SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 40
Paper Publications
EAASR: Enhanced AASR Protocol to Reduce
Traffic and Eliminate the Malicious Node in the
Adversary Environment
Aida Andrews
M.G University, Kottayam, Kerala, India
Abstract: Mobile ad hoc networks (MANETs) are self-organizing the mobile nodes. It placed in adversary
environments and it is vulnerable to security threats due to the characteristics of such networks. The main
requirement on the networks is to provide unidentifiability and unlinkability for mobile networks. The existing
protocols are not fully satisfied in this requirements. In this paper propose a new routing protocol that is enhanced
authenticated anonymous secure routing (EAASR), to satisfy the unidentifiability and unlinkability. The new
protocol provides less delay as compared with other protocol.
Keywords: Anonymous routing, group elliptical signature, mobile ad hoc networks (MANETs).
I. INTRODUCTION
Mobile ad-hoc networks (MANETs) are self-configuring, infrastructural less networks, it deployed in adversary
environments. Ad hoc wireless network is a temporary and dynamic environment where a group of mobile nodes with
radio frequency transceivers communicate with each other without the intervention of any centralized administration or
established infrastructure. Due to the limited transmission range of each mobile node, communication sessions between
two nodes are usually established through a number of intermediate nodes, which are supposed to be willing to cooperate
while forwarding the messages they receive to their destination. Unfortunately, some of these intermediate nodes might
not be trustworthy and might be malicious, thereby forming a threat to the security and confidentiality of the exchanged
data between the mobile nodes. While data encryption can protect the content exchanged between nodes, analysis of
communication patterns may reveal valuable information about end users and their relationships. Using anonymous paths
for communication provides security and privacy against traffic analysis. To establish these anonymous paths, in a
traditional wired network, nodes build a global view of the network by exchanging routing information, whereas in an ad
hoc wireless network, building this global view is not an option.
MANETs are vulnerable to security threats due to the basic characteristics of mobile nodes. A major requirement of this
network is to provide unlinkability and unidentifiability for mobile nodes and their networks. Many of the anonymous
secure routing protocols have been proposed, but the requirement of these protocols is not completely satisfied. Generally
MANETs in adversarial environments focused in on-demand anonymous routing protocols. The commonly used on-
demand routing protocols are ad-hoc on-demand distance vector (AODV) and dynamic source routing protocol (DSR).
The anonymous security functions are established in source, destination and intermediate nodes in the routing path. The
another on-demand routing protocol is anonymous on-demand routing in mobile ad hoc network (ANODR). ANODR
provides route anonymity and location privacy. These routing protocols are not completely satisfied in many applications.
So the enhanced authenticated anonymous secure routing protocol is to reduce traffic and eliminate the malicious nodes in
the adversary environment. EAASR is to satisfy the requirement and defend against the attacks. The route request packets
are authenticated by a group elliptical curve to defend against attacks without unveiling the node identity. EAASR
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 41
Paper Publications
provide better security mechanisms as compared with authenticated anonymous secure routing for MANETs. Enhanced
authenticated anonymous secure routing protocol which guarantees security, its reduced end-to-end delay and high
reliability of the established route in adversarial environment, such as ad hoc wireless network, by encrypting routing
packet abstaining from using unreliable intermediate node. The key encrypted onion routing is also used with a route
secret verification message is designed to prevent intermediate nodes from inferring a real destination. Simulation results
have demonstrated the effectiveness of the proposed EAASR protocol with improved performance as compared with the
existing protocols. In enhanced authenticated anonymous secure routing (EAASR) is misinterpreting the attackers to
attacks the nodes. The EAASR networks nodes communicate with each other nodes using dummy nodes. It dummy node
use small energy as compared with AASR. The malicious node misunderstood the real communicating path between
source and destination, because of the neighbourhood communication of dummy nodes. It provides efficient transmission
and improves the reliability of the networks. But the real communication was already established in between the source
and destination trough the reliable path using secured intermediate node. This path does not identifying the attackers due
to anonymity protocols.
II. BACKGROUND AND RELATED WORK
Here introduce some basic concepts in anonymous routing protocols that are trapdoor, onion routing and group elliptical
curve signature.
1) Trapdoor: Trapdoor is a one way function between the two neighboring nodes. It is one of the information collection
mechanisms. The information’s are node identity, destination identity and intermediate identities in to the trapdoor. The
intermediate nodes may add information’s into the trapdoor; the particular source or destination nodes retrieve the
information’s. Its provide end-to-end security mechanisms.
2) Onion Routing: Its onion routing provides private communication s over public networks. The source node transmitting
the information’s to destination through the intermediate nodes. Then each node decrypting to identifying the destination,
but each node add the encrypted layer to this packets and transmitting another nodes. Then the destination node retrieve
the information’s and send its backs to source node.
3) Group Elliptical Curve: The elliptic curve is used to solve to two cryptographic problems, factoring integers and
constructing public-key cryptosystems. Elliptic curves are believed to provide good security with smaller key sizes,
something that is very useful in many applications.
III. PROTOCOL DESIGN
