Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
This document discusses an advanced intrusion detection system (IDS) approach to detect wormhole attacks in vehicular ad-hoc networks (VANETs). It begins by introducing VANETs and some of their vulnerabilities, including wormhole attacks where malicious nodes create private tunnels to manipulate message routing. It then describes the proposed IDS, which evaluates decision packets at destination nodes to detect wormhole attacks. Simulation results are presented showing metrics like positive predictive value, negative predictive value, and specificity to evaluate the IDS's ability to correctly identify attacks. The paper concludes the IDS approach can help detect wormhole attacks, which pose a serious security threat in VANETs.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure approaches proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and deployment environments.
This document discusses secure data aggregation in vehicular ad-hoc networks (VANETs). It proposes a scheme called Secure Dynamic Aggregation (SeDyA) that has three phases: 1) an aggregation phase where vehicles compute functions over data to generate aggregate values, 2) a finalization phase where vehicles verify messages and generate multisignatures for security, and 3) a dissemination phase where finalized messages are distributed to vehicles outside the aggregation area. The goal is to efficiently aggregate and securely share information like traffic speed and density while addressing security issues like Sybil, inflation, and impersonation attacks.
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
This document discusses an advanced intrusion detection system (IDS) approach to detect wormhole attacks in vehicular ad-hoc networks (VANETs). It begins by introducing VANETs and some of their vulnerabilities, including wormhole attacks where malicious nodes create private tunnels to manipulate message routing. It then describes the proposed IDS, which evaluates decision packets at destination nodes to detect wormhole attacks. Simulation results are presented showing metrics like positive predictive value, negative predictive value, and specificity to evaluate the IDS's ability to correctly identify attacks. The paper concludes the IDS approach can help detect wormhole attacks, which pose a serious security threat in VANETs.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure approaches proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and deployment environments.
This document discusses secure data aggregation in vehicular ad-hoc networks (VANETs). It proposes a scheme called Secure Dynamic Aggregation (SeDyA) that has three phases: 1) an aggregation phase where vehicles compute functions over data to generate aggregate values, 2) a finalization phase where vehicles verify messages and generate multisignatures for security, and 3) a dissemination phase where finalized messages are distributed to vehicles outside the aggregation area. The goal is to efficiently aggregate and securely share information like traffic speed and density while addressing security issues like Sybil, inflation, and impersonation attacks.
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKIJNSA Journal
It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node
illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these
routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we
illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of
communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area
to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile
Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node
which is dynamically moves from one location to another location. Both attacks Active as well as Passive
attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as
compare to wired networks. In last few years many security and attacks issue are face many researchers in
MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks
and Packet modification attacks found in MANET. At the time of data communication all the above mentioned
attacks access data easily without permission. To solve the problem of attacks in MANET and secure data
communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks
on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid
algorithm for secure intrusion detection in MANET.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
This document proposes an efficient key management scheme (KTR) for wireless broadcast services that supports secure access control. KTR has three main advantages: 1) It supports all subscription activities like joining, leaving and changing programs. 2) A user only needs one set of keys for all subscribed programs instead of separate keys for each program. 3) KTR identifies the minimum set of keys that need to be changed when a user's subscription changes to minimize rekey costs. Simulations show KTR can save about 45% of communication overhead and 50% of decryption costs compared to logical key hierarchy approaches.
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc NetworkEditor IJMTER
Mobile means to move any direction and ad-hoc means temporary infrastructure less
network. In mobile ad-hoc network packet sending and receiving is most important things. When
packets send to one node to another node this sending node reach to destination at this time if packets
are drop so because of this reason security is not maintained. Packets drop using malicious node or
not and also find the detection of packet drop. In this paper various security techniques in packet
dropping attack for the security purpose.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
This document discusses security issues in mobile ad hoc networks. It outlines several current problems including the lack of secure boundaries and threats from compromised nodes. It also reviews common attack types like impersonation and routing attacks. The document then summarizes security schemes used to address these issues, such as intrusion detection techniques using IDS agents and cluster-based intrusion detection. Specific attacks like wormhole and rush attacks are defined along with defenses like packet leashing and secure neighbor detection.
