The document describes TeleDNA mZone, a mobile application platform that provides entertainment services to subscribers, allowing them to share and exchange multimedia content. Key features of mZone include allowing subscribers to upload content with a single click to send to other mZone subscribers, notifying recipients of received content via SMS, and providing a "public gallery" where any subscriber can upload content for all to view and download. The platform can be accessed via web, WAP, or a mobile client application.
This document discusses intrusion detection in mobile ad hoc networks (MANETs). It describes some key challenges in MANETs including security, routing, quality of service and power consumption. It then focuses on security issues and approaches for protecting MANETs, including reactive and proactive approaches. It classifies different types of security attacks and discusses using intrusion detection systems (IDS) to detect malicious activity in MANETs. Finally, it explains some existing IDS approaches for MANETs like Watchdog, TWOACK and EAACK and highlights some of their weaknesses before describing the EAACK scheme in more detail.
This document proposes a secure intrusion detection system called EAACK for mobile ad hoc networks (MANETs). It discusses problems with existing IDS approaches for MANETs like Watchdog and TWOACK. The EAACK scheme aims to solve these problems by utilizing three parts: ACK, S-ACK and MRA. ACK uses end-to-end acknowledgment, S-ACK is an improved version of TWOACK, and MRA is used to resolve weaknesses in detecting misbehaving nodes. The objectives of this research are to study existing IDS schemes for MANETs, implement an IDS using the EAACK scheme, utilize digital signatures, and evaluate EAACK's performance compared to other approaches.
EAACK-A Secure Intrusion Detection System Overviewvpmmguys
The document presents a proposal for a new intrusion detection system called EAACK (Enhanced Adaptive Acknowledgment) for mobile ad hoc networks (MANETs). EAACK aims to improve upon existing approaches by addressing false misbehavior reports, limited transmission power, and receiver collisions. It consists of three parts - ACK, Secure ACK, and misbehavior report authentication. The proposed EAACK system is compared to other contemporary intrusion detection schemes like CONFIDANT and OCEAN through analyzing their advantages and disadvantages.
The document describes EAACK, a secure intrusion detection system for mobile ad hoc networks (MANETs). It discusses how earlier IDS like Watchdog, TWOACK and AACK had limitations that EAACK addresses. EAACK combines three schemes - ACK, S-ACK and MRA to detect malicious nodes. The ACK scheme provides end-to-end acknowledgment with low overhead. S-ACK detects misbehavior using digital signatures across node groups. MRA authenticates misbehavior reports to prevent false reports. Simulation results show EAACK achieves high detection rates with minimal performance impact.
The migration to wireless network from wired network
has been a global trend in the past few decades. The mobility
and scalability brought by wireless network made it possible in
many applications. Among all the contemporary wireless networks,
Mobile Ad hoc NETwork (MANET) is one of the most
important and unique applications. On the contrary to traditional
network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they
are both within the same communication range. Otherwise, they
rely on their neighbors to relay messages. The self-configuring
ability of nodes in MANET made it popular among criticalmission
applications like military use or emergency recovery. However,
the open medium and wide distribution of nodes make MANET
vulnerable to malicious attackers. In this case, it is crucial to
develop efficient intrusion-detection mechanisms to protect
MANET from attacks. With the improvements of the technology
and cut in hardware costs, we are witnessing a current trend of
expanding MANETs into industrial applications. To adjust to such
trend, we strongly believe that it is vital to address its potential
security issues. In this paper, we propose and implement a new
intrusion-detection system named Enhanced Adaptive ACKnowledgment
(EAACK) specially designed for MANETs. Compared
to contemporary approaches, EAACK demonstrates higher malicious-
behavior-detection rates in certain circumstances while does
not greatly affect the network performances.
The document proposes a new intrusion detection system called EAACK that is designed specifically for MANETs. Existing intrusion detection systems for MANETs like Watchdog and TWOACK have disadvantages like failing to detect malicious nodes that generate false reports or forged acknowledgments. EAACK aims to address these issues by using digital signatures to authenticate acknowledgment packets and thus make the system more secure. It is claimed that EAACK can detect malicious behaviors better than existing approaches in some cases without degrading network performance.
EAACK is an intrusion detection system designed specifically for MANETs that aims to address weaknesses in existing approaches. It adopts digital signatures to authenticate acknowledgment packets and help guarantee they are valid. This helps EAACK tackle issues like false misbehavior reports and forged acknowledgments that other systems fail to detect. Compared to contemporary methods, EAACK demonstrates higher detection rates of malicious behavior in some cases without significantly impacting network performance.
The document proposes a new intrusion detection system called EAACK that is designed specifically for mobile ad hoc networks (MANETs). Existing intrusion detection systems for MANETs have weaknesses including being vulnerable to false misbehavior reports and forged acknowledgment packets. EAACK addresses these weaknesses by using digital signatures to authenticate acknowledgment packets and thereby guarantee their validity. This helps EAACK more accurately detect malicious nodes and behaviors. The system is also designed to reduce network overhead compared to previous acknowledgment-based approaches.
This document discusses intrusion detection in mobile ad hoc networks (MANETs). It describes some key challenges in MANETs including security, routing, quality of service and power consumption. It then focuses on security issues and approaches for protecting MANETs, including reactive and proactive approaches. It classifies different types of security attacks and discusses using intrusion detection systems (IDS) to detect malicious activity in MANETs. Finally, it explains some existing IDS approaches for MANETs like Watchdog, TWOACK and EAACK and highlights some of their weaknesses before describing the EAACK scheme in more detail.
This document proposes a secure intrusion detection system called EAACK for mobile ad hoc networks (MANETs). It discusses problems with existing IDS approaches for MANETs like Watchdog and TWOACK. The EAACK scheme aims to solve these problems by utilizing three parts: ACK, S-ACK and MRA. ACK uses end-to-end acknowledgment, S-ACK is an improved version of TWOACK, and MRA is used to resolve weaknesses in detecting misbehaving nodes. The objectives of this research are to study existing IDS schemes for MANETs, implement an IDS using the EAACK scheme, utilize digital signatures, and evaluate EAACK's performance compared to other approaches.
EAACK-A Secure Intrusion Detection System Overviewvpmmguys
The document presents a proposal for a new intrusion detection system called EAACK (Enhanced Adaptive Acknowledgment) for mobile ad hoc networks (MANETs). EAACK aims to improve upon existing approaches by addressing false misbehavior reports, limited transmission power, and receiver collisions. It consists of three parts - ACK, Secure ACK, and misbehavior report authentication. The proposed EAACK system is compared to other contemporary intrusion detection schemes like CONFIDANT and OCEAN through analyzing their advantages and disadvantages.
The document describes EAACK, a secure intrusion detection system for mobile ad hoc networks (MANETs). It discusses how earlier IDS like Watchdog, TWOACK and AACK had limitations that EAACK addresses. EAACK combines three schemes - ACK, S-ACK and MRA to detect malicious nodes. The ACK scheme provides end-to-end acknowledgment with low overhead. S-ACK detects misbehavior using digital signatures across node groups. MRA authenticates misbehavior reports to prevent false reports. Simulation results show EAACK achieves high detection rates with minimal performance impact.
