IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Active vibration control of smart piezo cantilever beam using pid controllereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Active vibration control of smart piezo cantilever beam using pid controllereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Face detection for video summary using enhancement based fusion strategyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Power efficient and high throughput of fir filter using block least mean squa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Planning of intermediate transport system for bengaluru metropolitan city to ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Impact analysis of epda and ipda attack with increasing node mobility in data...eSAT Journals
Abstract In this Paper, two types of denial of service attacks over mobile ad hoc networks are implemented and their impact is analyzed on data communication process when using a reactive routing protocol for data communication. The reactive routing protocol well known Ad-hoc on-demand distance vector (AODV) routing protocol. In the Implemented attacks, a malicious node i.e., attacker will drop data packets that it receives for forwarding towards the destination of the packet. The attacker can do the attack by either making itself one of the intermediate nodes on the active route. The attackers can be one of the intermediate nodes in two ways. In the first method the attacker is waiting that some route discovery process will select it as one of its intermediate node and then it will drop all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false information to become the part of an active route. Due to the wrong information spread by the malicious nodes the routing tables of the source node enters a route for the destination that will surely includes the attacker in the route. The Implemented attack is simulated using a tool Exata and results are drawn using graphs to show the impact of the attack on data communication. Finally, a mechanism is proposed through which both the attack and attackers can be detected during the data communication and can be avoided in further communication process. Keywords: AODV, DoS Attacks, EPDA & IPDA Attacks, MANET
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Journals
Abstract Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery Ratio. Keywords: Ad hoc, MANET, DSDV, AODV, Manhattan Grid, Throughput, Overhead
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
Discovering adaptive wireless sensor network using eSAT Journals
Abstract When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance function and to store these values we are using vector compression method so that there is no need to store the data into the sink node. Because of this the message, time and space complexity of node will be decreases. Keywords- Duty cycle, Time dependent, β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to A comparitive study of efficient anonymous routing protocols in manet (20)
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
A comparitive study of efficient anonymous routing protocols in manet
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 655
A COMPARITIVE STUDY OF EFFICIENT ANONYMOUS ROUTING
PROTOCOLS IN MANET
Anupriya Augustine1
, Jubin Sebastian E2
1
M. Tech Scholar, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur
2
Assistant Professor, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract
Mobile Ad Hoc Network (MANET) is a type of wireless network without a fixed topology consist a set of self organized nodes which
are randomly, frequently and unpredictably mobile. MANET has a wide range of applications in civilian and military systems because
of its infrastructure less nature and rapid self configuration capability. MANET is an open environment and it is susceptible to many
security attacks due to dynamic topology and lack of centralized monitoring authority. Anonymous routing protocols conceal the
identities about the route, source and destination to provide security and privacy from intruder’s attacks. This paper provides an
overview of most efficient anonymous routing protocols in MANET and examines the security efficiency of these protocols. The
parameters consider for the comparative study of these protocols are the number of actual participating nodes in the network, latency
in packet transmission, packet delivery rate and the transmission cost. The protocols taken in to account include, AO2P, ALARM and
ALERT.
Keywords- Mobile Ad Hoc Networks, security, anonymity, routing protocols.
----------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Without fixed topology collection of mobile nodes forming an
instant network is called ad hoc network. In this network
nodes perform as both router and host simultaneously, it will
move out or join in the network freely. Ad hoc network does
not have any base infrastructures such as in the conventional
networks. In the computing industry the importance of
Wireless network is become very high. Wireless network are
adapted to enable mobility to a great extend. There are two
types of network, they are Infra-structured network and ad-hoc
network. In Infra-structured network have the network with
fixed and wired gateway. In ad hoc networks, where all
devices have equal status on a network and are free to
associate with any other ad hoc network devices in link range.
MANET is very attractive in tactical and military applications
because of rapidly deployable and self-organizing
configurability. Like tactical communications in a battlefield,
where the environment is unfavorable, but fast network
establishment self reconfiguration and security-sensitive
operations are absolutely essential. For providing security for
MANET so many anonymous [1] routing protocols are
developed.
2. ROUTING IN MANET
Routing protocols in MANET are divided in to three main
groups. They are reactive, proactive and hybrid routing
protocols. Depending on the mechanism used for routing
purposes, they are mainly included in to two categories, they
are hope by hope encryption and redundant traffic.
