MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for
communication. In this network, nodes are self-organized and can act as router. They are battery operated
and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible
application of Block chain in many sectors including MANETs. This paper surveys the existing researches
done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for
improving security while routing packets from one node to another. Some researchers have proposed trust
models using block chain. This paper reviews some of the existing approaches where block chain is used in
MANETs for routing the packets, creating trust models, and dealing with network partitioning problem and
scalability problem. This paper acts as a review paper to study on block chain applications in MANET.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
This document proposes a blockchain-based framework for data sharing. It discusses challenges with traditional centralized data sharing approaches. Blockchain provides an opportunity to address issues of trust, accuracy, and reliability through its decentralized and distributed ledger approach. The proposed framework uses blockchain as the backbone, allowing different parties and ecosystems to securely share data. Key entities are issuers who share data and verifiers who access it. Hashed data is stored on the blockchain to ensure integrity and provenance. The framework aims to address technical and regulatory challenges to data sharing through a decentralized approach.
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
This document describes a proposed decentralized photo sharing application called Photogroup that is built using blockchain technology. Photogroup allows users to view, like, comment on and share photos in a peer-to-peer network without a central server. It uses Ethereum for the blockchain platform and smart contracts to manage transactions and the addition of new blocks. When a user shares a photo, the transaction is added to the blockchain through smart contracts to ensure the data is distributed and immutable across all nodes. The system aims to provide more security than centralized social networks by avoiding single points of failure and making the data difficult to hack or tamper with.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
ABSTRACT
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...PhD Assistance
This document discusses challenges and future research opportunities in applying blockchain technology to supply chain management. It outlines several areas where blockchain could transform supply chains, including increasing transparency, enhancing security, and enabling traceability. However, issues around interoperability, standardization, and integrating blockchain with other technologies still exist. The document proposes topics for future research, such as how blockchain and IoT can impact supply chain performance, reengineering supply chains with blockchain, and ensuring security and privacy in blockchain-based systems.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
This document proposes a blockchain-based framework for data sharing. It discusses challenges with traditional centralized data sharing approaches. Blockchain provides an opportunity to address issues of trust, accuracy, and reliability through its decentralized and distributed ledger approach. The proposed framework uses blockchain as the backbone, allowing different parties and ecosystems to securely share data. Key entities are issuers who share data and verifiers who access it. Hashed data is stored on the blockchain to ensure integrity and provenance. The framework aims to address technical and regulatory challenges to data sharing through a decentralized approach.
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
This document describes a proposed decentralized photo sharing application called Photogroup that is built using blockchain technology. Photogroup allows users to view, like, comment on and share photos in a peer-to-peer network without a central server. It uses Ethereum for the blockchain platform and smart contracts to manage transactions and the addition of new blocks. When a user shares a photo, the transaction is added to the blockchain through smart contracts to ensure the data is distributed and immutable across all nodes. The system aims to provide more security than centralized social networks by avoiding single points of failure and making the data difficult to hack or tamper with.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
ABSTRACT
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Challenges In BlockChain Technology For Future Supply Chain- Future Research ...PhD Assistance
This document discusses challenges and future research opportunities in applying blockchain technology to supply chain management. It outlines several areas where blockchain could transform supply chains, including increasing transparency, enhancing security, and enabling traceability. However, issues around interoperability, standardization, and integrating blockchain with other technologies still exist. The document proposes topics for future research, such as how blockchain and IoT can impact supply chain performance, reengineering supply chains with blockchain, and ensuring security and privacy in blockchain-based systems.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...IRJET Journal
This document summarizes the key challenges of blockchain technology discussed in a research paper, including scalability, security, interoperability, regulation/governance, trust among users, financial resources, skills gaps, public perception, energy consumption, privacy issues, and inefficient technology design. It provides details on the causes and potential solutions for each challenge. The research methodology used surveys and statistical analysis to test hypotheses about blockchain technologies and the use of solutions like layer 2 scaling.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
This document summarizes a research paper that proposes using blockchain technology to securely share data in the Internet of Things (IoT). It first discusses the growing amounts of user data and issues with cloud-based data storage solutions regarding user privacy and access control. It then introduces blockchain as a decentralized solution and reviews previous research on using techniques like proxy re-encryption and attribute-based encryption to realize fine-grained access control of encrypted data. However, most existing solutions have high computational costs or security issues. The document concludes by stating the research will further elaborate on a proposed approach using blockchain and proxy re-encryption to securely store IoT medical data on public clouds.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
This document discusses a proposed decentralized car hailing application that utilizes blockchain technology. Key points include:
- The current centralized car hailing models have issues with user privacy and data ownership as well as high fees taken by the intermediaries.