Here, present the design of the EAASR on-demand ad hoc routing protocols. It’s completely depends on on-demand
protocols because this new method is does not depending on tables. Its avoid the tables such as destination table,
neighbourhood tables, routing tables and forwarding tables. The source node broadcast the route request (RREQ) in the
networks and the destination nodes receives the RREQ and send its route reply as RREP. To protecting the security or
anonymity when exchange the path of continuously. The three phases of communications are route discovery, data
transmission, and route maintenance. For example, use a five node network [1] shown in figure 1(as refer in the previous
paper), the source node S and its destination node D.
Fig.1. Network topology
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 42
Paper Publications
A. Anonymous Route Request:
1. Source Node: The source node broadcast the RREQ packets through the dummy node to all other nodes. The corrects
messages is only decrypting the destination node D. S broadcast the information packets in the format is
S→*: [RREQ, NSQ,VD,VSD, Onion(S)] GES- (1)
Where the RREQ is the packet-type identifier, Nsq is a sequence number, VD is an encrypted message at the destination
node, VSD is an encrypted message at the intermediate node, and onion(S) is a key-encrypted onion created by S. This
RREQ packets is signed by S with its group elliptical private key GES-
2. Intermediate Node: The RREQ packet receives the intermediate node I from source node S. The node I decrypt the
packet, and its understood that I is not the destination of this packet. Then again it retransmitting the packet to other node
of this format is
I→* : [RREQ, Nsq, VD, VSD, Onion(I)] GEI- (2)
3. Destination Node: The RREQ packet reaches the destination D, D validates its intermediate node I or J. The destination
node can decrypt the packets and its identifying that this node is the destination of this packets.
B. Anonymous Route Reply:
1) Destination Node: The node D receives the RREQ from its neighbor node J, the RREP packet and send it back to J.
The route reply format [1] is
D→* : ( RREQ, Nrt, <KV, Onion(J)> KJD) (3)
Where RREP is the packet-type identifier, Nrt is the route pseudonym generated by D, and Kv and Onion(J) are obtained
from the original RREQ and encrypted by the shared key KJD.
2) Intermediate Node : The intermediate node J has already communicate with other nodes I ,D and M. J ,s RREP reply
towards the previous hop I in the format is
J→* : (RREQ, Nrt, < KV,Onion(I)> KI J) (4)
C. Data Transmission:
The source node can transmit the data to the destination node D. The format of the data packet is given below
S→ D : (DATA, Nrt,<Pdata> KSD ) (5)
Where DATA is the packet type, Nrt is the route pseudonym, and the data payload is denoted by Pdata, which is encrypted
by the session key KSD.
IV. PROTOCOL EVALUATION
The proposed EAASR protocol in ns-2 by extending the AASR module to support the cryptographic operations. We
compare the performances of EAASR to those of AASR, ANODR and AODV in various mobility and adversarial
scenarios. Two groups of simulation results are presented here. The first group is to compare the routing performances of
AASR AODV, ANODR, and EAASR under different mobility scenarios. The second group is to compare their behaviors
under the packet-dropping attacks with different levels. Perform five simulation runs for each configuration and record the
per-flow performances, including throughput, packet loss ratio, and end-to-end delay. The effect of malicious attacks
EAASR achieves 2% less loss ratio than AASR in average. The average performance of different runs is presented as
follows.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 43
Paper Publications
(a) (b) (c)
Fig. 2. Performance comparison under different mobility settings (a) Per-flow throughput(b) Packet loss ratio(c) End-To-End
Delay
V. CONCLUSION
In EAASR has improving the efficiency in the terms of route changes. One possible extension is to provide the
functionality of repairing broken routes locally without compromising anonymity and security, dynamically partitions the
network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable
anonymous route. In addition, it hides the data initiator or receiver among many initiators/receivers to strengthen source
and destination anonymity protection. Thus, EAASR offers anonymity protection to sources, destinations, and routes. It
also has strategies to effectively counter intersection and timing attacks.
Future work will aims at improving the secured nodes, that means in our enhanced routing protocol such as EAASR only
use the secured and shortest path, and avoiding the unwanted nodes in the networks. In improving the anonymity, the
avoiding nodes in the networks are rechecking their security and participating the communication networks.
REFERENCES
[1] Wei Liu, and Ming Yu,” AASR: Authenticated anonymous secure routing for MANETs in Adversarial
environments,” in IEEE Trans. vehicular technology, vol.63, no.9, pp.4585-4583, nov.2014
[2] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” IETF RFC
3561, Jul. 2003. [Online]. Available: www.ietf.org/rfc/rfc3561.txt
[3] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc. CRYPTO, Aug. 2004, pp. 41–55.
[4] D. Johnson, Y. Hu, and D. Maltz, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for
IPv4,” IETFRFC4728, Feb. 2007. [Online]. Available: www.ietf.org/rfc/rfc4728.txt
[5] J. Kong and X. Hong, “ANODR: ANonymous on demand routing with untraceable routes for mobile ad hoc
networks,” in Proc. ACM MobiHoc, Jun. 2003, pp. 291–302.
[6] J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and ondemand routing scheme against anonymity
threats in mobile ad hoc networks,” IEEE Trans. Mobile Comput., vol. 6, no. 8, pp. 888–902, Aug. 2007.
[7] Y. Zhang, W. Liu, and W. Lou, “Anonymous communications in mobile ad hoc networks,” in Proc. IEEE
INFOCOM, Mar. 2005, vol. 3, pp. 1940–1951.
[8] K. E. Defrawy and G. Tsudik, “Privacy-preserving location-based on-demand routing in MANETs,” IEEE J. Sel.
Areas Commun., vol. 29, no. 10, pp. 1926–1934, Dec. 2011.
[9] M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous connections and onion routing,” IEEE J. Sel.
Areas Commun., vol. 16, no. 4, pp. 482–494, May 1998.
[10] M. Yu and K. Leung, “A trustworthiness-based QoS routing protocol for ad hoc networks,” IEEE Trans.Wireless
Commun., vol. 8, no. 4, pp. 1888– 1898, Apr. 2009.