The migration to wireless network from wired network
has been a global trend in the past few decades. The mobility
and scalability brought by wireless network made it possible in
many applications. Among all the contemporary wireless networks,
Mobile Ad hoc NETwork (MANET) is one of the most
important and unique applications. On the contrary to traditional
network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they
are both within the same communication range. Otherwise, they
rely on their neighbors to relay messages. The self-configuring
ability of nodes in MANET made it popular among criticalmission
applications like military use or emergency recovery. However,
the open medium and wide distribution of nodes make MANET
vulnerable to malicious attackers. In this case, it is crucial to
develop efficient intrusion-detection mechanisms to protect
MANET from attacks. With the improvements of the technology
and cut in hardware costs, we are witnessing a current trend of
expanding MANETs into industrial applications. To adjust to such
trend, we strongly believe that it is vital to address its potential
security issues. In this paper, we propose and implement a new
intrusion-detection system named Enhanced Adaptive ACKnowledgment
(EAACK) specially designed for MANETs. Compared
to contemporary approaches, EAACK demonstrates higher malicious-
behavior-detection rates in certain circumstances while does
not greatly affect the network performances.
The document proposes a new intrusion detection system called EAACK that is designed specifically for MANETs. Existing intrusion detection systems for MANETs like Watchdog and TWOACK have disadvantages like failing to detect malicious nodes that generate false reports or forged acknowledgments. EAACK aims to address these issues by using digital signatures to authenticate acknowledgment packets and thus make the system more secure. It is claimed that EAACK can detect malicious behaviors better than existing approaches in some cases without degrading network performance.
EAACK is an intrusion detection system designed specifically for MANETs that aims to address weaknesses in existing approaches. It adopts digital signatures to authenticate acknowledgment packets and help guarantee they are valid. This helps EAACK tackle issues like false misbehavior reports and forged acknowledgments that other systems fail to detect. Compared to contemporary methods, EAACK demonstrates higher detection rates of malicious behavior in some cases without significantly impacting network performance.
The document proposes a new intrusion detection system called EAACK that is designed specifically for mobile ad hoc networks (MANETs). Existing intrusion detection systems for MANETs have weaknesses including being vulnerable to false misbehavior reports and forged acknowledgment packets. EAACK addresses these weaknesses by using digital signatures to authenticate acknowledgment packets and thereby guarantee their validity. This helps EAACK more accurately detect malicious nodes and behaviors. The system is also designed to reduce network overhead compared to previous acknowledgment-based approaches.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
Wireless sensor networks consist of small sensor nodes that monitor physical conditions and communicate wirelessly. They have limited capabilities but can be deployed widely. This document discusses wireless sensor networks including their features, applications, challenges, hardware platforms like motes, software platforms like TinyOS, and existing systems like Zigbee and CZARNET. It provides an overview of wireless sensor networks and their implementation.
Improved eaack develop secure intrusion detection system for mane ts using hy...Kumar Dlk
Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design.
This document discusses enhancing security in mobile ad hoc networks (MANETs) using a hybrid cryptography algorithm. It first provides background on MANETs and existing intrusion detection systems like EAACK that use digital signatures. The proposed system aims to improve on EAACK by using a hybrid of symmetric (AES) and asymmetric (RSA) cryptography. RSA would provide authentication through digital signatures, while AES would handle integrity and confidentiality in a way that reduces network overhead compared to using digital signatures alone. The goal is to achieve better security and integrity than EAACK through this combined cryptographic approach.
This document discusses security threats and challenges in wireless sensor networks. It outlines various threats including passive information gathering, node subversion, false nodes, node malfunctions, message corruption and denial of service attacks. It also describes different key distribution techniques for sensor networks such as single network keys, asymmetric cryptography, pairwise keys, and base station based key distribution. Random key predistribution schemes are explained where sensors are loaded with random keys before deployment. The document also discusses watermarking techniques that can be used to authenticate data collected by sensor networks through modulating sensor parameters or embedding signatures during data processing.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
1) Wireless sensor networks consist of hundreds or thousands of low-cost, low-power sensor nodes deployed to monitor environments. They require security to protect data confidentiality, integrity, and availability given their resource constraints and vulnerability to physical attacks.
2) Standard approaches to achieve security include encrypting data for confidentiality, using protocols like uTESLA for integrity and time synchronization for freshness. However, sensor nodes face obstacles like limited memory, energy constraints, and unreliable communication.
3) Wireless sensor networks are susceptible to various network layer attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, and wormholes. Countermeasures include link layer security, geographic routing, multi-path routing, and authentication.
Security and privacy in Wireless Sensor NetworksImran Khan
This document discusses security and privacy issues in emerging wireless networks such as wireless sensor networks and vehicular ad hoc networks. It identifies several factors that make wireless networks more vulnerable than wired networks, such as broadcast communication enabling eavesdropping, mobility revealing user location, and resource constraints opening doors to denial of service attacks. The document examines challenges for unattended wireless sensor networks that operate without a continuous sink presence, and discusses potential solutions like data protection through encryption and authentication. It concludes that new security challenges arise from features like intermittent connectivity, and that infrastructure-independent and new cryptographic techniques are needed to address issues in emerging wireless networks.
Monitoring and control systems that are based on networked wireless sensors have been recognized as an indivisible component for current and future smart systems in many applications such as healthcare, home security, disaster response, and environmental monitoring. From the viewpoint of researchers, developers and even consumers, reliability analysis is an indispensable step before wireless sensor network systems can be widely deployed for mission-critical applications. In this talk, reliability modeling and analysis for wireless sensor networks will be discussed under two different communication paradigms: infrastructure communication and application communication. Five data delivery models (sink unicast, sink anycast, sink multicast, sink manycast, and sink broadcast) will be presented for the infrastructure communication reliability analysis. Impact of different routing algorithms and network topology characteristics like connectivity, average path length, average degree, diameter, and clustering coefficient on the network reliability will also be discussed.
Wireless sensor networks (WSN) are networks of distributed autonomous sensors that monitor environmental or physical conditions. A WSN consists of sensor nodes that collect data and transmit it wirelessly to gateways or base stations. Key components of sensor nodes include processors, transceivers, memory, power sources, and sensors. The design of WSNs aims to minimize node size, power consumption, and maximize diversity, robustness, security, connectivity, and scalability. Common routing protocols for WSNs include flat, hierarchical, location-based, and QoS-based protocols. Security challenges in WSNs include physical tampering, jamming, spoofing, and Sybil attacks. Defenses utilize techniques like encryption, authentication,
This document discusses research challenges in real-time multimedia monitoring in large-scale wireless multimedia sensor networks. It describes how these networks enable new monitoring applications but face challenges due to limited computational and energy resources. The document outlines solutions needed at the MAC, network, and transport layers to efficiently deliver visual data while meeting requirements for steady data flows and delay-bounded delivery. It also discusses challenges in areas like multimedia coding, in-network processing, energy harvesting, and cross-layer optimization across the protocol stack.