MANET Routing Protocols
Proactive or Reactive or Hybrid
Table driven On-demand
Fig 1.MANET Routing Protocols classification
2.1 Proactive or Table-Driven Routing Protocols
Proactive routing protocols also called table driven routing
protocols. In this type of protocols a table contains all the
latest and consistent information of all the nodes in the
network. Periodic information about the dynamics of the
nodes is updated in the table for an active network. Routing
table information is used for the data transmission in the
network. Protocols in this category experiences lower latency.
2.2 Reactive or On-Demand Routing Protocols
Another group of MANET routing protocol is reactive or on-
demand routing protocol. In this type the protocol establishes
a route if and only if a node wants to route data packets.
Route discovery process increases transmission latency in this
category of protocols.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 656
2.3 Hybrid Routing Protocols
The third class of MANET routing protocol is the hybrid
protocols. It combines the advantages of both proactive and
reactive routing protocols and reduces the limitations of these
two. Hybrid type reduces the traffic overhead in proactive and
transmission latency in reactive protocols.
3. ROUTING ATTACKS IN MANETS
Active cooperation of all the nodes is required to provide
routing between the source and destination in the network. Ad
hoc networks are vulnerable to different types of attacks due
to dynamic, distributed infrastructureless nature of MANETs,
and lack of centralized authority [2].
The attacks to be faced by MANETs are very high those to be
faced by the traditional wireless networks. MANETs are
susceptible to both passive eavesdrops as well as active
malicious attacks due to the accessibility of the wireless
channel to both the genuine user and attacker. The main
problem in the implementation of complex security algorithms
are the limited power backup and limited computational
capability of the individual nodes. Frequent network
reconfigurations because of the nodes mobility create more
chances for attacks.
Different types of attacks on MANET are passive and active
attacks.
In passive attack the attacker listens and taps the
communication between two nodes. Passive attacks are
adverse for the security and privacy of communication.
Operation of the communication channel is not disturbed by
the passive attacker. But the attacker explores some valuable
information about the communication channel. Topology of
the network or the relationship between the nodes is used by
the passive attacker to find out the network map. This can
create some active attacks in the network.
Active attacker can inject unwanted information in the
communication channel. It can also listen and modify the
information in that channel. Active attackers can replay,
modify or deletes some packets from the network. In a replay
attack, the attacker resends a packet that was already
transmitted. In modify attack, the attacker can modify the
active packets with unwanted information which causes
incorrect updates of the routing table. So the packets are
transmitted to wrong destinations. Active attacks create
network congestion problems.
The well known routing attacks in MANETs are discussed
below.
3.1 Flooding Attack:
It is also known as Routing Table Overflow. In this attack the
attacker node send more information to the network which
causes overflow of the routing tables.
3.2 Black Hole Attack:
In this attack, the attacker nodes reply false route information
for the route request. If the malicious route is established then
the current active route is routed through this new attacker
route and the data in the network may be misused or
discarded.
3.3 Wormhole Attack:
In this attack two attacking nodes cooperate between each
other. Capturing routing traffic is down by one attacker at one
point of the network and tunnels it to another point in the
network. A private high speed communication link is shared
between the two attackers. The network is selectively injected
the tunnel traffic by the attackers. Then the routes established
under the control over the wormhole link. The wormhole
attacks distort the topology of the network.
4. ANONYMOUS ROUTING PROTOCOLS
In the past years number of anonymous routing protocols are
proposed for MANET [3] - [15] the following four phases are
included most commonly.
For to providing anonymity to source destination and route
anonymous routing protocols are essential in MANET. The
attacker can try different path to hack the data between the
source and destination also able to find the identity of source
and destination. There are different anonymous routing
protocols are used in MANET to provide anonymity.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 657
4.1 AO2P: AD HOC On-Demand Position Based
Private Routing Protocol
Fig 2.Route discovery in MANET
In AO2P route discovery is done by using only the position of
the destination. Other information such as forwarding nodes
positions are hiding from the network. Real identities of
source, destination and forwarding nodes are confidential.
Date packet transmission uses the pseudo identifiers of the
source, destination and forwarding nodes.
Route is established by receiver contention scheme. In this
protocol receivers (node receiving the rreq message) are
included in different class. The receiver which is closer to the
destination is in the higher priority class. Highest priority
receiver is the destination node. A node in the network obtains
its position through GPS. Every node has a region around a
fixed center called virtual home region (VHR). Position
information of the node is updated to the servers in the VHR.