More Related Content

What's hot

Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
Cv31424430
Cv31424430Cv31424430
Cv31424430IJMER
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using keyijfcstjournal
 

What's hot (16)

Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
K1803036872
K1803036872K1803036872
K1803036872
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
01438360
0143836001438360
01438360
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 
Aj33201205
Aj33201205Aj33201205
Aj33201205
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using key
 

Viewers also liked

Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...paperpublications3
 
Island peak climbing expedition – a thrilling experience in itself
Island peak climbing expedition – a thrilling experience in itselfIsland peak climbing expedition – a thrilling experience in itself
Island peak climbing expedition – a thrilling experience in itselfNepal Holidaytreks
 
Um660 Hidden Magnetic GPS Tracker For Car user manual
Um660 Hidden Magnetic GPS Tracker For Car user manualUm660 Hidden Magnetic GPS Tracker For Car user manual
Um660 Hidden Magnetic GPS Tracker For Car user manualrobin huang
 
Advantages of Customer Relationship Management
Advantages of Customer Relationship ManagementAdvantages of Customer Relationship Management
Advantages of Customer Relationship ManagementSadia Yasmeen
 
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017Dung Hoang Seothetop
 
2.4.7 Удлинители и сетевые фильтры
2.4.7 Удлинители и сетевые фильтры2.4.7 Удлинители и сетевые фильтры
2.4.7 Удлинители и сетевые фильтрыIgor Golovin
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstractionpaperpublications3
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environmentpaperpublications3
 
Solar powered gps tracker for pets and hidden cost user manual
Solar powered gps tracker for pets and hidden cost user manualSolar powered gps tracker for pets and hidden cost user manual
Solar powered gps tracker for pets and hidden cost user manualrobin huang
 
Cloud computing implementation practically using vmware
Cloud computing implementation practically using vmwareCloud computing implementation practically using vmware
Cloud computing implementation practically using vmwaresameer sardar
 
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGEINPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGEpaperpublications3
 