WSN security faces many challenges due to limited sensor resources and operating in hostile environments. It requires high security levels to protect sensitive data while maintaining energy efficiency. However, current research has not fully addressed the conflict between security and limited resources. WSNs are vulnerable to various attacks like jamming, eavesdropping, and false routing. Providing security introduces additional processing and power demands on sensors. Many open research problems remain in developing scalable and dynamic security solutions for wireless sensor networks.
mobile ad-hoc network (MANET) and its applicationsAman Gupta
For free download Subscribe to https://www.youtube.com/channel/UCTfiZ8qwZ_8_vTjxeCB037w and Follow https://www.instagram.com/fitrit_2405/ then please contact +91-9045839849 over WhatsApp.
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Ad hoc is Latin and means "for this purpose
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
The document discusses wireless sensor networks and their applications. It describes the components of smart sensor nodes and different types of wireless sensor network deployments. It also summarizes various protocols used at different layers of the network including transport, network, data link and application layers. These protocols aim to address concerns around congestion, reliability, energy conservation, traffic flow and security. The document also provides a brief introduction to Arduino and Android frameworks and discusses some potential applications and future scope of wireless sensor networks.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
This document provides an overview of wireless sensor networks (WSNs). It discusses the architecture of sensor networks, including sensor node hardware, operating systems, and network density considerations. It also describes several layers of the WSN protocol stack, including the MAC layer and common MAC protocols like S-MAC. Key topics covered include query-based communication in WSNs, classifications of WSNs based on functionality, and energy-efficient operation through low-duty cycling.
This document is a project report submitted by two students, Mohammad Kafee Uddin and Aloukik Mishra, to the Department of Computer Science and Engineering at the Indian School of Mines in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. The report surveys routing protocols for wireless sensor networks and provides a classification of different routing protocols according to their mode of functioning, participation style of nodes, and network structure.
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
TeleDNA mZone is an off-deck portal and mobile client application that allows users to share and exchange multimedia content. It provides various entertainment services that can be accessed via web, WAP, or the mobile client. The application aims to enhance usage of value added services among mobile subscribers and generate returns for network operators.
TeleDNA mZone is an off-deck portal and mobile client application that allows users to share and exchange multimedia content. It provides various entertainment services that can be accessed via web, WAP, or the mobile client. The application aims to enhance usage of value added services among mobile subscribers and generate returns for network operators.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
Wireless sensor networks consist of small sensor nodes that monitor physical conditions and communicate wirelessly. They have limited capabilities but can be deployed widely. This document discusses wireless sensor networks including their features, applications, challenges, hardware platforms like motes, software platforms like TinyOS, and existing systems like Zigbee and CZARNET. It provides an overview of wireless sensor networks and their implementation.
Improved eaack develop secure intrusion detection system for mane ts using hy...Kumar Dlk
Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design.
This document discusses enhancing security in mobile ad hoc networks (MANETs) using a hybrid cryptography algorithm. It first provides background on MANETs and existing intrusion detection systems like EAACK that use digital signatures. The proposed system aims to improve on EAACK by using a hybrid of symmetric (AES) and asymmetric (RSA) cryptography. RSA would provide authentication through digital signatures, while AES would handle integrity and confidentiality in a way that reduces network overhead compared to using digital signatures alone. The goal is to achieve better security and integrity than EAACK through this combined cryptographic approach.
This document discusses security threats and challenges in wireless sensor networks. It outlines various threats including passive information gathering, node subversion, false nodes, node malfunctions, message corruption and denial of service attacks. It also describes different key distribution techniques for sensor networks such as single network keys, asymmetric cryptography, pairwise keys, and base station based key distribution. Random key predistribution schemes are explained where sensors are loaded with random keys before deployment. The document also discusses watermarking techniques that can be used to authenticate data collected by sensor networks through modulating sensor parameters or embedding signatures during data processing.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
1) Wireless sensor networks consist of hundreds or thousands of low-cost, low-power sensor nodes deployed to monitor environments. They require security to protect data confidentiality, integrity, and availability given their resource constraints and vulnerability to physical attacks.
2) Standard approaches to achieve security include encrypting data for confidentiality, using protocols like uTESLA for integrity and time synchronization for freshness. However, sensor nodes face obstacles like limited memory, energy constraints, and unreliable communication.
3) Wireless sensor networks are susceptible to various network layer attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, and wormholes. Countermeasures include link layer security, geographic routing, multi-path routing, and authentication.
Security and privacy in Wireless Sensor NetworksImran Khan
This document discusses security and privacy issues in emerging wireless networks such as wireless sensor networks and vehicular ad hoc networks. It identifies several factors that make wireless networks more vulnerable than wired networks, such as broadcast communication enabling eavesdropping, mobility revealing user location, and resource constraints opening doors to denial of service attacks. The document examines challenges for unattended wireless sensor networks that operate without a continuous sink presence, and discusses potential solutions like data protection through encryption and authentication. It concludes that new security challenges arise from features like intermittent connectivity, and that infrastructure-independent and new cryptographic techniques are needed to address issues in emerging wireless networks.
Monitoring and control systems that are based on networked wireless sensors have been recognized as an indivisible component for current and future smart systems in many applications such as healthcare, home security, disaster response, and environmental monitoring. From the viewpoint of researchers, developers and even consumers, reliability analysis is an indispensable step before wireless sensor network systems can be widely deployed for mission-critical applications. In this talk, reliability modeling and analysis for wireless sensor networks will be discussed under two different communication paradigms: infrastructure communication and application communication. Five data delivery models (sink unicast, sink anycast, sink multicast, sink manycast, and sink broadcast) will be presented for the infrastructure communication reliability analysis. Impact of different routing algorithms and network topology characteristics like connectivity, average path length, average degree, diameter, and clustering coefficient on the network reliability will also be discussed.
Wireless sensor networks (WSN) are networks of distributed autonomous sensors that monitor environmental or physical conditions. A WSN consists of sensor nodes that collect data and transmit it wirelessly to gateways or base stations. Key components of sensor nodes include processors, transceivers, memory, power sources, and sensors. The design of WSNs aims to minimize node size, power consumption, and maximize diversity, robustness, security, connectivity, and scalability. Common routing protocols for WSNs include flat, hierarchical, location-based, and QoS-based protocols. Security challenges in WSNs include physical tampering, jamming, spoofing, and Sybil attacks. Defenses utilize techniques like encryption, authentication,
This document discusses research challenges in real-time multimedia monitoring in large-scale wireless multimedia sensor networks. It describes how these networks enable new monitoring applications but face challenges due to limited computational and energy resources. The document outlines solutions needed at the MAC, network, and transport layers to efficiently deliver visual data while meeting requirements for steady data flows and delay-bounded delivery. It also discusses challenges in areas like multimedia coding, in-network processing, energy harvesting, and cross-layer optimization across the protocol stack.
WSN security faces many challenges due to limited sensor resources and operating in hostile environments. It requires high security levels to protect sensitive data while maintaining energy efficiency. However, current research has not fully addressed the conflict between security and limited resources. WSNs are vulnerable to various attacks like jamming, eavesdropping, and false routing. Providing security introduces additional processing and power demands on sensors. Many open research problems remain in developing scalable and dynamic security solutions for wireless sensor networks.
mobile ad-hoc network (MANET) and its applicationsAman Gupta
For free download Subscribe to https://www.youtube.com/channel/UCTfiZ8qwZ_8_vTjxeCB037w and Follow https://www.instagram.com/fitrit_2405/ then please contact +91-9045839849 over WhatsApp.
