. Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04 www.ijera.com 2 | P a g e and permissions it has and cannot be falsified, by the certificate authority. MANET posses some security challenges which are given below: 1) Channel Vulnerability: Broadcast Wireless channels allow message Eavesdropping and Injection easily. 2) Node Vulnerability: Nodes do not reside in physically protected places, thus easily fall under attack. 3) Absence of Infrastructure: Certification/ Authentication Authorities are absent. 4) Dynamically Changing Network Topology puts security of routing protocols under threat. 5) Power and Computational Limitations prevent the use of complex Encryption Algorithms. II. Related Work Trust Enhanced security Architecture for MANET [3] (TEAM) has been already proposed for the Mobile Ad Hoc Network, in which a trust model is overlaid on other security models such as key management mechanism, secure routing protocol, and cooperation model to enhance the network security. In this architecture, the trust model is designed to capture the evidence of trustworthiness for other nodes from the key management mechanism, secure routing protocol, and cooperation model without introducing further issues such as honest-elicitation, free-riding, and recommender’s bias. The trust model enhances the security decisions of the above security models depending on the predefined policies and collected evidence. The secure routing protocol is utilized to discover secure paths and to protect communications through the secret associations established and maintained by the key management mechanism. In our architecture, the secure routing protocol forwards evidence for fabrication and modification attacks to the trust model, and in return takes advantage of the trust model’s feedback to make better routing decisions. Although the key management mechanism does not forward any evidence to the trust model, it relies on the trust model’s feedback to dynamically manage the keys. The cooperation model in our architecture differs from related models [4, 5] by defending against both flooding and packet drop attacks. Similar to other security models, it forwards evidence to the trust model, and takes advantage of the trust model's feedback to decide whether to forward a packet on behalf of other nodes. In summary, the proposed Trust Enhanced security Architecture for MANET (TEAM) extends our previous work, Trust Integrated Cooperation Architecture [6] so that it not only assists security models such as key management mechanism, secure routing protocol, and cooperation model to make better decisions, but also enables them to handle the dynamic behaviours of nodes. Hence, Secure MANET Routing with Trust Intrigue (SMRTI) [7, 8], and fellowship [9, 10] are chosen for trust and cooperation models respectively. In this paper, we have proposed the seven layer security solution namely S7SLA using Trust architecture for the Mobile Ad Hoc Network. III. S7SLA Model In this model, we have used the already existing trust model for security of Mobile Ad Hoc networks and further added few layers to design a secured seven layer security architecture for the mobile Ad Hoc networks so that it can be more convenient the to secure the MANETs. This model consist of seven layers namely Co-operation model (fellowship), Routing Security, Key Management Mechanism, Overlay Trust Model, Communication Security, Network Security and End to End Security. The description of these seven layers is given below: a. Secured Layer 1-Co-operation model (fellowship): Fellowship model defends against both flooding and packet drop attacks by adopting obligation-based approach, in which nodes are enforced to share the communication channel and forward packets for other nodes in turn to receive similar network services from them. b. Secured Layer 2- Routing Security: This implies the security features applied on the routing protocols. In MANET, nodes exchange the information about their knowledge of neighbour node connectivity and construct a view of the network topology so that they can route the data packets to the correct destinations. Every node is required to participate in the routing activity and routing is an important part to keep the network connected. c. Secured Layer 3- Key Management Mechanism: Key Management mechanisms are used to discover secure paths and protect subsequent communication. d. Secured Layer 4- Overlay Trust Model: This assists the security models in making decisions for the following contexts such as whether to accept or reject a route from a route discovery,
  • 3. Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04 www.ijera.com 3 | P a g e record or ignore a route from a forwarded packet, to forward or discard a packet, to forward a packet for a previous hop, to send a packet to a next-hop, refresh or revoke the key for a node, and which route to choose for the communication. e. Secured Layer 5- Communication Security: This refers to security mechanism applied in transmitting data frames in a node to node manner, such as security protocol WEP working in data link layer in OSI or physical protection mechanism like frequency hopping. Security mechanism deployed in this layer may keep data frame from eavesdropping, interception, alteration or dropping from unauthorized party along the route from the source to destination. END TO END SECURITY NETWORK SECURITY COMMUNICATION SECURITY OVERLAY TRUST MODEL KEY MANAGEMENT MECHANISM CO-OPERATION MODEL (Fellowship) Fig: S7SLA Model f. Secured Layer 6- Network Security: This refers to the security mechanism used by the network protocols which perform sub-network access from end system to end system. For example we can achieve the security services like peer entity authentication, confidentiality and integrity as the network layer security protocol IPsec provides, another example is SMT mechanism from [8]. g. Secured Layer 7- End to End Security: This refers end system security such as SSL, SSH and any application specific security protocol. The security protocol in this layer is independent of the underlying networking topology since the related security mechanism ROUTING SECURITY Basic Routing Protocol (DSR) Secure Routing Protocol Security Layer 7 Security Layer 6 Security Layer 5 Security Layer 4 Security Layer 3 Security Layer 2 Security Layer 1
  • 4. Manu Srivastava et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 7), April 2014, pp.01-04 www.ijera.com 4 | P a g e are restricted to only intended parties. The provision of any security service in this layer is highly dependent upon security requirements related to specific applications. IV. Conclusion In this paper, we have taken action towards the security issues Mobile Ad hoc network. We have analyzed the previously existing architectures to enhance the security mechanism applied on them and designed a new secured architecture for the Mobile Ad hoc networks to make it highly secure. We have created the seven layer architecture to formulate the plan making MANET more reliable. V. Future Work In this paper, we have designed the seven layers for providing different security services. We have only given the content conception that how we can secure the MANET in seven different ways. This architecture can be further implemented to apply these security mechanisms on Mobile Ad hoc network. References [1] Charles E. Perkins, “Ad-Hoc Networking”, Addision Wesley, 2001. [2] Ankit Jain, Arnika Jain, Pramod Kumar Sagar, “Various Security Attacks and Trust based Security Architecture for MANET”, Global Journal of Computer Science and Technology, Vol. 10, issue 14, November 2010. [3] Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim, Norway, 2007. [4] L. Buttyan and J. Hubaux, "Nuglets: A Virtual Currency to Stimulate Cooperation in Self-organized Ad hoc Networks". Swiss Federal Institute of Technology, Lausanne DSC/2001/001, 2001. [5] S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A Simple, Cheat-proof, Credit- based System for Mobile Ad-hoc Networks". INFOCOM 2003, pp. 1987 - 1997, 2003. [6] S. Yan Lindsay, Y. Wei, H. Zhu and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks". IEEE Journal on Selected Areas in Communications, 24(2), pp. 305-317, 2006 [7] V. Balakrishnan, V. Varadharajan, P. Lucs, and U. K. Tupakula, "Trust Enhanced Secure Mobile Ad hoc Network Routing". Proceedings of 21st IEEE International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), Canada, pp. 27-33, 2007 [8] V. Balakrishnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, "Trust and Recommendations in Mobile Ad hoc Networks". Proceedings of 3rd International Conference on Networking and Services (ICNS 2007), Athens, Greece, pp. 64-69, 2007. [9] V. Balakrishnan, and V. Varadharajan, "Fellowship in Mobile Ad hoc Networks". Proceedings of 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (Secure Comm. 2005), Athens, Greece, pp. 225-227, 2005. [10] L Zhou and Z Hass, “Securing Ad hoc networks”, IEEE network, vol 13, no. 6, pp 24-30, 1999