Automatic Conversion of 2D Image into 3D Image
Automatic Conversion of 2D Image into 3D ImageAutomatic Conversion of 2D Image into 3D Image
Automatic Conversion of 2D Image into 3D Imagepaperpublications3
 
Bản tin số 2 - Dự án DRM
Bản tin số 2 - Dự án DRMBản tin số 2 - Dự án DRM
Bản tin số 2 - Dự án DRMThành Nguyễn
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...paperpublications3
 

Viewers also liked (16)

Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
 
Island peak climbing expedition – a thrilling experience in itself
Island peak climbing expedition – a thrilling experience in itselfIsland peak climbing expedition – a thrilling experience in itself
Island peak climbing expedition – a thrilling experience in itself
 
Um660 Hidden Magnetic GPS Tracker For Car user manual
Um660 Hidden Magnetic GPS Tracker For Car user manualUm660 Hidden Magnetic GPS Tracker For Car user manual
Um660 Hidden Magnetic GPS Tracker For Car user manual
 
Advantages of Customer Relationship Management
Advantages of Customer Relationship ManagementAdvantages of Customer Relationship Management
Advantages of Customer Relationship Management
 
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017
Chiến lược seo simantic, kế hoạch seo hoàn hảo năm 2017
 
2.4.7 Удлинители и сетевые фильтры
2.4.7 Удлинители и сетевые фильтры2.4.7 Удлинители и сетевые фильтры
2.4.7 Удлинители и сетевые фильтры
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 
Solar powered gps tracker for pets and hidden cost user manual
Solar powered gps tracker for pets and hidden cost user manualSolar powered gps tracker for pets and hidden cost user manual
Solar powered gps tracker for pets and hidden cost user manual
 
TechnicalReport
TechnicalReportTechnicalReport
TechnicalReport
 
Cloud computing implementation practically using vmware
Cloud computing implementation practically using vmwareCloud computing implementation practically using vmware
Cloud computing implementation practically using vmware
 
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGEINPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE
INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE
 
Automatic Conversion of 2D Image into 3D Image
Automatic Conversion of 2D Image into 3D ImageAutomatic Conversion of 2D Image into 3D Image
Automatic Conversion of 2D Image into 3D Image
 
Bản tin số 2 - Dự án DRM
Bản tin số 2 - Dự án DRMBản tin số 2 - Dự án DRM
Bản tin số 2 - Dự án DRM
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
 

Similar to EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious Node in the Adversary Environment

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired prjpublications
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
 

Similar to EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious Node in the Adversary Environment (20)

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
E42043640
E42043640E42043640
E42043640
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
He3413241328
He3413241328He3413241328
He3413241328
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
I1802046780
I1802046780I1802046780
I1802046780
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious Node in the Adversary Environment