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Ad hoc is Latin and means "for this purpose
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
The document discusses wireless sensor networks and their applications. It describes the components of smart sensor nodes and different types of wireless sensor network deployments. It also summarizes various protocols used at different layers of the network including transport, network, data link and application layers. These protocols aim to address concerns around congestion, reliability, energy conservation, traffic flow and security. The document also provides a brief introduction to Arduino and Android frameworks and discusses some potential applications and future scope of wireless sensor networks.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
This document provides an overview of wireless sensor networks (WSNs). It discusses the architecture of sensor networks, including sensor node hardware, operating systems, and network density considerations. It also describes several layers of the WSN protocol stack, including the MAC layer and common MAC protocols like S-MAC. Key topics covered include query-based communication in WSNs, classifications of WSNs based on functionality, and energy-efficient operation through low-duty cycling.
This document is a project report submitted by two students, Mohammad Kafee Uddin and Aloukik Mishra, to the Department of Computer Science and Engineering at the Indian School of Mines in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. The report surveys routing protocols for wireless sensor networks and provides a classification of different routing protocols according to their mode of functioning, participation style of nodes, and network structure.
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
TeleDNA mZone is an off-deck portal and mobile client application that allows users to share and exchange multimedia content. It provides various entertainment services that can be accessed via web, WAP, or the mobile client. The application aims to enhance usage of value added services among mobile subscribers and generate returns for network operators.
TeleDNA mZone is an off-deck portal and mobile client application that allows users to share and exchange multimedia content. It provides various entertainment services that can be accessed via web, WAP, or the mobile client. The application aims to enhance usage of value added services among mobile subscribers and generate returns for network operators.
TeleDNA mZone is an off-deck portal and mobile client application that allows users to share and exchange multimedia content. It provides various entertainment services that can be accessed via web, WAP, or the mobile client. The application aims to enhance usage of value added services among mobile subscribers and generate returns for network operators.
Comverse introduces new IP Messaging and Service Enablement Middleware solutions to help communication service providers expand into new markets and services. The IP Messaging solution modernizes messaging infrastructure for improved integration. The Service Enablement Middleware securely exposes CSP assets to enable third parties to create new applications accessing subscriber networks and devices. Comverse aims to reduce barriers for CSPs and third parties to collaborate on innovative voice, messaging and mobile services.
Comverse VAS 3.0 IP Messaging and Service Enablement Middleware pave the way to opportunities for communication service providers (CSPs) to expand their markets and introduce compelling new consumer, enterprise and machine-to-machine (M2M) experiences.
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
Short Message Services are increasingly being relied upon to disseminate critical information during emergencies. In recent
days accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to
inform the service centre for instant help to save life of the people. Sending the nearest emergency service and/or police officers
needed for reporting the accident can be quite tedious. The idea of this work is to reduce the time required by the emergency
personnel to reach the accident area. This can be done if the information about an accident reaches the emergency services in time and
accurately. The project eliminates any communication between the victim and the personnel which leads to confusion. This is done by
finding the accurate position of the location by making use of the GPS services available in cell phones when the victim sends a
message to the emergency number(such as 108). The project aims at reducing the severe loss due to injury and fatality rate in accidents
to a great extent.
The document provides an overview of the Wireless Application Protocol (WAP), which enables access to the internet and advanced services from wireless devices independently of manufacturer, vendor, or technology. WAP defines a set of protocols that bridge the gap between mobile devices and the internet/intranets by allowing access to the same information on small wireless devices as desktop computers. It also defines an application environment for developing advanced services and applications for operators, manufacturers, and content developers.
The document discusses short message service (SMS) and how it works. SMS allows transmission of alphanumeric messages between mobile subscribers and external systems. Messages are sent to a Short Message Service Center which uses the home location register to locate the recipient's device and deliver the message through the mobile switching center and base station. SMS provides benefits like low-cost communication and delivery of notifications. It also generates revenue for providers. [/SUMMARY]
The document provides an overview of LTE (Long Term Evolution) technology and SAE (System Architecture Evolution). It discusses:
1) SAE introduces a simplified Evolved Packet Core and removes the RNC to enable a flat "all-IP" network architecture. This allows seamless integration with other wireless technologies.
2) LTE uses OFDMA for the downlink and SC-FDMA for the uplink. It supports MIMO to increase data rates. The physical layer uses orthogonal subcarrier modulation while maintaining low latency.
3) Together, LTE and SAE provide the mobile network evolution needed for next-generation networks by improving spectral efficiency, latency, and integration with other access technologies
Short Message Service (SMS) allows transmission of alphanumeric messages between mobile subscribers and external systems. SMS was introduced in 1991 in Europe on GSM networks and later in North America on GSM, CDMA, and TDMA networks. SMS messages are limited to 160 characters and transmitted through Short Message Service Centers and wireless networks to mobile devices. SMS provides benefits like guaranteed delivery, low cost communication, and new revenue streams for service providers.
This document provides an overview of Anusha Srivastava's industrial training at the Advanced Level Telecom Training Centre (ALTTC) in Ghaziabad, India. It discusses the history and mission of ALTTC. The document then summarizes key concepts in telecommunications including the basic working of telecom networks, switching, public switched telephone networks, multiple access techniques, GSM network architecture and components, IP addressing, fiber optic transmission systems, CDMA, and references used.
Fixed-mobile convergence (FMC) allows users to seamlessly connect mobile phones to fixed line networks to provide consistent communication experiences regardless of location. Key enabling technologies include SIP, IMS, and UMA. FMC provides benefits like dual-mode handsets, seamless roaming between networks, and reduced costs. Regulatory issues include licensing fixed and mobile services separately. British Telecom launched the first FMC service called "Fusion" in 2005, allowing mobile-like service over broadband at home with fixed line pricing. FMC is expected to continue evolving to better meet changing consumer needs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
This resume is for Amit S. Joshi, who has over 12 years of experience in the IT industry working for Mahindra Comviva Technologies Limited. He is currently a Senior Technical Lead responsible for managing teams and end to end delivery. He has extensive experience developing VAS applications for messaging platforms and mobile financial services. His technical skills include Java, Android development, Spring, Hibernate, and MySQL.
The Digital Wireless Telephony comprise of two main working technologies:
GSM which stands for Global System for Mobile Communication.
CDMA which stands for Code Division Multiple Access.
Rest is explained in the slides
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
This document discusses spectral efficient Interleave Division Multiple Access (IDMA) systems using multi-user detection. IDMA is presented as an alternative to CDMA that can overcome limitations like multiple access interference and intersymbol interference. IDMA uses user-specific interleaving along with iterative chip-by-chip detection to separate users and combat interference. This allows IDMA systems to support a large number of users independently of processing complexity. IDMA also enables asynchronous transmission without frame synchronization requirements. The document compares IDMA and CDMA techniques, explaining how IDMA differs in its use of interleaving for user separation rather than just coding gain.
Mediatainment is a creative firm that provides mobile marketing, content development, and web/network services. They have expertise in areas like mobile content production, content aggregation, application development, and technical consulting. Mediatainment works with many telecom operators and delivers customized content and solutions.