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Investigation of detection & prevention sinkhole attack in manetijctet
This document discusses sinkhole attacks in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). It provides background on sinkhole attacks, where a compromised node advertises a high quality route to attract network traffic. This can disrupt data transmission to the base station. The document reviews several existing detection techniques for sinkhole attacks, including algorithms using hop counting and mobile agents. It then proposes a new lightweight algorithm to detect sinkhole attacks in MANETs using network flow information collected by the base station and analysis of routing patterns to identify the intruder. The algorithm aims to provide secure and efficient sinkhole detection with low overhead.
This document proposes monitoring recommender systems over time to detect sybil attacks. It suggests distrusting newcomers to force sybils to draw out their attacks. It recommends monitoring at the system, user, and item levels by learning normal temporal behavior and flagging anomalies. The key contributions are forcing sybils to reveal attacks through prolonged activity and monitoring a wide range of attacks over time.
This document discusses mechanisms to defend against Sybil attacks in mobile ad hoc networks. It introduces Sybil attacks and their impact on ad hoc networks. It then summarizes several detection models for Sybil attacks, including PKI-based protocols, threshold-based protocols, reputation schemes, and watchdog mechanisms. It also proposes a multifactor authentication scheme that combines cryptographic techniques with physical attribute verification. Finally, it outlines a passive identity detection scheme that leverages the mobility of nodes to identify Sybil identities that must move together.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKIJNSA Journal
It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node
illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these
routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we
illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of
communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area
to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile
Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node
which is dynamically moves from one location to another location. Both attacks Active as well as Passive
attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as
compare to wired networks. In last few years many security and attacks issue are face many researchers in
MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks
and Packet modification attacks found in MANET. At the time of data communication all the above mentioned
attacks access data easily without permission. To solve the problem of attacks in MANET and secure data
communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks
on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid
algorithm for secure intrusion detection in MANET.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
This document proposes an efficient key management scheme (KTR) for wireless broadcast services that supports secure access control. KTR has three main advantages: 1) It supports all subscription activities like joining, leaving and changing programs. 2) A user only needs one set of keys for all subscribed programs instead of separate keys for each program. 3) KTR identifies the minimum set of keys that need to be changed when a user's subscription changes to minimize rekey costs. Simulations show KTR can save about 45% of communication overhead and 50% of decryption costs compared to logical key hierarchy approaches.
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc NetworkEditor IJMTER
Mobile means to move any direction and ad-hoc means temporary infrastructure less
network. In mobile ad-hoc network packet sending and receiving is most important things. When
packets send to one node to another node this sending node reach to destination at this time if packets
are drop so because of this reason security is not maintained. Packets drop using malicious node or
not and also find the detection of packet drop. In this paper various security techniques in packet
dropping attack for the security purpose.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
This document discusses security issues in mobile ad hoc networks. It outlines several current problems including the lack of secure boundaries and threats from compromised nodes. It also reviews common attack types like impersonation and routing attacks. The document then summarizes security schemes used to address these issues, such as intrusion detection techniques using IDS agents and cluster-based intrusion detection. Specific attacks like wormhole and rush attacks are defined along with defenses like packet leashing and secure neighbor detection.
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Investigation of detection & prevention sinkhole attack in manetijctet
This document discusses sinkhole attacks in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). It provides background on sinkhole attacks, where a compromised node advertises a high quality route to attract network traffic. This can disrupt data transmission to the base station. The document reviews several existing detection techniques for sinkhole attacks, including algorithms using hop counting and mobile agents. It then proposes a new lightweight algorithm to detect sinkhole attacks in MANETs using network flow information collected by the base station and analysis of routing patterns to identify the intruder. The algorithm aims to provide secure and efficient sinkhole detection with low overhead.
This document proposes monitoring recommender systems over time to detect sybil attacks. It suggests distrusting newcomers to force sybils to draw out their attacks. It recommends monitoring at the system, user, and item levels by learning normal temporal behavior and flagging anomalies. The key contributions are forcing sybils to reveal attacks through prolonged activity and monitoring a wide range of attacks over time.
This document discusses mechanisms to defend against Sybil attacks in mobile ad hoc networks. It introduces Sybil attacks and their impact on ad hoc networks. It then summarizes several detection models for Sybil attacks, including PKI-based protocols, threshold-based protocols, reputation schemes, and watchdog mechanisms. It also proposes a multifactor authentication scheme that combines cryptographic techniques with physical attribute verification. Finally, it outlines a passive identity detection scheme that leverages the mobility of nodes to identify Sybil identities that must move together.