- The proposed application would use a consortium blockchain model where verified drivers could access available ride requests and act as miners by adding ride completions to the blockchain.
- It would use two blockchains, with one to record all requests and one to record completed rides. This would allow drivers to easily view pending local requests within a certain time window.
- Pricing would be calculated through optimized algorithms factoring in daily fuel costs rather than taking a large percentage of
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
This document proposes a protocol for trilateral authentication in ad-hoc networks using multicast conventions. It introduces a central authority that manages key authentication and certification to increase security and reliability. Nodes are grouped into clusters, each with a cluster head. For similar clusters, authentication uses time asymmetry based on TESLA. For cross-cluster traffic, it uses secret information asymmetry where the source sends packets to cluster heads, which relay to members. Evaluation shows the central authority uses less memory than previous methods and the protocol has higher efficiency.
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINIRJET Journal
This document discusses cloud storage and retrieval using blockchain. It begins with an abstract that outlines the benefits of decentralized storage systems like improved security, accessibility, and reduced costs compared to traditional centralized storage. The document then discusses challenges with data privacy and security in third-party cloud storage. It proposes a system that would encrypt and distribute data across multiple nodes on a blockchain network. This would improve security, privacy, availability and allow for unused storage resources to be utilized. The document reviews several related works applying blockchain concepts like encryption, smart contracts and distributed ledgers to decentralized storage and highlights some limitations of existing approaches.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
Bibliometric review of application of blockchain in supply chain managementIRJET Journal
This document presents a bibliometric review of research on applying blockchain technology to supply chain management. It analyzed over 19,000 research papers from 2013 to 2023 using bibliometric data and visualization software. The analysis found that research on blockchain in supply chains has increased substantially since 2018, likely driven by new technologies like IoT and big data. A co-word analysis revealed the key research areas are supply chain management, traceability, transparency, financing, and sustainability. Blockchain offers benefits for supply chains like increased transparency and security of transactions, but technical limitations remain a challenge for widespread adoption.
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
IRJET- Blockchain Security Implementation for Financial DomainsIRJET Journal
This document discusses the implementation of blockchain security for financial domains. It begins by introducing blockchain and how its design provides resistance to data modification, fulfilling the need for secure transactions. It then reviews the history and development of blockchain technology. The document outlines the architecture of blockchain, including how blocks are formed and linked in a chain. It discusses how blockchain has been implemented for Bitcoin transactions and describes various aspects of blockchain, such as block time, hard forks, and decentralization. Finally, it discusses how blockchain provides strong security for financial domains by allowing only non-editable, committed transactions without third party involvement.
Performance Evaluation of Vehicular Ad Hoc Network (Vanet) Using Clustering A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
More Related Content
Similar to A Comparative Study for Block Chain Applications in the MANET
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...IRJET Journal
This document summarizes the key challenges of blockchain technology discussed in a research paper, including scalability, security, interoperability, regulation/governance, trust among users, financial resources, skills gaps, public perception, energy consumption, privacy issues, and inefficient technology design. It provides details on the causes and potential solutions for each challenge. The research methodology used surveys and statistical analysis to test hypotheses about blockchain technologies and the use of solutions like layer 2 scaling.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
This document summarizes a research paper that proposes using blockchain technology to securely share data in the Internet of Things (IoT). It first discusses the growing amounts of user data and issues with cloud-based data storage solutions regarding user privacy and access control. It then introduces blockchain as a decentralized solution and reviews previous research on using techniques like proxy re-encryption and attribute-based encryption to realize fine-grained access control of encrypted data. However, most existing solutions have high computational costs or security issues. The document concludes by stating the research will further elaborate on a proposed approach using blockchain and proxy re-encryption to securely store IoT medical data on public clouds.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
This document discusses a proposed decentralized car hailing application that utilizes blockchain technology. Key points include:
- The current centralized car hailing models have issues with user privacy and data ownership as well as high fees taken by the intermediaries.