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
Vehicular Ad hoc Network (VANET), a rapidly
deployed wireless network, is a subclass of mobile ad hoc
networks (MANET) that uses multi-hop routing to provide
network connectivity among vehicles (V2V) or vehicle to road-
side equipments (V2R). VANETs have received increasing
research attention in recent years because of its vast
applications like safety, comfort and entertainment. Variations
with time in network topology impose new challenges for
routing protocols in such networks as traditional routing
protocols are not suitable for VANETs. This work is an attempt
to figure out the challenges in VANET comprehensively in
conjunction with the recommended routing protocols by
comparing the existing routing protocols with respect to
existing challenges.
This document describes a Result Alert System that sends examination results to students via email and SMS. The system was designed using PHP, MySQL, and an SMS gateway API. It allows students to register, input their details, and request results. When results are uploaded by the administrator, the system sends alerts to students by email or SMS. The system aims to make results more easily and conveniently accessible for students compared to traditional web-based methods. It was recommended for adoption by universities to help availability of results and reduce paperwork.
Similar to 9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf (20)
The document provides tips and suggestions for creating effective presentation slides, including:
- Using few words on each slide and letting pictures convey information
- Avoiding distracting backgrounds and fonts that are hard to read
- Explaining any graphics or animations used
- Practicing the presentation to avoid filler words and ensure proper timing
It also warns against common pitfalls like reading the slides verbatim, having too much text on slides, or flipping between slides without explanation.
The document provides an overview of the Document Object Model (DOM) and how JavaScript can be used to manipulate the DOM. It discusses how the DOM used to be browser-specific but is now a standard that can be manipulated by various languages. It provides examples of DOM tree structure, referencing DOM objects by ID, and manipulating DOM properties like innerHTML and visibility. The document is intended as a tutorial for learning the DOM and JavaScript DOM manipulation.
This document is the preface to a mathematics textbook for 10th standard students in Tamil Nadu, India. It outlines the goals of revising the textbook to implement a uniform curriculum across all school streams and improve mathematics education. It emphasizes that mathematics is essential for science, technology, and individual growth. The preface notes that the textbook aims to help students grasp fundamentals and apply them to problem solving. It also stresses the importance of the teacher's role in guiding students and making learning learner-centered. The textbook contents are arranged logically with examples to provide practice for thorough understanding.
BLAST is a novel presentation format that encourages rapid knowledge transfer through short slides of 8 words or less to avoid "death by powerpoint". It aims to efficiently convey key information in a brief format. The presentation and additional references on the BLAST format can be found at blast.emcrit.org.
This collection of fairy tales promises to transport readers to fantastical worlds full of old-world charm and mysticism. It includes many free tales for kids, with pictures, from KidsGen which aims to be a top site for new age children. The stories are meant to allow readers to lose themselves in far away fantasies and feel nostalgia.
A queen was told by a fairy that her daughter would bring her woe, so she attached a hawthorn branch to the newborn princess's head, turning her into a monkey. The monkey was raised by the queen's nephew but later captured by monkey king Magot who wanted to marry her. She refused and fled, transforming back into a princess after opening a magic chest. She fell in love with her cousin, but was imprisoned by the fairy. He rescued her and they married, reconciling their kingdoms.
This document provides an overview of commonly used features in PowerPoint. It demonstrates how to add and format slides, apply themes, vary text formatting, insert images from clipart or files, add animated and timed text, apply slide transitions and sounds, use shapes and diagrams, embed videos, add action buttons for navigation, and link to web content and email addresses. The goal is to serve as both a user guide and example presentation to learn PowerPoint features.
The document provides an overview of reporting and analytics capabilities in Sprinklr. It describes navigating between standard dashboards, setting filters and date ranges, and customizing dashboards. Standard dashboards track metrics like campaigns, social engagement, inbound/outbound tags, and service level agreements. Custom dashboards can be created and shared with other users. The document contains step-by-step instructions for using various reporting features in Sprinklr.
This collection of fairy tales promises to transport readers to fantastical worlds with old-world charm and mysticism. It includes many free tales for kids, with pictures, from KidsGen which aims to be a top site for new age kids to enjoy stories and lose themselves in far away fantasies or feel nostalgia.
This document contains a collection of mathematical puzzles posed by the famous Indian mathematician Shakuntala Devi. It includes 26 puzzles of varying difficulty levels that involve topics like ratios, proportions, averages, time calculations, and logical reasoning. The goal is to sharpen readers' intellectual faculties by challenging them to work through the puzzles to find the solutions. Shakuntala Devi was known as a "human computer" for her incredible calculating abilities and authored several books on mathematics.
A queen was told by a fairy that her daughter would bring her woe, so she attached a hawthorn branch to the newborn princess's head, turning her into a monkey. The monkey was raised by the queen's nephew but later captured by monkey king Magot who wanted to marry her. She refused and fled, transforming back into a princess after opening a magic chest. She fell in love with her cousin, but was imprisoned by the fairy. He rescued her and they married, reconciling their kingdoms.
Graffiti refers to writings or drawings created illicitly on walls or other surfaces in public places. Graffiti has existed since ancient times but modern graffiti most commonly uses spray paint and markers. While graffiti was historically found in ancient Egypt, Greece, and Rome, today creating graffiti without property owner consent is generally considered defacement or vandalism, punishable by law.
Graffiti refers to writings or drawings created illicitly on walls or other surfaces. Graffiti has existed since ancient times but modern graffiti most commonly uses spray paint or markers. While graffiti was a common form of expression historically, today most countries consider unauthorized graffiti on private property to be vandalism and defacement, which is punishable by law.
BLAST is a novel presentation format that encourages rapid knowledge transfer through short slides of 8 words or less to avoid "death by powerpoint". It aims to efficiently convey key information in a brief format. The presentation and additional references on the BLAST format can be found at blast.emcrit.org.
This one sentence document does not provide enough context or information to create an accurate 3 sentence summary. The document contains only one word - "Lorem" - which is not meaningful on its own.
This document provides an introduction to HTML basics. It covers using HTML tags to structure a web page with headings, paragraphs, and other text elements. It explains how to add images, tables, colors and hyperlinks to an HTML page. The document also discusses HTML tags, elements, attributes and entities. It encourages using logical tags over physical tags and style sheets for formatting. It includes examples and instructions for creating a basic HTML page using a text editor and viewing it in a browser.
This one sentence document does not provide enough context or information to create an accurate 3 sentence summary. The document contains only one word - "Lorem" - which is not meaningful on its own.
2. In the next section, we mainly concentrate on discussing
the background information required for understanding this
research topic.
II. BACKGROUND
1090 IEEE TELEDNA MZONE PHOTO SHARING, VOL. 43, NO. 2, MARCH 2013
SMS is a phenomenal success worldwide. Operators are
continuously deploying new and innovative SMS services.
This is leading to huge SMS usage, in turn Operators are
required to deploy very high capacity, scalable and robust
SMSC systems. Some of the innovative SMS based services
require special features on the SMSC.
TeleDNA SMSC enables Operators to keep pace with growing
SMS demand and the requirement for special features.
TeleDNA SMSC provides innovative features such as
Messaging personalization, Messaging Ad, Message
Forwarding, Emoticon Service, etc.
TeleDNA SMSC is a carrier grade platform providing 99.999
% high availability of the system. The SMSC clustered
architecture is modular and can scale up to 50,000 sms/sec
A. SMSC SUITE
SMS is a widely used value added service in Mobile Network.