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 40 Paper Publications EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious Node in the Adversary Environment Aida Andrews M.G University, Kottayam, Kerala, India Abstract: Mobile ad hoc networks (MANETs) are self-organizing the mobile nodes. It placed in adversary environments and it is vulnerable to security threats due to the characteristics of such networks. The main requirement on the networks is to provide unidentifiability and unlinkability for mobile networks. The existing protocols are not fully satisfied in this requirements. In this paper propose a new routing protocol that is enhanced authenticated anonymous secure routing (EAASR), to satisfy the unidentifiability and unlinkability. The new protocol provides less delay as compared with other protocol. Keywords: Anonymous routing, group elliptical signature, mobile ad hoc networks (MANETs). I. INTRODUCTION Mobile ad-hoc networks (MANETs) are self-configuring, infrastructural less networks, it deployed in adversary environments. Ad hoc wireless network is a temporary and dynamic environment where a group of mobile nodes with radio frequency transceivers communicate with each other without the intervention of any centralized administration or established infrastructure. Due to the limited transmission range of each mobile node, communication sessions between two nodes are usually established through a number of intermediate nodes, which are supposed to be willing to cooperate while forwarding the messages they receive to their destination. Unfortunately, some of these intermediate nodes might not be trustworthy and might be malicious, thereby forming a threat to the security and confidentiality of the exchanged data between the mobile nodes. While data encryption can protect the content exchanged between nodes, analysis of communication patterns may reveal valuable information about end users and their relationships. Using anonymous paths for communication provides security and privacy against traffic analysis. To establish these anonymous paths, in a traditional wired network, nodes build a global view of the network by exchanging routing information, whereas in an ad hoc wireless network, building this global view is not an option. MANETs are vulnerable to security threats due to the basic characteristics of mobile nodes. A major requirement of this network is to provide unlinkability and unidentifiability for mobile nodes and their networks. Many of the anonymous secure routing protocols have been proposed, but the requirement of these protocols is not completely satisfied. Generally MANETs in adversarial environments focused in on-demand anonymous routing protocols. The commonly used on- demand routing protocols are ad-hoc on-demand distance vector (AODV) and dynamic source routing protocol (DSR). The anonymous security functions are established in source, destination and intermediate nodes in the routing path. The another on-demand routing protocol is anonymous on-demand routing in mobile ad hoc network (ANODR). ANODR provides route anonymity and location privacy. These routing protocols are not completely satisfied in many applications. So the enhanced authenticated anonymous secure routing protocol is to reduce traffic and eliminate the malicious nodes in the adversary environment. EAASR is to satisfy the requirement and defend against the attacks. The route request packets are authenticated by a group elliptical curve to defend against attacks without unveiling the node identity. EAASR
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 41 Paper Publications provide better security mechanisms as compared with authenticated anonymous secure routing for MANETs. Enhanced authenticated anonymous secure routing protocol which guarantees security, its reduced end-to-end delay and high reliability of the established route in adversarial environment, such as ad hoc wireless network, by encrypting routing packet abstaining from using unreliable intermediate node. The key encrypted onion routing is also used with a route secret verification message is designed to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed EAASR protocol with improved performance as compared with the existing protocols. In enhanced authenticated anonymous secure routing (EAASR) is misinterpreting the attackers to attacks the nodes. The EAASR networks nodes communicate with each other nodes using dummy nodes. It dummy node use small energy as compared with AASR. The malicious node misunderstood the real communicating path between source and destination, because of the neighbourhood communication of dummy nodes. It provides efficient transmission and improves the reliability of the networks. But the real communication was already established in between the source and destination trough the reliable path using secured intermediate node. This path does not identifying the attackers due to anonymity protocols. II. BACKGROUND AND RELATED WORK Here introduce some basic concepts in anonymous routing protocols that are trapdoor, onion routing and group elliptical curve signature. 1) Trapdoor: Trapdoor is a one way function between the two neighboring nodes. It is one of the information collection mechanisms. The information’s are node identity, destination identity and intermediate identities in to the trapdoor. The intermediate nodes may add information’s into the trapdoor; the particular source or destination nodes retrieve the information’s. Its provide end-to-end security mechanisms. 2) Onion Routing: Its onion routing provides private communication s over public networks. The source node transmitting the information’s to destination through the intermediate nodes. Then each node decrypting to identifying the destination, but each node add the encrypted layer to this packets and transmitting another nodes. Then the destination node retrieve the information’s and send its backs to source node. 3) Group Elliptical Curve: The elliptic curve is used to solve to two cryptographic problems, factoring integers and constructing public-key cryptosystems. Elliptic curves are believed to provide good security with smaller key sizes, something that is very useful in many applications. III. PROTOCOL DESIGN Here, present the design of the EAASR on-demand ad hoc routing protocols. It’s completely depends on on-demand protocols because this new method is does not depending on tables. Its avoid the tables such as destination table, neighbourhood tables, routing tables and forwarding tables. The source node broadcast the route request (RREQ) in the networks and the destination nodes receives the RREQ and send its route reply as RREP. To protecting the security or anonymity when exchange the path of continuously. The three phases of communications are route discovery, data transmission, and route maintenance. For example, use a five node network [1] shown in figure 1(as refer in the previous paper), the source node S and its destination node D. Fig.1. Network topology