- The proposed application would use a consortium blockchain model where verified drivers could access available ride requests and act as miners by adding ride completions to the blockchain.
- It would use two blockchains, with one to record all requests and one to record completed rides. This would allow drivers to easily view pending local requests within a certain time window.
- Pricing would be calculated through optimized algorithms factoring in daily fuel costs rather than taking a large percentage of
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
This document proposes a protocol for trilateral authentication in ad-hoc networks using multicast conventions. It introduces a central authority that manages key authentication and certification to increase security and reliability. Nodes are grouped into clusters, each with a cluster head. For similar clusters, authentication uses time asymmetry based on TESLA. For cross-cluster traffic, it uses secret information asymmetry where the source sends packets to cluster heads, which relay to members. Evaluation shows the central authority uses less memory than previous methods and the protocol has higher efficiency.
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINIRJET Journal
This document discusses cloud storage and retrieval using blockchain. It begins with an abstract that outlines the benefits of decentralized storage systems like improved security, accessibility, and reduced costs compared to traditional centralized storage. The document then discusses challenges with data privacy and security in third-party cloud storage. It proposes a system that would encrypt and distribute data across multiple nodes on a blockchain network. This would improve security, privacy, availability and allow for unused storage resources to be utilized. The document reviews several related works applying blockchain concepts like encryption, smart contracts and distributed ledgers to decentralized storage and highlights some limitations of existing approaches.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
Bibliometric review of application of blockchain in supply chain managementIRJET Journal
This document presents a bibliometric review of research on applying blockchain technology to supply chain management. It analyzed over 19,000 research papers from 2013 to 2023 using bibliometric data and visualization software. The analysis found that research on blockchain in supply chains has increased substantially since 2018, likely driven by new technologies like IoT and big data. A co-word analysis revealed the key research areas are supply chain management, traceability, transparency, financing, and sustainability. Blockchain offers benefits for supply chains like increased transparency and security of transactions, but technical limitations remain a challenge for widespread adoption.
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
IRJET- Blockchain Security Implementation for Financial DomainsIRJET Journal
This document discusses the implementation of blockchain security for financial domains. It begins by introducing blockchain and how its design provides resistance to data modification, fulfilling the need for secure transactions. It then reviews the history and development of blockchain technology. The document outlines the architecture of blockchain, including how blocks are formed and linked in a chain. It discusses how blockchain has been implemented for Bitcoin transactions and describes various aspects of blockchain, such as block time, hard forks, and decentralization. Finally, it discusses how blockchain provides strong security for financial domains by allowing only non-editable, committed transactions without third party involvement.
Similar to A Comparative Study for Block Chain Applications in the MANET (20)
Performance Evaluation of Vehicular Ad Hoc Network (Vanet) Using Clustering A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
A Comparative Study for Block Chain Applications in the MANET
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
DOI:10.5121/ijans.2023.13301 1
A COMPARATIVE STUDY FOR BLOCK CHAIN
APPLICATIONS IN THE MANET
Sangheethaa S
College of Information Technology, University of Fujairah, Fujairah, UAE
ABSTRACT
MANET- Mobile Ad-hoc Networks are famous for their infrastructure-less arrangement for
communication. In this network, nodes are self-organized and can act as router. They are battery operated
and self-organizing. Block chain is a new concept from 2008 and researchers are trying the possible
application of Block chain in many sectors including MANETs. This paper surveys the existing researches
done in applying block chain in a MANET environment. Block chain is mainly used in MANETs for
improving security while routing packets from one node to another. Some researchers have proposed trust
models using block chain. This paper reviews some of the existing approaches where block chain is used in
MANETs for routing the packets, creating trust models, and dealing with network partitioning problem and
scalability problem. This paper acts as a review paper to study on block chain applications in MANET.