The document summarizes a smart home project that uses Internet of Things and machine learning applications for face recognition. The project uses various hardware components like Arduino, motion sensors, and webcams. It also utilizes software tools like MATLAB, PHP, and machine learning to enable features like motion detection, photo capture and emailing, face recognition using neural networks, YouTube live streaming of the home, and displaying the location of users on a Google Map. The overall aim of the project is to remotely monitor and control a smart home using sensors, web applications, and machine learning.
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
The objective of the proposed system is to integrate the high volume of data along with the important
considerations like monitoring a wide array of heterogeneous security. When a real time cyber attack
occurred, the Intrusion Detection System automatically store the log in distributed environment and
monitor the log with existing intrusion dictionary. At the same time the system will check and categorize the
severity of the log to high, medium, and low respectively. After the categorization, the system will
automatically take necessary action against the user-unit with respect to the severity of the log. The
advantage of the system is that it utilize anomaly detection, evaluates data and issue alert message or
reports based on abnormal behaviour.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
The document outlines the contents of a technical seminar on quantum computing. It discusses the research area of high performance computing and introduces the topic of quantum computing. It describes features like obeying quantum mechanics laws and using qubits. Applications mentioned include cryptography, teleportation, and artificial intelligence. A comparison table compares three research papers on different aspects related to addressing problems in quantum computing.
The document provides an overview of the Internet of Things (IoT) in 3 sentences:
The Internet of Things (IoT) connects physical objects through sensors, software and network connectivity which allows these "things" to collect and exchange data between other devices. The document outlines what IoT is, how it works, current applications and challenges, and the future potential of a world where many everyday objects are connected to the internet and able to send and receive data. The increasing interconnectivity of physical objects through technologies like RFID, sensors and networking promises both benefits and risks relating to privacy, security, and how IoT may influence human behavior.
This document describes a proposed algorithm to detect Sybil attacks in wireless sensor networks using a time difference of arrival (TDOA) localization method. Sybil attacks involve a single node forging multiple identities on the network to disrupt normal functioning. The algorithm is applied to clusters formed using the LEACH routing protocol. It aims to detect malicious head nodes (which could be Sybil attackers) by using the time differences of signals arriving at member nodes from the head node. If inconsistencies are found, the head node is identified as malicious. The algorithm seeks to detect Sybil attacks without high computational or memory overhead compared to other detection methods.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes a research paper that proposes techniques to detect and localize multiple spoofing attackers in wireless networks using received signal strength (RSS). It begins by introducing the problem of spoofing attacks and outlines three goals: detecting attacks, determining the number of attackers, and localizing multiple adversaries. It then reviews related work on secure routing protocols and key management schemes. An overview of the proposed techniques is provided, including a generalized attack detection model, determining the number of attackers as a multiclass detection problem, and an integrated detection and localization framework (IDOL). Several localization algorithms are also summarized. Experimental results showed the proposed methods can achieve over 90% accuracy in determining the number of attackers.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document proposes a new Randomized, Efficient, and Distributed (RED) protocol for detecting clone attacks in wireless sensor networks. It analyzes existing solutions and identifies their shortcomings. The key contributions are:
1) Analyzing desirable properties for distributed clone detection mechanisms.
2) Showing that existing solutions like LSM do not fully meet these requirements.
