A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
Mobile Ad hoc Network (MANET) is constructed from a collection of nodes that can move
anywhere and anytime in different areas without any infrastructure that means MANET is infrastructure less.
Each node works at the same time as router and host. Lack of a fixed infrastructure, wireless medium and
dynamic topology makes MANET vulnerable to different kinds of attacks like Gray hole and Black hole. In this
paper, we investigate different mechanisms that have designed to detect or prevent black or gray hole attacks in
AODV protocol. We discuss about advantages and disadvantages of the different methods.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
Mobile Ad hoc Network (MANET) is constructed from a collection of nodes that can move
anywhere and anytime in different areas without any infrastructure that means MANET is infrastructure less.
Each node works at the same time as router and host. Lack of a fixed infrastructure, wireless medium and
dynamic topology makes MANET vulnerable to different kinds of attacks like Gray hole and Black hole. In this
paper, we investigate different mechanisms that have designed to detect or prevent black or gray hole attacks in
AODV protocol. We discuss about advantages and disadvantages of the different methods.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Point-to-Point Protocol is data link layer protocol used to establish a direct connection between two nodes via a WAN or LAN Along with is Components and Characteristics
Overview of transport protocols as alternatives to TCP and UDP.
TCP and UDP are the two transport protocols (OSI layer 4) that are predominantly used by applications in IP based networks.
The properties of TCP and UDP are complementary in that TCP provides many quality of service features that UDP lacks.
Therefore, TCP is mainly used in applications that require a certain level of reliable transport connection while UDP is used when reliability is of secondary importance but speed and simplicity are important.
There are, however, alternatives to TCP and UDP. SCTP (Stream Control Transmission Protocol) was defined some time ago and was meant to eventually replace TCP. It provides the same features as TCP but fixes some of the shortcomings of TCP. Alternatives for UDP exist as well such as Reliable UDP and UDP redundancy.
Point to point protocol | PPP - Nitish JadiaNitish Jadia
This slide covers point to point protocol and takes most of the points straight from the RFC. This slide covers in-depth flags and headers used in PPP.
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Point-to-Point Protocol is data link layer protocol used to establish a direct connection between two nodes via a WAN or LAN Along with is Components and Characteristics
Overview of transport protocols as alternatives to TCP and UDP.
TCP and UDP are the two transport protocols (OSI layer 4) that are predominantly used by applications in IP based networks.
The properties of TCP and UDP are complementary in that TCP provides many quality of service features that UDP lacks.
Therefore, TCP is mainly used in applications that require a certain level of reliable transport connection while UDP is used when reliability is of secondary importance but speed and simplicity are important.
There are, however, alternatives to TCP and UDP. SCTP (Stream Control Transmission Protocol) was defined some time ago and was meant to eventually replace TCP. It provides the same features as TCP but fixes some of the shortcomings of TCP. Alternatives for UDP exist as well such as Reliable UDP and UDP redundancy.
Point to point protocol | PPP - Nitish JadiaNitish Jadia
This slide covers point to point protocol and takes most of the points straight from the RFC. This slide covers in-depth flags and headers used in PPP.
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
AODVMO: A Security Routing Protocol using One-Time Password Authentication Me...IJCNCJournal
Ad hoc On-demand Distance Vector (AODV) routing protocols is one of the most popular reactive protocol used for Mobile Ad hoc Network and is a target of many Denial-of-Service attack types. In this article, we propose a solution for Initialization and Providing the OTP based on Mobile Agent (IPOM). We also propose a Security Routing Protocol using One-Time Password Authentication Mechanism based on Mobile Agent (AODVMO) by extending the original AODV protocol and integrating IPOM solution. Analysis results confirm that AODVMO can prevent almost current routing protocol attack types, such as Blackhole / Sinkhole, Grayhole, Whirlwind, and Wormhole types. Using NS2, we evaluate the packet overhead for providing OTP, the security performance on random waypoint network topology under Blackhole attacks and the effect of security mechanism to the original protocol. Simulation results show that the proposed solution works well, the performance of AODVMO is good under Blackhole attacks, and slightly reduced when integrating the security mechanism in scenarios without attacks.
AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME PASSWORD AUTHENTICATION ME...IJCNCJournal
Ad hoc On-demand Distance Vector (AODV) routing protocols is one of the most popular reactive protocol
used for Mobile Ad hoc Network and is a target of many Denial-of-Service attack types. In this article, we
propose a solution for Initialization and Providing the OTP based on Mobile Agent (IPOM). We also
propose a Security Routing Protocol using One-Time Password Authentication Mechanism based on Mobile
Agent (AODVMO) by extending the original AODV protocol and integrating IPOM solution. Analysis
results confirm that AODVMO can prevent almost current routing protocol attack types, such as Blackhole /
Sinkhole, Grayhole, Whirlwind, and Wormhole types. Using NS2, we evaluate the packet overhead for
providing OTP, the security performance on random waypoint network topology under Blackhole attacks
and the effect of security mechanism to the original protocol. Simulation results show that the proposed
solution works well, the performance of AODVMO is good under Blackhole attacks, and slightly reduced
when integrating the security mechanism in scenarios without attacks.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
Secure multipath routing scheme using keyijfcstjournal
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be
targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but
under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by
nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under
dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the
attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination
node. We also identified forwarders for query by base station. The front is optimally calculated to maintain
the security credential and avail multiple paths. According to our knowledge ours is a novel secure
multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical
analysis.
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET cscpconf
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The intermediate nodes cooperate with each other as there is no such base station or access point.The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques incur a high computational cost and can’t identify the nodes with malicious intention. So, employing cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
A survey on trust based secure routing in manetcsandit
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Collision Avoidance Protocol for Inter Vehicular Communication Editor IJCATR
Vehicle to vehicle communication can give us better results by avoiding the major problems in road like collision of vehicles, better route selection in case of traffic congestion, fuel consumption, suitable selection of parking place etc. This paper presents a protocol to avoid the collision of vehicles. High mobility and fast topology changes are the characteristics of Vehicular Ad-hoc Networks (VANETs). To establish the real world environment for VANETs, network simulator NS2 is used. Medium Access Control (MAC) Protocol is used to avoid the collision of transmitted data. The Simulation is done using the proposed Vehicular Ad-hoc On-demand Distance Vector (VAODV) routing protocol, which is a modification of Ad-hoc On-demand Distance Vector (AODV) routing protocol. The proposed VAODV protocol is continuously checks the distance, speed of each vehicle and if it finds that the distance between vehicles is continuously decreasing then in this case it will send a warning textual message to those vehicles that are in accidental situation. Based on this textual information these vehicles will take particular action like vehicle may choose new route if it exists or it may slow down its own speed or it may stop moving by pressing brake. The experimental results are used to find out the performance of VAODV protocol. The performance of VAODV protocol is analyzed with different parameters like end to end delay, throughput, packet delivery ratio, normalized routing load etc.
Similar to 564 patel mokbel_shushanz_survey_slides (20)
Collision Avoidance Protocol for Inter Vehicular Communication
564 patel mokbel_shushanz_survey_slides
1. 60-564 Security & Privacy on the Internet Instructor: Dr. Aggarwal Survey New Developments on Ad-hoc Network Security Presenters: Amar B. Patel , Mohammed F. Mokbel & Shushan Zhao November 25 th , Fall 2007 School of Computer Science University of Windsor