KEYWORDS
Block chain, MANET, Routing, Trust models
1. INTRODUCTION
Mobile Ad hoc Networks (MANETs) [1] are a type of wireless ad hoc networks that enable
mobile devices to communicate with each other without relying on a fixed infrastructure or
centralized control. In MANETs, each device acts as a node that can send, receive, and forward
data packets to other nodes in the network.
The nodes in the MANET are laptops, smartphones, or tablets, equipped with wireless interface
for communication. These devices can form a network by establishing direct communication
links with nearby nodes, and by relaying data packets to nodes that are out of range.
MANETs are particularly useful in situations where a fixed infrastructure is unavailable or
unreliable, such as in emergency and disaster response scenarios, military operations, and remote
areas where there is no existing communication infrastructure. They are also useful in
environments where devices need to communicate with each other without relying on a
centralized control, such as in vehicular networks and Internet of Things (IoT) applications.
However, MANETs face several challenges, such as limited bandwidth, battery life, and security
threats. The limited bandwidth and battery life of mobile devices can affect the performance and
reliability of the network, while the lack of a centralized control and the dynamic nature of the
network make it vulnerable to security threats such as eavesdropping, Denial of Service Attack
and packet drops by malicious nodes.
Various researches have been done to improve the MANET environment by means of Routing,
congestion control and security mechanisms. This paper gives a review of existing researches
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
2
which finds their application of Blockchain in MANET environment. The paper is organized as
follows. The next 2 sections give the introduction to MANET and Blockchain . Section 4 gives
the already existing review or comparative study papers in this area. Section 5 to 9 gives review
of the research papers as on date which deals with Blockchain and MANET finally the
conclusion section. Table 1 gives the summary of research works discussed in this paper.
Table 1 Comparison table
Paper Use of blockchain for Remarks
[2] Trust control Use of PBFT, is introduced.
[3] Trust management Introduced concept of new consensus model called as
Delegated Proof of Trust mechanism
[4] Routing Introduced approach to calculate reputation of a node
and sharing it with others over AODV Protocol.
[5] Network partitioning problem Uses the DAG (Directed Acyclic Graph)structure in a
permissioned Blockchain.
[6] Routing Enhances OLSR protocol to use reputation based on
blockchain ledger concept.
[7] Growth problem By using a special genesis block to control the growth to
reduce the disk space usage.
2. BLOCKCHAIN BACKGROUND
Blockchain is a distributed ledger technology that enables secure, transparent, and tamper-
resistant record-keeping of transactions or data. It was originally introduced in 2008 as a
foundational technology for Bitcoin [2], a decentralized digital currency system, but now it is
applied to various fields where the aim is to eliminate a third party. At its core, a blockchain is a
digital ledger that records a series of transactions or data blocks in a chronological and immutable
manner. Each block contains a hash of the previous block, forming a chain of blocks, hence the
name "blockchain". Once a block is added to the chain, it cannot be modified or deleted without
invalidating all subsequent blocks, making it resistant to tamper and fraud.
Blockchain technology [3] is based on a distributed network of nodes, where each node maintains
a copy of the ledger and participates in the validation of new transactions or blocks. Transactions
are validated by the nodes through a consensus mechanism, which ensures that all nodes agree on
the validity of the transactions before they are added to the blockchain.
Figure 1 shows the principles of blockchain technology. The consensus mechanism used in
public Blockchain are categorized into 3. Proof of work, Proof of stake, delegated proof of stake.
Details of these mechanisms can be seen from many research work like [4]. The basis of
blockchain is the complex cryptographic algorithms.
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
3
Figure 1 Principles of Blockchain (drawn using draw.io)
The decentralized and transparent nature of blockchain technology offers several advantages [5],
including increased security, transparency, and efficiency. It eliminates the need for
intermediaries or central authorities, reducing costs and improving trust between parties. It also
enables new forms of peer-to-peer transactions, smart contracts and De-centralized
Applications(DAAPs)
Blockchain has found its place in supply chain management, logistics management, Healthcare
data privacy, educational genuineness verification etc.