3) Proposing the new RED protocol and proving it satisfies the requirements. Extensive simulations show RED is more efficient and effective at clone detection than other distributed protocols.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Keywords: Wifi, Spoofing, Wireless, RSS, MAX, WEP, WPA, ISP
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
This document describes a proposed energy efficient and secure trusted network discovery framework for wireless sensor networks called TARF. The framework aims to secure routing against attacks like sinkhole, wormhole, and Sybil attacks by evaluating the trustworthiness of neighboring nodes. It identifies untrustworthy nodes and routes around them. TARF also aims to be energy efficient. It uses elliptic curve cryptography for encryption and maintains a neighborhood table with trust and energy cost values to select low-cost, trusted next hop nodes for routing. The framework generates network certificates, starts sensor nodes, creates a trusted center, and has nodes find neighbors to select routing paths while avoiding attackers. Simulation results show certificate generation, node interfaces, the trusted center, and a node finding
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure solutions proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and dependence on energy efficiency.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Similar to A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor Networks using Sink Nodes (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This document discusses green computing practices and sustainable IT services. It provides an overview of factors driving adoption of green computing to reduce costs and environmental impact of data centers, such as rising energy costs and density. Green strategies discussed include improving infrastructure efficiency, power management, thermal management, efficient product design, and virtualization to optimize resource utilization. The document examines how green computing aims to lower costs and environmental footprint, and how sustainable IT services take a broader approach considering economic, environmental and social impacts.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor Networks using Sink Nodes
1. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 433
A Lightweight Algorithm for Detecting Sybil Attack in
Mobile Wireless Sensor Networks using Sink Nodes
Abdolreza Andalib
Department Of Computer Software, Qeshm
International Branch, Islamic Azad University, Iran
Farahnaz Andalib
Department Of Computer Software, Kermanshah
Branch, Islamic Azad University, Iran
Mojtaba Jamshidi
Department Of Computer Software, Qazvin
Branch, Islamic Azad University, Iran
Davod Momeni
Department Of Computer Software, Kermanshah
Branch, Islamic Azad University, Iran
Abstract: Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
Keywords: Wireless Sensor Networks, Sybil attack, Lightweight algorithm, Sink nodes
1. INTRODUCTION
A wireless sensor network consists of hundreds to thousands
small and inexpensive sensor nodes that work together to
provide the possibility of monitoring the environment and
collecting information. In such networks, usually, there are
one to several sink nodes that collect all network data and send
commands to one, several or all network nodes. In other
words, after capturing (or sensing) information from the
environment, sensor nodes send them, step by step, to sink
node(s). Being inexpensive and small, sensor nodes have
limitations in terms of energy, memory, and computing
capability. Because of these limitations, complex encryption
and security algorithms of other networks (such as local
networks) cannot be applied and set up on the “resource
limited” sensor nodes. However, sink nodes do not have such
limitations and are usually informed about general network
data including encryption keys, number of nodes, nodes
identities, etc. [1].
Sybil attack is one of the major attacks that affect the routing
layer. In this attack, as indicated in figure 1, a malicious
hostile node, after being distributed in the operating network
environment, creates multiple fake identities simultaneously,
called Sybil nodes (herein after called “Sybil nodes”). In
figure 1, each normal node has only one identity while each
malicious node creates 6 identities (IDs 5-10). This misleads
neighboring legitimate nodes and they assume each of these
Sybil nodes is a real separate node, Whereas, all the Sybil
nodes are just and only a real (malicious hostile) node.
Therefore, the hostile node attracts so heavy traffic and
disrupts routing protocols to a large extent which has
devastating effects on the network functions such as data
integration, voting, and resource allocation [2][3][4].
Figure 1 – An example of Sybil attack set-up
So far, various strategies are developed to counteract with
Sybil attack in fixed sensor networks. In [5], for instance, an
algorithm is proposed, based on radio resource testing, to
detect Sybil nodes in which each node assigns a different
channel to each of its neighbors to broadcast some message
on. However, this method is not efficient considering the
limitations of sensor nodes (assigning a separate channel to
each neighbor). Also, strategies based on identity verification,
such as those proposed in [5] and [6], firstly require a huge
memory space and secondly get involved in processing
complex checking algorithms in order to store essential
identity verification data (including shared encryption keys,
identity certificates, etc.). In addition, strategies based on
Received Signal Strength Indicator (RSSI) [7], as the one
developed in [8], cannot be proper solutions, as well, since the
radio signal is susceptible to be interfered by the environment,
on one hand, and the malicious node can fail the algorithm by
adjusting its sending power, on the other hand. So, using these
strategies for detecting Sybil nodes of mobile sensor networks
2. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 434
will not be effective. Because, in the first place, these
strategies impose heavy costs (computing, communication and
memory) on resource-limited sensor nodes. Second, due to
nodes mobility in mobile sensor networks, the above
mentioned algorithms either have errors or fail in the process
of detecting Sybil nodes.
In this paper, a new lightweight algorithm for detecting Sybil
attack in Mobile Wireless Sensor Networks is proposed. The
main underlying idea of the proposed algorithm is exchanging
a random number between sink and sensor nodes.