This distributed secure position service is named as
DISPOSER which improves the position security.
R-A02P is another method to provide more destination
anonymity. In this position of a reference point is used for
establishing the route instead of destination position.
4.2 Alarm: Anonymous Location Aided Routing
ALARM can solve a number of issues in MANET. ALARM
provides secure communication and privacy in both suspicious
and hostile networks with reasonable efficiency. The ALARM
[17] is a privacy preserving and secure link state based routing
protocol. Node anonymity and protection from tracking are
objectives of privacy. Security means nodes authentication
and integrity of locations secure data forwarding in ALARM
is by using the node’s current locations.
Identification of nodes at certain locations in ALARM is relies
on group signature to create pseudonyms. Security against
active and passive attacks and privacy features are provided by
ALARM. It is due to the integration of advanced
cryptographic techniques such as group signature in this
protocol which gives some features including authentication of
node, integrity of the data, untraceability and anonymity.
Group signature is another form of public key signature with
further privacy features. The group manager (GM) helps to
identify the nodes which are provided with the group
signature. This technique contributes additional security for
the MANET.
Initialization:
Group signature scheme is started by the GM. Group members
are the nodes that are active for that session. A private key is
generated by all the group members and this key is concealed
from other nodes. Group signature is produced from this
private key. Each node also creates a public key and is
revealed only for GM. Group public key is common to all
members in the group.
Operation:
a) Time duration is divided into slots having length T. A node
creates a temporary public private key pair, PK-TMPs and
SK-TM at the beginning of every time slot.
b) Location co-ordinates, public key, group signature and time
stamp of all the group members are contains in a location
announcement message (LAM). This LAM is broadcasted in
to the MANET. This procedure is shown in figure 3.
c) After receiving a LAM the node check this LAM is already
received or not. If it is received at the first time, node
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 658
authenticates the group signature and the time-stamp. If this is
valid, then the LAM is broadcasted again and collects all
current LAMs of each node in the network. A node
connectivity graph and geographical map can be made from
this information. It is shown in figure 4.
d) Communication between a node and a node at another
location is operated by first checking that whether there is a
node at that location. If a node is present, then the temporary
ID of the destination is obtained by transmitting a message to
the destination's current location. A session key is used to
encrypt the data and this session key is also encrypted under
the public key. The receiver node decrypts session key first
and then decrypts the message.
Fig 3.ALARM sender process
Fig 4.ALARM receiver process
4.3 Alert: Anonymous Location-Based Efficient
Routing Protocol
Route identity, source identity and destination identity are the
main goals of anonymous routing protocols. The existing hop
by hop encryption or redundant traffic concepts for providing
anonymity results high cost. Hierarchical partition is the main
technique used in ALERT [18]. The network is partitioned
dynamically in to vertical and horizontal zones in ALERT.
The algorithm used for data transmission is Greedy perimeter
stateless routing (GPSR). Different mobility models such as
random way point model and group mobility model can be
used for ALERT. Communication latency is reduced to a great
extend by using ALERT.
ALERT restricting a node’s visibility only to its neighbors.
Here the same initial and forwarded messages are created. So
an attacker cannot identify whether a node is a source or a
forwarding node. All this factors contributes to the
achievement of anonymity.
Another mechanism used in ALERT to provide anonymity is
the “notify and go”. In this a number of nodes send
information at the same time as the source sends packets. This
hides the source among other nodes and provides high
anonymity protection for the source. The number of nodes in
the destination zone provides destination anonymity. The
number of nodes in destination depends on the node density
and destination zone size. ALERT is also providing protection
from intersection attacks and timing attacks.
5. PERFORMANCE COMPARISON
The comparison of the three protocols are worked out based
on some parameters such as the number of actual participating
nodes, latency in packet transmission, packet delivery rate and
transmission cost.
5.1 Number of Participating Nodes in the Network:
ALARM and AO2P is based on the GPSR method. Next hop
in GPSR scheme is always the node which is nearest to the
destination. If such a node does not present, then GPSR
practice perimeter forwarding to find the next hop. ALARM
and AO2P uses the GPSR baseline for routing purposes.