3. LITERATURE REVIEW
There are researches done in application of Blockchain in MANETS, VANETS and also the new
kind of network called FANETs. These researches are focusing on how blockchain technology
can be applied for improving performance or improving security in Mobile Ad hoc Networks or
Vehicular Networks or Internet of Things.
The authors of [6] have given a comprehensive survey of application of Blockchain in Vehicular
networks. They have given a detailed review of blockchain based VANETs, security constraints
to be considered, challenges and simulation tools that could be used in VANET environment to
test Block chain.
In [7] the authors have done a systematic comparison of application of Blockchain in Vehicular
networks. [8] gives a detailed comparison of approaches for incentive based data forwarding in
MANETs and approaches to use blockchain for data forwarding.
Authors of [9] gives the research directions and guidelines for the authors to use blockchain
technologies in IoTs, MANETS and VANETS.
The author of this paper reviews about applications of Blockchain in MANET environment
specifically related to security, trust management and scalability issues.
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
4
4. USING BLOCKCHAIN TECHNOLOGY IN MANETS SECURITY
The paper [10] explores the use of blockchain technology for trust control among nodes of
MANETs. The authors give explanation of MANET security challenges and Blockchain
technology. They also talk about the limitations of Blockchain when applied in MANET. They
discuss the disadvantages of using Proof of stake and Proof of work in a MANET environment.
Proof of Work is more computing intensive, Proof of Stake is challenging in MANET
environment because of the highly dynamic nature of MANET.
Some blockchain technologies like hyperledger are using PBFT- Practical Byzantine Fault
tolerance. This approach requires 2 out of 3 nodes to agree on the agreement. In MANET scaling
may be an issue due to constant breaking of links. So PBFT may not be effective. The authors
also analyzed about applying blockchain based concepts for trust management, which is
discussed in the next section.
5. BLOCKCHAIN- BASED LIGHTWEIGHT TRUST MANAGEMENT IN MOBILE
AD-HOC NETWORKS
Blockchain-Based Lightweight Trust Management is a technique used in Mobile Ad-Hoc
Networks (MANETs) [11] to establish trust between nodes in a decentralized and distributed
manner. In MANETs, trust management is a crucial factor to ensure secure communication
among the nodes. The traditional centralized trust management systems are not suitable for
MANETs as they require a centralized authority to manage the trust, which is not practical in a
decentralized network. Therefore, a decentralized approach is needed to manage trust in
MANETS.
Blockchain-Based Lightweight Trust Management (BLTM) is a technique used in Mobile Ad-
hoc Networks (MANETs) to improve the security and reliability of communication among nodes.
BLTM combines the trust management technique with blockchain technology to establish a
secure and transparent trust model among nodes.
BLTM protocol for MANETs, which consists of four phases as shown in Figure 2. They are trust
evaluation, blockchain-based consensus, block generation, block maintenance phase.
In the trust evaluation phase, each node evaluates the trustworthiness of its neighboring nodes
based on various parameters such as the packet forwarding rate, response time, and packet drop
rate. The node then assigns a trust value to each neighboring node based on the evaluation.
In the blockchain-based consensus phase, the node shares its local blockchain with the
neighboring nodes to reach a consensus on the trust values assigned to each node. The consensus
mechanism used in BLTM is a lightweight consensus mechanism that reduces the computational
overhead and ensures the consensus is reached in a timely manner. It is named as Delegated
Proof of Trust mechanism (DPoT). It works with OLSR protocol. They have adopted the DCFM
scheme to develop DPoT. DPoT uses the Validator and delegator nodes for achieving consensus.
In the block generation phase, to create a block in a blockchain system, it's necessary to
determine what information will be included in the block and how it will be configured by the
delegate node. Once transactions in the pool are collected into a block, the blockchain system
creates a hash value using the SHA-256 algorithm, which directly comes from the transaction
data, and appends it to the block. The previous block's hash is also included as data in the current
block to link the blocks together, creating a chain. The block hash is designed to accept only a
specific format, such as a hash signature that starts with 10 consecutive zeros.
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
5
In a secure Mobile Ad-Hoc Network (MANET), a blockchain can be used to ensure trust between
nodes. Each block in the blockchain contains a set of transaction data and metadata, which
includes a timestamp, transaction hash, delegate ID, and nonce. When a transaction is hashed, the
transaction generator ID and related transaction values are included, along with the delegate ID.