The rest of this paper is organized as follows: section 2
reviews the literature. Section 3 explains system hypotheses
and the attack model. Section 4 elaborates on the proposed
algorithm and section 5 gives the performance evaluation and
simulation results. Finally, section 6 concludes the paper.
2. LITERATURE REVIEW
Sybil attack was introduced in [4], for the first time, for peer-
to-peer networks. Researchers in [5] analyzed the attack in
wireless sensor networks, for the first time, and developed
several defense mechanisms including radio resource testing,
key validation for random key predistribution, position
verification, identifier registration, and remote code
verification or code attestation. In radio resource testing, each
node assigns a separate channel to its neighbors to broadcast
on. In identifier registration approach, a trusted central
authority poll the network to identify Sybil nodes. In [7] an
algorithm is proposed based on Received Signal Strength
Indicator (RSSI) to estimate the location of nodes in the
network. In [8] the locating mechanism proposed in [7] is used
for detecting Sybil nodes. The algorithm uses four location-
aware (routing) nodes that are capable of hearing the packages
from all network areas to detect Sybil nodes. When a node
sends a package, routing nodes cooperate to estimate its
location. It is enough to identify the target nodes because all
Sybil nodes are located in a same area. The method which is
developed in [9] for detecting Sybil nodes needs no hardware
or information about signal strength yet it solely uses data
regarding the number of neighbors to identify malicious node
and fake (Sybil) identities. The algorithm functions in a
distributed manner based on no central point such as base
stations or specific nodes (location-aware). Also, [10]
proposed an algorithm based on Received Signal Strength
Indicator (RSSI) mechanism to detect Sybil attacks in sensor
networks that use Low Energy Adaptive Clustering Hierarchy
(LEACH) protocol for clustering. [11] Proposed another
algorithm based on RSSI technique to detect Sybil nodes when
the nodes are adjusting the broadcasting power. In [12] a new
algorithm is proposed based on identifying Angle of Arrival
(AOA) mechanism called Trust Evaluation Based on AOA
(TEBA). Considering that a Sybil nodes can create multiple
identities with only one real location, anchor nodes detects
Sybil identities that their signal phase difference is less that
trust threshold (calculated by assessing trust angle of
neighboring sensor nodes). In [13] a method is developed to
counteract with Sybil attack which collects route information
by collective intelligence algorithm during network activity
and detects Sybil node by its energy changes in the meantime.
Also, in [14], another RSSI-based algorithm is proposed for
detecting Sybil nodes in LEACH routing protocol. IN [16], a
new algorithm is proposed based upon customer puzzles and
learning automata to deal with Sybil attacks in wireless sensor
networks. Added to these, in [17] and [18], other algorithms
are proposed that uses guard nodes in detecting Sybil nodes in
mobile sensor networks.
3. SYSTEM HYPOTHESES AND THE
ATTACK MODEL
A sensor network contains n sensor nodes and m sink nodes
that are randomly distributed in a two-dimensional area. All
sensor nodes are mobile and, according to mobile models
(such as Random waypoint), move in the operating
environment during the network lifetime. Sink nodes may be
mobile or fixed, as well. Each node has one identity and is
unaware of its own location. Nodes communicate via wireless
radio channels and use Omni-directional distribution
approach. Radio range of all nodes (sensor and sink) are the
same and equal to r. It is also assumed that sensor nodes
cannot resist against interference and enemies can access their
confidential information in case of capturing them so as to
reprogram them. But, sink nodes are equipped with tamper-
resistant hardware and enemies cannot decode and reprogram
them.
Here, an attack model is considered, based upon
classifications given in [5], i.e. “direct, simultaneous, and
stolen identities” Sybil attack. That is, the enemy captures
multiple valid identities (e.g. S1~S10) in the network, first.
Then, program a malicious node so that it creates S1 to S10
(Sybil nodes) identities simultaneously after being deployed in
the network operating environment. In addition, legitimate
nodes communicate with Sybil nodes “directly” (not through
another node). It should be noted that enemy creates malicious
either by itself or by capturing and reprogramming legitimate
nodes in the network. Like normal sensor nodes, malicious
nodes can move in the operation environment. Considering the
attack model, it is assumed that our network has an identity
assignment mechanism [19]. In the identity assignment
mechanism, the enemy is not capable of creating fake
identities; therefore, it has to capture legitimate nodes of the
network to set up a Sybil attack. It is also assumed that each
node has to send a “Hello” or “route request” message, by
arriving at a new location in the network. In fact, this is a
requirement for mobile sensor networks so each node can
identify its neighbors instantly, set up a security key with them
(if necessary), communicate, create its own routing table, etc.