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 42 Paper Publications A. Anonymous Route Request: 1. Source Node: The source node broadcast the RREQ packets through the dummy node to all other nodes. The corrects messages is only decrypting the destination node D. S broadcast the information packets in the format is S→*: [RREQ, NSQ,VD,VSD, Onion(S)] GES- (1) Where the RREQ is the packet-type identifier, Nsq is a sequence number, VD is an encrypted message at the destination node, VSD is an encrypted message at the intermediate node, and onion(S) is a key-encrypted onion created by S. This RREQ packets is signed by S with its group elliptical private key GES- 2. Intermediate Node: The RREQ packet receives the intermediate node I from source node S. The node I decrypt the packet, and its understood that I is not the destination of this packet. Then again it retransmitting the packet to other node of this format is I→* : [RREQ, Nsq, VD, VSD, Onion(I)] GEI- (2) 3. Destination Node: The RREQ packet reaches the destination D, D validates its intermediate node I or J. The destination node can decrypt the packets and its identifying that this node is the destination of this packets. B. Anonymous Route Reply: 1) Destination Node: The node D receives the RREQ from its neighbor node J, the RREP packet and send it back to J. The route reply format [1] is D→* : ( RREQ, Nrt, <KV, Onion(J)> KJD) (3) Where RREP is the packet-type identifier, Nrt is the route pseudonym generated by D, and Kv and Onion(J) are obtained from the original RREQ and encrypted by the shared key KJD. 2) Intermediate Node : The intermediate node J has already communicate with other nodes I ,D and M. J ,s RREP reply towards the previous hop I in the format is J→* : (RREQ, Nrt, < KV,Onion(I)> KI J) (4) C. Data Transmission: The source node can transmit the data to the destination node D. The format of the data packet is given below S→ D : (DATA, Nrt,<Pdata> KSD ) (5) Where DATA is the packet type, Nrt is the route pseudonym, and the data payload is denoted by Pdata, which is encrypted by the session key KSD. IV. PROTOCOL EVALUATION The proposed EAASR protocol in ns-2 by extending the AASR module to support the cryptographic operations. We compare the performances of EAASR to those of AASR, ANODR and AODV in various mobility and adversarial scenarios. Two groups of simulation results are presented here. The first group is to compare the routing performances of AASR AODV, ANODR, and EAASR under different mobility scenarios. The second group is to compare their behaviors under the packet-dropping attacks with different levels. Perform five simulation runs for each configuration and record the per-flow performances, including throughput, packet loss ratio, and end-to-end delay. The effect of malicious attacks EAASR achieves 2% less loss ratio than AASR in average. The average performance of different runs is presented as follows.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (40-43), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 43 Paper Publications (a) (b) (c) Fig. 2. Performance comparison under different mobility settings (a) Per-flow throughput(b) Packet loss ratio(c) End-To-End Delay V. CONCLUSION In EAASR has improving the efficiency in the terms of route changes. One possible extension is to provide the functionality of repairing broken routes locally without compromising anonymity and security, dynamically partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. In addition, it hides the data initiator or receiver among many initiators/receivers to strengthen source and destination anonymity protection. Thus, EAASR offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively counter intersection and timing attacks. Future work will aims at improving the secured nodes, that means in our enhanced routing protocol such as EAASR only use the secured and shortest path, and avoiding the unwanted nodes in the networks. In improving the anonymity, the avoiding nodes in the networks are rechecking their security and participating the communication networks. REFERENCES [1] Wei Liu, and Ming Yu,” AASR: Authenticated anonymous secure routing for MANETs in Adversarial environments,” in IEEE Trans. vehicular technology, vol.63, no.9, pp.4585-4583, nov.2014 [2] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” IETF RFC 3561, Jul. 2003. [Online]. Available: www.ietf.org/rfc/rfc3561.txt [3] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc. CRYPTO, Aug. 2004, pp. 41–55. [4] D. Johnson, Y. Hu, and D. Maltz, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4,” IETFRFC4728, Feb. 2007. [Online]. Available: www.ietf.org/rfc/rfc4728.txt [5] J. Kong and X. Hong, “ANODR: ANonymous on demand routing with untraceable routes for mobile ad hoc networks,” in Proc. ACM MobiHoc, Jun. 2003, pp. 291–302. [6] J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and ondemand routing scheme against anonymity threats in mobile ad hoc networks,” IEEE Trans. Mobile Comput., vol. 6, no. 8, pp. 888–902, Aug. 2007. [7] Y. Zhang, W. Liu, and W. Lou, “Anonymous communications in mobile ad hoc networks,” in Proc. IEEE INFOCOM, Mar. 2005, vol. 3, pp. 1940–1951. [8] K. E. Defrawy and G. Tsudik, “Privacy-preserving location-based on-demand routing in MANETs,” IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 1926–1934, Dec. 2011. [9] M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous connections and onion routing,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 482–494, May 1998. [10] M. Yu and K. Leung, “A trustworthiness-based QoS routing protocol for ad hoc networks,” IEEE Trans.Wireless Commun., vol. 8, no. 4, pp. 1888– 1898, Apr. 2009.