This helps to ensure that block transactions are trustworthy and cannot be repudiated by any of
the participating nodes. The first block in the blockchain, known as the "genesis block," is created
with an empty list of transactions when the network is initially formed.
Figure 2. Phases of BLTM Protocol
6. REPUTATION BASED ROUTING IN MANETS USING BLOCKCHAIN
Maqsood Ahamed et al proposed a reputation-based routing protocol that uses blockchain
technology in MANETs [12]. This protocol is implemented over AODV [14] protocol. This
paper redefines the cost calculation of AODV protocol. They propose new link cost between the
nodes using reputation score. The most reputed path is selected for routing to avoid malicious
nodes in the route. Reputation is maintained in the blockchain and it is validated by part of the
network nodes called as miners. A reputation value is assigned to nodes, based on their behavior
in participating network operations. A miner, monitors the transaction done by the nodes in its
vicinity and classifies them as good or bad. These transactions are combined together to form a
block. They claim that the use of blockchain in routing has 2 advantages. 1. It provides
immutable record of behavior of the nodes. 2. It acts as a gauge to validate credibility of the
miners, by increasing difficulty level [12].
Anyhow, the paper does not talk more about the consensus mechanism followed for agreeing
upon a block. The need for such immutable record in MANET environment is also not justified.
7. BLOCKGRAPH
Blockgraph [13] is a blockchain-based framework designed for Mobile Ad hoc Networks
(MANETs). The goal of Blockgraph is to use DAG (Directed Acyclic Graph) based structure to
avoid network partition problem. The Blockgraph framework, consists of three components: the
Consensus system, the Block Management System and the Group management system[13]. The
consensus system is avote based consensus mechanism that can be used in Blockgraph, as Block
graph is a permissioned network. There are 2 sub systems in consensus system- 1. Leader
Election 2. Log replication. Every network partition will get a new leader. All the nodes in the
network are assumed to be trusted. The block is propagated to all peers by the leader node. The
Block management system takes care of the local block structure including Creation, validation
and ordering of blocks, recovery of missing blocks. The Group management system- runs in
every node and detect if any change happens in the topology. Groups are reformed as a result of
topology change. The main objective of this paper is to use Blockgraph to solve the issue of
network partitioning by using permissioned Blockchain.
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
6
8. BLOCKCHAIN TECHNOLOGY TO ENHANCE SECURITY IN MANETS
In [14],a framework is proposed for usingBlockchain technology to enhance security in
MANETs. This approach modifies the existing Optimized Link State Routing Protocol
(OLSR)protocol in MANETS to include blockchain and reputation. OLSR uses Multi point
Relays (MPR) as relay nodes in routing. Here, the same nodes are used for sharing the blockchain
with other MPR nodes. The blockchain managed by MPRs are called as MPR Blockchain. This is
used to calculate the credibility of other nodes while selecting a route, thus avoiding malicious
nodes.
9. FRAMEWORK FOR SUPPORTING CONNECTIVITY OF VANET/MANET
The paper [15] proposes a framework for supporting connectivity of VANET/MANET network
nodes and elastic software configurable security services using blockchain with floating genesis
block. The hindrance to use blockchains in MANET /VANET is the need to store the blockchain
which consumes disk space due to its growth[14]. The authors of this article proposes a solution
to this hindrance. There will be fixing blocks. Fixing blocks will store the details of the initial
status of the system. So it can act as a genesis block for the next chain. This floating genesis
blocks are digitally signed by trusted nodes to avoid any other cyber-attacks. This article also
gives a comparison table about the existing approaches to solve the growth problem of
Blockchain.
10. CONCLUSION
Blockchain models uses complex cryptographic mechanism for verification and trust
management. But MANET devices are battery operated, and they cannot afford lot of computing
intensive operations which are used in blockchain technology for securing operations. So when
we use blockchain in MANET environment, there is a tradeoff between the security level,
performance and the complexity. This paper discussed the existing approaches of applying
Blockchain technology in MANETS especially in routing, trust management and scalability
issues. The paper analyzed about the solutions given by various researchers and given review of
using blockchain in MANETs. The future work will be to propose a framework for using
blockchain in MANET environment by considering the tradeoffs.