(SMS as a value added service has seen the highest usage). To
cater for ever increasing SMS traffic from SMS based
services, Network Operators have to deploy multiple SMSCs.
To ease the integration of External SMS based application
with multiple SMSC, Mobile network operators will require a
SMS Gateway.
SMS Gateway facilitates ease of communication between
External SMS based Application and SMSC for delivering
value added service to mobile users. SMS Gateway provides
PUSH, PULL services for mobile users.
Mobile originated short messages are routed by the SMS
Gateway to appropriate external SMS based applications.
Application originated short messages are routed by the SMS
Gateway to appropriate SMSC.
The SMS Gateway is equipped with Uplink and Downlink
routing logic which can be configured by operators as per their
requirement (To address, Keyword, Round Robin, NID range
etc..).
B. SMS Gateway:
SMS is a widely used value added service in Mobile Network.
(SMS as a value added service has seen the highest usage).
Mobile users are using SMS for fast communication and
expect instantaneous delivery of the message to the
destination. Any delay or failure to deliver the SMS message
leads to a discontent subscriber and may eventually churn of
the subscriber.
To efficiently use multiple SMSCs deployed in the
network, Operators are using SMSRouter. The
SMSRouter give the flexibility to the Operator to
configure only single "Service Center Address" for their
subscriber. SMSRouter distributes the MO-SMS short
message across multiple SMSCs based on defined
Routing Hierarchy. Advance routing techniques (such
as Loadbalancing Round-robin / SMSC Capacity, To
Address, From Address, Default) help to effectively
route the MO-SMS messages across multiple SMSCs
improving the efficiency and provide a fail-safe
mechanism for handling SMS messages.
To cater for ever increasing SMS traffic, Network Operators
have to deploy multiple SMSCs. These SMSCs require unique
"Service Center Address". Mobile subscribers use the SMSC
as per the �Service Center Address� configured on
their mobile. Deploying new SMSC in Mobile Telecom
Network for a new subscriber base or for existing
subscriber base has an impact as the "Service center
address" is burned on SIM.
.
With the deployment of next generation networks and availability
of feature packed handsets, Multimedia Messaging Service has
once again become the buzz in mobile messaging. Almost all the
handsets are now supporting data services (GPRS, CDMA1x) and
have MMS Client. Mobile subscribers using these handsets can
easily send content rich multimedia messages. To cater for the
surge in Multimedia Messaging Operators are required to install
high capacity MMSC Systems in their network.
Multimedia Messaging Service is based on open specification
defined by 3GPP, 3GPP2 and Open Mobile Alliance (OMA).
TeleDNA MMSC is standards compliance system and can be
deployed in GSM, GPRS and CDMA (2G/3G) Networks. It
seamlessly integrates with multivendor network elements and also
with MMSCs of other Operators.
TeleDNA MMSC is a carrier grade platform providing 99.999 %
high availability of the system. The MMSC clustered architecture
is modular and can scale upto 20000 mms/sec.
C. SMS Router
D. MMSC: Multimedia Message Service Center
3. III. PROBLEM DEFINITION
E. MMS Gateway
In the early stages of text messaging (SMS) introduction the
traffic was very less. This was mainly due to the lack of
customer awareness of the service and lack of interoperability
between networks. Customers of operator A were not able to
send to customers of operator B. This was a major road block
in generating revenue for mobile operators. To solve this
problem, several SMSC gateways were introduced to
interconnect these operator's SMSC's. This contributed to the
huge generation of SMS traffic.
Today, picture or multimedia messaging (MMS) service is
introduced by almost every operator in the world. However,
MMS interoperability does not exist between operators. This
is contributing to customer dissatisfaction and very low
revenue generation for the mobile operators.
Mobile operators around the world realize that MMS
interoperability is a challenge. Interoperability between
operators' MMS networks will accelerate the user adaptation
and contribute to good revenue generation. Implementing
interoperability with every other operator in the world is a
biggest challenge and very time consuming process.
F. A2P SMSC � Application-To-Person Short
Message Service Center
To offload this burst of high traffic from conventional
SMSCs, there is a need for deploying A2P SMSC. The Mobile
Operators can use A2P SMSC to push promotional bulk
short messages to mobile subscribers.
TeleDNA A2P SMSC is a carrier grade platform that
interfaces with the mobile network elements: STPs,
SSTPs, GMSCs on SS7 / SIGTRAN (SUA/M3UA)
interfaces. The platform can scale from 1 sms/sec to
25000 sms/sec.
Cell Broadcast is a mobile technology that allows text
messages to be broadcasted to all mobile handsets and similar
devices within a designated geographical area. The broadcast
range varies from a small area (single cell) to the entire
network coverage area (PLMN).
G. CBC
Cell Broadcast technology is used to provide
services such as Emergency Alerts, Breaking News, Traffic
Conditions, Sports News, Stock News, etc. to mobile
subscribers currently located in a specific geographic area.
Cell Broadcast is designed for simultaneous delivery of text
messages to multiple users in a specified area. Cell Broadcast
is one-to-many geographically focused service, in contrast to
Short Message Service (SMS) which is one-to-one and
one-to-few service.
TeleDNA Cell Broadcast Center (CBC) allows Telecom
Operator to have a complete control over the cell broadcast
message on its network. It is a carrier grade platform that
interfaces with the mobile network elements such as BSCs,
RNC, MSC over standard interfaces (3GPP or 3GPP2). The
platform can scale from 1 TPS to 2000 TPS. With inbuilt GIS
server, TeleDNA CBC allows system Users to easily define a
geographical area on the fly and broadcast messages.
H. LBA - S
Mobile phones and the Internet have revolutionized the
communication and with it the lifestyle of people. The users
are dependent on mobile phone for most of their information
needs. With Location Based Applications/Services Mobile
phone will become a good resource for location based
information.
The operators are ready to launch Location based services but
to find out location information dependency on various
network elements like GMLC, SMLC etc which are very
expensive and accuracy is becoming a major roadblock.
Keeping these factors into consideration TeleDNA has
developed Location Based Services Access Platform with
advanced features.
Location Based Services Access Platform can help mobile
service providers to introduce a set of location based
applications like Buddy Finder, Social networking, Navigation
Services, POI finder, Yellow Pages, Geo Fencing etc. The
multiple positioning methods such as GMLC based, Cell ID
based, GPS based etc allows operators to introduce the
services with minimal dependency on other network elements.
The support for both Static GIS Maps and Dynamic online
GIS Maps adds to rich user experience by providing most
updated Geographic Map. The mobile subscribers can access
these location based services through
SMS/USSD/MMS/Web/WAP channels which also increases
mobile service providers existing SMS/USSD/MMS/WAP
Traffic.
TThe increase in Application originated short message traffic
has become a real challenge for Mobile Operators having
conventional SMSCs. The Conventional SMSCs were
deployed to handle non-burst, person-to-person and premium
application-to-person traffic. The delivery of premium content
message played a vital role in the operator s business model
for generating additional revenues. Use of conventional
SMSCs to deliver promotional application-to-person messages
can hamper normal P2P traffic.
mZone platform provides various
Entertainment Services for mZone subscribers and a
unique Multilingual Messaging Service for the Admin
user of the platform.