ALERT generates different routes between each source and
destination pair since it produces many actual participating
nodes. The actual participating nodes in ALERT also include
the random forwarders. It contributes high routing anonymity
in ALERT. GPSR always proceeds through the shortest paths.
So the number of actual participating nodes is less compared
to ALERT.
Increased number of participating nodes in ALERT creates
more randomized routes between source and destination. So it
is very difficult to detect this routes and it provides great
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 659
anonymity for the route. When the node density increases,
shorter routes are easily obtained in GPSR. So the number of
actual participating nodes is almost steady with the increase in
node density. The GPSR routing paths in ALARM and AO2P
are easily identified by the attackers. This reveals that ALERT
provides more anonymity than the AO2P and ALARM.
5.2 Latency in Packet Transmission
Latency is defined as the time difference between the packet
transmission and receiving. Latency includes the time for both
routing and cryptography. ALARM and AO2P take the
shortest path for routing of packets. ALERT does not take the
GPSR mechanism. Even thought ALERT not establishing the
shortest path, the latency of ALERT is very much lower than
ALARM and AO2P. More routing hops are generated in
ALERT than AO2P and ALARM. But the latency in ALERT
is significantly lower than the other two. This is because of the
time needed for the public key encryption of ALARM and
AO2P. ALERT follows symmetric key encryption only once
which reduces the latency.
The transmission between two random forwarders in ALERT
is depends on GPSR, it helps to reduce the latency further
more. ALARM requires a periodic authentication of adjacent
nodes and AO2P requires an encryption in each node. This
process outweighs the low latency due to shortest path in
ALARM and AO2P.
AO2P has a contention phase and it increases the path length.
So AO2P has latency higher than ALARM. Increase in node
density decreases latency of ALARM, AO2P and ALERT.
Improved node density creates more relay nodes and shorter
paths. Latency of ALARM and AO2P can be reduced to an
extent by reducing the public key encryption operations.
5.3 Packet Delivery Rate:
Fraction of successfully delivered packets to a destination is
called the delivery rate. When the node moving speed
increases without the destination updates, the delivery rates
are reduced. In view of mobility of destination, the delivery
rates are reduced in all the protocols. ALERT has higher
delivery rates compared to AO2P and ALARM, as a result of
final local broadcast process.
5.4 Transmission Cost
The number of hops per packet is higher in ALERT than
ALARM and AO2P. Total routing hop counts divided by the
number of packets sent gives the number of hops per packet.
Routing path length of ALERT is higher than the shortest path
of AO2P and ALARM. It is because of the random node
selection of ALERT. Since compared to ALARM and AO2P,
ALERT has relatively more hop per packet. This slightly
increases the routing cost. Presence of more node density in
ALERT gives better route anonymity than AO2P and
ALARM. Increase in the routing cost of ALERT is avoidable
when considering the route anonymity than the other
protocols. Analysis of the hop by hop encryption based AO2P
method and the redundant traffic based ALARM method,
gives that ALERT having lower computing cost.
AO2P and ALARM is with equal number of hops per packet.
ALARM with id dissemination hops for providing anonymity
has higher number of hops per packet than others, and is
doubled than that of ALERT. ALARM with id dissemination
hops required periodical dissemination of node. This increases
the cost dramatically in ALARM than others.
In summary, ALERT achieves enhanced route anonymity than
ALARM and AO2P. ALERT has more number of actual
participating nodes and its random relay node selection boost
the anonymity. Transmission cost and latency in packet
transmission are lower in ALERT compared with the other
two. ALERT contributes better data delivery rate than
ALARM and AO2P.
Table 1.Summary of anonymous routing protocols comparison
Protocol Proactive/
Reactive
Routing
Mechanism
Topology/
Geographic
Single/
Multiple
route
Identity
anonymity
Location
anonymity
Route
anonymity
AO2P Reactive Hope by hope
encryption
Geographic Single Source,
Destination
Source,
Destination
No
ALARM Proactive Redundant
traffic
Topology Multiple Source,
Destination
Source No
ALERT Reactive Randomize Geographic Multiple Source,
Destination
Source,
Destination
Yes
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 660
6. CONCLUSIONS
MANET is a dynamic, infrastructurless and decentralizes
network. Due to these characters anonymous routing protocols
are required to provide a very high level of security in
MANET. Different techniques are used in anonymous
protocols to achieve the goal of anonymity. Well known,
efficient and latest anonymous routing protocols used in
MANET such as AO2P, ALARM and ALERT are examined
in this paper.