REFERENCES
[1] https://en.wikipedia.org/wiki/Wireless_ad_hoc_network
[2] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008
[3] Risius, Marten & Spohrer, Kai. (2017). A Blockchain Research Framework: What We (don’t)
Know Where We Go from Here, and How We Will Get There. Business & Information Systems
Engineering. 59. 385-409. 10.1007/s12599-017-0506-0.
[4] Bahareh Lashkari, Petr Musilek, “Comprehensive Review Of Blockchain Consensus Mechanisms”,
I EEE Access. PP. 1-1. 10.1109/ACCESS.2021
[5] Fernández Iglesias, Manuel José. (2023). Introduction to Blockchain, Smart Contracts and
Decentralized Applications. 10.17605/OSF.IO/FQ3P9.
[6] T. Alladi, V. Chamola, N. Sahu, V. Venkatesh, A. Goyal and M. Guizani, "A Comprehensive
Survey on the Applications of Blockchain for Securing Vehicular Networks," in IEEE
Communications Surveys & Tutorials, vol. 24, no. 2, pp. 1212-1239, Secondquarter 2022, doi:
10.1109/COMST.2022.3160925.
[7] Caciano Machado, Carla Merkle Westphall, Blockchain incentivized data forwarding in MANETs:
Strategies and challenges, Ad Hoc Networks, Volume 110, 2021,
https://doi.org/10.1016/j.adhoc.2020.102321
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 13, No. 3, July 2023
7
[8] Saad M, Khan MK, Ahmad MB. Blockchain-Enabled Vehicular Ad Hoc Networks: A Systematic
Literature Review. Sustainability. 2022; 14(7):3919. https://doi.org/10.3390/su14073919
[9] S. Manimurgan, T. Anitha, G. Divya, G. C. P. Latha and S. Mathupriya, "A Survey on Blockchain
Technology for Network Security Applications," 2022 2nd International Conference on Computing
and Information Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 440-445, doi:
10.1109/ICCIT52419.2022.9711616.
[10] A. S. Abdel-Sattar and M. A. Azer, "Using Blockchain Technology in MANETs Security," 2022
2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), Cairo,
Egypt, 2022, pp. 489-494, doi: 10.1109/MIUCC55081.2022.9781696
[11] Lwin MT, Yim J, Ko Y-B. “Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc
Networks.” Sensors. 2020; 20(3):698. https://doi.org/10.3390/s20030698
[12] M. A. A. Careem and A. Dutta, "Reputation based Routing in MANET using Blockchain," 2020
International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru,
India, 2020, pp. 1-6, doi: 10.1109/COMSNETS48256.2020.9027450
[13] Cordova Morales, David & Laube, Alexandre & Thi Mai Trang, Nguyen & Pujolle, Guy. (2020).
“Blockgraph: A blockchain for mobile ad hoc networks”. 4th Cyber Security in Networking
Conference (CSNet) 2020,1-8. 10.1109/CSNet50428.2020.9265532.
[14] Mouchfiq, Nada & Benjbara, Chaimae & Habbani, Ahmed. (2020). “Security in MANETs: The
Blockchain Issue”. Advanced Communication Systems and Information Security, 10.1007/978-3-
030-61143-9_18.
[15] Busygin, Alexey & Kalinin, Maxim & Konoplev, Artem. (2018). “Supporting connectivity of
VANET/MANET network nodes and elastic software-configurable security services using
blockchain with floating genesis block.” SHS Web of Conferences. 44. 00020.
10.1051/shsconf/20184400020.
AUTHORS
Dr Sangheethaa S has completed her PhD from Anna University, India in Information
and communication Engineering in the year 2012. She has completed ME in Network
and Internet Engineering from Karunya University, India and BE in Information
Technology from Bharathiyar University India. Her area of interest is Mobile ad hoc
networks, security in mobile networks and recently her research area is in Blockchain.
Currently she is working as Associate professor in the College of Information
Technology, University of Fujairah, Fujairah, United Arab Emirates.