4. IV. SCHEME DESCRIPTION
ad1
TeleDNA's USSD Gateway is a carrier-grade platform that
supports a wide range of services provided by applications
configured on the Gateway. Subscribers use USSD strings to
access these services or applications. The USSD Gateway
receives requests from the network that prompt the subscriber
for information, which the subscriber provides, enabling the
interaction to proceed and be completed.
TeleDNA's USSD Gateway delivers high-speed interactive
content to mobile subscribers, enabling sustained real-time
interactions, without consuming large amounts of bandwidth.
Using TeleDNA's USSD Gateway, operators can rapidly
create and offer new value added, dialogue-based services,
such as customer care, roaming and infotainment services,
enriching the service portfolio and differentiating the operator
in the market.
With an intermediary platform linking content providers to
end users, TeleDNA's USSD Gateway cuts the costs of
implementing enhanced interactive services and provides an
efficient way to deliver value-added services to end
customers. Introducing enhanced Value Added Services
seamlessly over multiple messaging platforms is a major
challenge faced by mobile operators. As wireless
technologies advance, the number and type of mobile
contents and applications that are being introduced in the
market are growing at an enormous pace. Converting these
mobile contents and applications to carrier grade service
offerings is a major task for the operator. To manage
diversified service categories and effective charging,
operators are looking for a platform that provides service
management capability through unified network access.
TeleDNA SDP platform has been developed keeping in
mind above challenges and bring in the convergence
between legacy, 2.5G & 3G services. TeleDNA SDP
addresses these immediate challenges and paves the way
towards an IMS-compatible services platform where
multimedia services can be available across any kind of
access networks. With TeleDNA's extensive product
development knowledge in messaging domain areas,
TeleDNA SDP platform provides diversified data services
capabilities as a single integration point. The TeleDNA
SDP platform has been developed to bring in the
convergence between legacy, 2.5G & 3G services
Mobile Application Stores are a new solution market which
promises the development of a new revenue stream for
operators, handset OEMs and application developers. Recent
research reveals that as the Mobile Application Store are
directly accessed by mobile users; users expect some sort of
control and personalization on App Store which is missing in
most of the existing App Stores. Also for an user finding the
right application or service is cumbersome job as there is no
personalized discovery or search option.
TeleDNA Mobile Application distribution platform is a state
of the art next generation applications store with advanced
features which helps mobile service providers to distribute
mobile applications with optimal search/discovery. The
platform supports various delivery and payment mechanisms
along with device independent license management.
The mZone Photo Mailing provides an option to all its
subscribers for sharing multimedia content with
other mZone and non mZone subscribers to get the
content. The recipient of the shared content need
not be a subscriber of the MMS service provided by
the operator, this saves MMS cost.
The mZone Subscribers with a single click can upload
& send contents to other mZone subscribers. The
recipient get a SMS notification receiving the shared
content, the recipient is notified by a SMS that an
mZone subscriber has sent multimedia content. The
recipient subscriber can view the received message
or content on mobile or through mZone portal. The
subscriber can also download the content to his
mobile from the mZone portal.
With few clicks on your mobile camera you upload
multimedia content to the public gallery which can
be accessed by other subscribers of mZone portal.
Subscribers can upload any multimedia content to
“Public Gallery” so that all mZone subscribers can
view and download the content.
TeleDNA mZone Interfaces:
TeleDNA mZone provides the following standardsbased
interfaces to the Network Service Enablers and
Content Providers
Network Service Enabler Interface
SMSC SMPP 3.4
MMSC SMTP/MM7
WAP GW HTTP
Prepaid IN DIAMETER
Billing System FTP
CPs or Enterprises SMTP/MM7 or
HTTP/SOAP
mZone Subscription
TeleDNA mZone provides the following standardsbased
interfaces to the Network Service Enablers and
Content Providers
The Entertainment service usages and access are
subscription based i.e., the subscriber has to
subscribe to the mZone Entertainment Services.
Subscription to the Entertainment Services can be
achieved through any of the three modes:
SMS
Web Portal
WAP Portal
5. sak1
TeleDNA mZone Netwotk Interface-
TeleDNA mZone integrates with the Telecom
Operator's existing Network Enablers over
standardinterfaces.
Managed VAS Service
Under VAS Managed Services portfolio TeleDNA offers end
to end professional managed (O&M) services of all the VAS
elements in the operator’s network. The vast experience of
TeleDNA in designing, developing, installing, customizing
and managing the wide range of VAS elements brings in
tremendous value proposition to the operators.
TeleDNA’s ISO/CMM complied processes ensure that the
operator’s network is well managed in terms of day-to-day
maintenance, upgrades, statistics & MIS reports
reconciliation, business intelligencebusiness intelligence
reports, system uptimes, customizations, creation of
technological road maps etc. as per the agreed SLAs & KPIs.
The rich experienced work force of TeleDNA combined with
advance CRM tool allows 24x7 support with regular updates
to the operator’s O&M heads to have a complete view of the
network along with any expansion requirements. TeleDNA’s
Managed Services Promises Objective Based and Committed
Enhancements in the revenues.
Distinct Advantages to Mobile Operator
Substantial improvement is cash flow
Improvement in ARPU
Response time in handling dynamics of technology
advancements is fast
Service quality brings in customer satisfaction
Operator have more time in focusing customers and
marketing strategy
Flexible and scalable business models
Multi-level support centers
Dedicated and Experienced resources.
Majority of Value Added Services deployed by Network
Operators (such as Multimedia Messaging Service and Cell
Broadcast) are underutilized. The prime reason for non
popularity of such services is the difficulty faced by
subscribers in getting such service activated and using the
service itself. Ideally, these services can yield good returns of
investment for Network Operators. TeleDNA mZone is the
ideal platform for operators to achieve good returns of
investment, by enhancing the usage of value added services
provided by the Network.
TeleDNA mZone is a VAS Application Platform that provides
mobile subscribers with various Entertainment Services, using
which the subscribers can share and exchange multimedia
content. TeleDNA mZone provides the mZone subscribers a
user-friendly and innovative method of sharing and
exchanging multimedia content and taking part in contests.
TeleDNA mZone is an off-deck portal that provides a platform
to exchange multimedia content between mobile users.
TeleDNA mZone also provides an option to download a
feature rich Mobile Client for ease of access to mZone
platform and services.
6. VI. CONCLUSION AND FUTURE WORK
REFERENCES
[1] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and
J.-B. Viollet, “Which wireless technology for industrial wireless sensor
networks? The development of OCARI technol,” IEEE Trans. Ind. Elec-
tron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.
[2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Net-
work Security,” in Lecture Notes in Electrical Engineering, vol. 127.
New York: Springer-Verlag, 2012, pp. 659–666.
[3] R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc
networks: A survey,” in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana,
India, 2012, pp. 535–541.
[4] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile
Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer-
Verlag, 2008.
[5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless
Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
[6] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Model-
ing and optimization of a solar energy harvester system for self-powered
wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 7,
pp. 2759–2766, Jul. 2008.
[7] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks:
Challenges, design principles, and technical approach,” IEEE Trans. Ind.
Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
[8] Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector
routing for mobile wireless ad hoc networks,” in Proc. 4th IEEE Workshop
Mobile Comput. Syst. Appl., 2002, pp. 3–13.
[9] Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand rout-
ing protocol for ad hoc networks,” in Proc. 8th ACM Int. Conf. MobiCom,
Atlanta, GA, 2002, pp. 12–23.
[10] G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks rout-
ing protocol—A review,” J. Comput. Sci., vol. 3, no. 8, pp. 574–582,
2007.
[11] D. Johnson and D. Maltz, “Dynamic Source Routing in ad hoc wireless
networks,” in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5,
pp. 153–181.
[12] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes
in MANETs,” in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10,
2010, pp. 216–222.
[13] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowl-
edgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis,
Singapore, Mar. 22–25, 2011, pp. 488–494.
[14] K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc commu-
nications in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323,
2004.
[15] J.-S. Lee, “A Petri net design of command filters for semiautonomous
mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4,
pp. 1835–1841, Apr. 2008.
[16] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An
acknowledgment-based approach for the detection of routing misbe-
haviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5,
pp. 536–550, May 2007.
[17] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbe-
haviour in mobile ad hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile
Comput. Netw., Boston, MA, 2000, pp. 255–265.
[18] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied
Cryptography. Boca Raton, FL: CRC, 1996, T-37.
[19] N. Nasser and Y. Chen, “Enhanced intrusion detection systems for dis-
covering malicious nodes in mobile ad hoc network,” in Proc. IEEE Int.
Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.
[20] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection
and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf.
Perform., Comput., Commun., 2004, pp. 747–752.
[21] A. Patcha and A. Mishra, “Collaborative security architecture for black
hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wire-
less Conf., 2003, pp. 75–78.
[22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, “Secure
routing and intrusion detection in ad hoc networks,” in Proc. 3rd Int. Conf.
Pervasive Comput. Commun., 2005, pp. 191–199.
[23] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital
signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2,
pp. 120–126, Feb. 1983.
[24] J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. Lanceros-
Mendez, “Energy harvesting from piezoelectric materials fully integrated
in footwear,” IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 813–819,
Mar. 2010.
[25] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video
transmissionenhancementinpresenceofmisbehavingnodesinMANETs,”
Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
[26] A. Singh, M. Maheshwari, and N. Kumar, “Security and trust management
in MANET,” in Communications in Computer and Information Science,
vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387.
[27] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. disserta-
tion, Texas A&M Univ., College Station, TX, 2004.
[28] K. Stanoevska-Slabeva and M. Heitmann, “Impact of mobile ad-hoc net-
works on the mobile value system,” in Proc. 2nd Conf. m-Bus., Vienna,
Austria, Jun. 2003.
[29] A. Tabesh and L. G. Frechette, “A low-power stand-alone adaptive circuit
for harvesting energy from a piezoelectric micropower generator,” IEEE
Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010.
[30] M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” in Proc.
ACM Workshop Wireless Secur., 2002, pp. 1–10.
[31] L. Zhou and Z. Haas, “Securing ad-hoc networks,” IEEE Netw., vol. 13,
no. 6, pp. 24–30, Nov./Dec. 1999.
[32] Botan, A Friendly C ++ Crypto Library. [Online]. Available: http://
botan.randombit.net/
Mzone–photosharing application is the latest mobile
application-offering you to share your pictures in a single
click.mZone is a mobile entertainment and social networking
platform,which provides a variety of unique content sharing
features across the mZone community.
The mZone is the TeleDNA’s VAS Application
Platform.Design and develop a platform which can offer the
mobilenetwork perators,MVNOs, contentproviders,Enterprises
and mobile users a user friendly and easy to user
mobile application platform for sharing photos,manage
private albums,manage public albums,conduct contests and
dating/matrimony services over different channels.
This platform shall offer the services to Mobile Network
Operators,Mobile Virtual Network
Operators(Aggregators),ContentProviders,Enterprises and
Mobile Subscribers.The services offered for all these stake
holders are discussed in the relevant sections in the
document.TeleDNA mZone provides J2ME Mobile Client for
the subscribers to install on their mobiles and access mZone
features.mZone Mobile Client provides the subscribers the
ease of use and helps the subscribers avoid the tedious typing
required to upload content or download content.
mZone solution shall have a vast set of service portals,core
applicationprocesses,enabler gateways and handset
applications,these shall be bundled and installed in the data
center as mZone server.
7. 1098 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013
[33] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal In-
formation Processing Standards Publication, Gaithersburg, MD, 2009,
Digital Signature Standard (DSS).
[34] TIK WSN Research Group, The Sensor Network Museum—Tmote Sky.
[Online]. Available: http://www.snm.ethz.ch/Projects/TmoteSky
[35] Y. Kim, “Remote sensing and control of an irrigation system using a
distributed wireless sensor network,” IEEE Trans. Instrum. Meas., vol. 57,
no. 7, pp. 1379–1387, Jul. 2008.
Elhadi M. Shakshuki (SM’01) received the B.Sc.
degree in computer engineering from the University
of Tripoli, Tripoli, Libya, in 1984 and the M.Sc. and
Ph.D. degrees in systems design engineering from
the University of Waterloo, Waterloo, ON, Canada,
in 1994 and 2000, respectively.
He is currently a Professor with the Jodrey School
of Computer Science, Acadia University, Wolfville,
NS, Canada, where he is the Founder and the Head
of the Cooperative Intelligent Distributed Systems
Group. He is an Adjunct Professor with Dalhousie
University, Halifax, NS. He is on the editorial board of several international
journals. He published over 150 research papers in international journals,
conferences, and workshops.
Dr. Shakshuki is a member of the Association for Computing Machinery
and Association of Professional Engineers of Nova Scotia. He contributed in
many international conferences and workshops with different roles. He is the
Founder of the International Conference on Ambient Systems, Networks and
Technologies. He is a Cofounder of the International Conference on Mobile
Web Information Systems. He is also a Founder of other international symposia
and workshops.
Nan Kang received the B.Eng. degree in computer
science from Heilongjiang Institute of Science and
Technology, Harbin, China, in 2006 and the M.Sc.
degree in computer science from Acadia University,
Wolfville, NS, Canada, in 2011.
He is currently a Software Developer with 2nd
Act Innovations Inc., Halifax, NS. His current work
includes sentiment analysis, natural language pro-
cessing, and the design and development of applica-
tions on Cocoa/Cocoa Touch. His research interests
include wireless network security and machine
learning.
Tarek R. Sheltami (M’05) received the Ph.D. de-
gree in electrical and computer engineering from the
Department of Electrical and Computer Engineering,
Queen’s University, Kingston, ON, Canada, in 2003.
He was with GamaEng Inc. as a Consultant on
wireless networks (in 2002–2004). He also worked
in several joint projects with Nortel Network Corpo-
ration. He is currently an Associate Professor with
the Computer Engineering Department, King Fahd
University of Petroleum and Minerals (KFUPM),
Dhahran, Saudi Arabia. Before joining KFUPM, he
was a Research Associate Professor with the School of Information Technology
and Engineering, University of Ottawa, Ottawa, ON.
Dr. Sheltami has been a member of the Technical Program and Organizing
Committees of several international IEEE conferences.