ALERT provides route anonymity, identity, and location
anonymity of source and destination more than AO2P and
ALARM. Rather than relying on hop-by-hop encryption and
redundant traffic, ALERT mainly uses randomized routing
and high node density to provide high anonymity. ALERT
have low transmission cost and latency in packet transmission
than the other two protocols. Improved data delivery rate
enhances the performance of ALERT.
The limitations of other protocols comparing with the ALERT
are, existing anonymous routing protocols generate a
significantly high cost, which exacerbates the resource
constraint problem in MANETs.
Currently complete anonymous protection of MANETs is not
achieved. So making changes in the existing protocols will
create a new anonymous protocol meeting all the requirements
of an anonymous protocol.
REFERENCES
[1] A. Pfitzmann and M. Hansen, “Anonymity,
Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management - A
Consolidated Proposal for Terminology,” Tech. Rep.,
February 2008.
[2] J. Kong, X. Hong, M. Y. Sanadidi, and M. Gerla,
“Mobility Changes Anonymity: Mobile Ad Hoc
Networks Need Efficient Anonymous Routing,” in
ISCC, 2005, pp. 57–62.
[3] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK:
Anonymous Ondemand Routing in Mobile Ad Hoc
Networks,” IEEE Transactions on Wireless
Communications, no. 9, 2006.
[4] L. Yang, M. Jakobsson, and S. Wetzel, “Discount
Anonymous On Demand Routing for Mobile Ad Hoc
Networks,” SECURECOMM, vol. 6, 2006
[5] ] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Secure
Dynamic Distributed Routing Algorithm for Ad Hoc
Wireless Networks,” ICPP Workshops, 2003, pp. 359–
366.
[6] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba,
“SDAR: A Secure Distributed Anonymous Routing
Protocol for Wireless and Mobile Ad Hoc Networks,”
IEEE LCN ’04, 2004.
[7] B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H.
Deng, “Anonymous Secure Routing in Mobile Ad-Hoc
Networks,” LCN ’04, 2004.
[8] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient
Anonymous Dynamic Source Routing for Mobile Ad-
hoc Networks,” SASN ’05, 2005, pp. 33–42.
[9] J. Kong and X. Hong, “ANODR: anonymous on
demand routing with untraceable routes for mobile ad-
hoc networks,” MobiHoc ’03, 2003.
[10] S. Seys and B. Preneel, “ARM: Anonymous Routing
Protocol for Mobile Ad hoc Networks,” AINA ’06,
2006.
[11] Jiejun Kong, Xiaoyan Hong, “An Anonymous On
Demand Routing Protocol with Untraceable Routes for
Mobile Ad-hoc Networks”, UCLA computer science
department technical report 030020.
[12] Karim El Defrawy and Gene Tsudik,” ALARM:
Anonymous Location-Aided Routing in Suspicious
MANETs”, IEEE Transactions on Wireless
Communications.
[13] Haiying Shen and Lianyu Zhao,” ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs”, IEEE Transactions on Wireless
Communications.
[14] T. Camp, J. Boleng, and V. Davies, “A Survey of
Mobility Models for Ad Hoc Network Research,”
Wireless Communications and Mobile Computing, vol.
2, pp. 483-502, 2002.
[15] X. Hong, M. Gerla, G. Pei, and C.C. Chiang, “A Group
Mobility Model for Ad Hoc Wireless Networks,” Proc.
Second ACM Int’l Workshop Modeling, Analysis and
Simulation of Wireless and Mobile Systems (MSWiM),
1999.
[16] X.X. Wu and B. Bhargava, “AO2P: Ad Hoc On-
Demand Position-Based Private Routing Protocol,”
IEEE Transactions on Mobile Computing, vol. 4, no. 4,
pp. 335-348, July 2005.
[17] Gene Tsudik and Karim El Defrawy,” ALARM:
Anonymous Location-Aided Routing in Suspiciou
ANETs”, IEEE Transactions on Mobile Computing,
Volume: 10, Issue: 9,September 2011
[18] Haiying Shen and Lianyu Zhao, “ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs”, IEEE Transactions on Mobile
Computing, Vol. 12, NO. 6, June 2013