[20]. It is obvious that, in this case, each malicious node must
send a “hello”, “route request”, etc. message per each of its
Sybil identities, after arriving at a new location in the network
(simultaneous Sybil attack [5]). Our proposed algorithm
detects Sybil nodes by such kinds of communicated messages.
4. THE PROPOSED ALGORITHM
The main underlying idea of the proposed algorithm is to
produce random numbers and exchanging them between sink
and sensor nodes so as to detect the Sybil nodes. Generally,
the proposed algorithm contains two simple phases that are
explained below.
4.1 Configuration
This phase runs before distribution of nodes in the operating
environment of the network. According to mechanism given in
[19], a single identity is assigned to each sensor node, in the
first place. Then, a table, as the one indicated in figure 2a, is
loaded on each sensor node and another table, as the one
indicates in figure 2b, is loaded on each sink node; the tables
3. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 435
are called history. For every sink nodes and sensor nodes, an
identity is registered in SinkID and NodeID column of the
tables. The number column belongs to random numbers; the
initial value of this field for all sensor and sink nodes is null.
In the next place, all nodes have to be distributed in the
network environment, randomly.
(b) (a)
NodeID number SinkID number
N1 SK1
N2 SK2
. . . ...
Nn SKm
Figure 2 – The structure of history tables in sensor nodes
(a) and sink nodes (b) memory
4.2 Test
After being distributed in the environment, the sensor nodes
began sending “Hello” (to identify the neighbors), routing,
data, and … messages. After a period (t), the nodes start
moving in the environment and when they arrive at a new
point, they start sending the messages (i.e. ‘Hello, routing,
data messages), again. Thus, each node can detect its existing
neighbors, during different periods of network lifetime, by
considering these types of broadcasted messages. Testing
phase of the proposed algorithm also runs during alternative
periods (t) of network lifetime. The testing phase runs as
follows: whenever there is a sensor node (Ni) in the vicinity of
a sink node (SKj), the sink node generates a random number
(p) and stores it in the number column of its history table if it
learns that there is an empty field in the number column of Ni.
Then, it sends the random number (p) to Ni, along with a
message containing pSK j , .
Ni updates its history as
it receives the message; in other words, it registers p in the
number field of SKj. But, if the number field of Ni in SKj
history has already been filled with a random number, like p’,
(i.e. the sink node (SKj) has sent a random number (p’) to Ni
before) the sink node (SKj) requests the random number from
Ni. Accordingly, Ni sends the random number that exists in its
history, like p”, to the sink node. If p” be equal to p’, the sink
node considers Ni as a legitimate node; otherwise, it regards Ni
as a malicious Sybil node.
Now, consider a scenario in which, SKj sends p’ to a sensor
node (Ni) during t1. Also, assume that an enemy steals
legitimate identities (Ni~k) from the network and a malicious
node is programmed itself to distribute the stolen Sybil
identities, i.e. Ni~k, after being scattered in the network
environment. If during tl>t1 periods, there is a Sybil node (Ni)
in the vicinity of a sink node (SKj), it request the Sybil node
(Ni) to return the random number because there is no empty
member field for Ni in history of the sink node (SKj) (it is
filled with p’). But if the Sybil node (Ni) generates a random
number, since it has no random number available in history
for the sink node, it can register the number in its history and
return it to the sink node. Hope that the random number be the
same number that the sink node (SKj) has requested (i.e. p’).
If so, the Sybil node (Ni) cannot be detected. If not, the sink
node marks Ni as a malicious node. In this case, Sybil node’s
success depends on complexity of the random number. To
avoid suspicion to these random numbers by the malicious
nodes, a 32- or 64-bit number field can be used.
In another scenario, assume that a sink node (SKj) sends a
random number (p’) to a Sybil node (Ni) during t1 period (i.e.
the first time that the sink node (SKj) identifies a Ni node in its
vicinity). Now, if during tl>t1 periods, the sink node (SKj)
identifies a Ni node in its vicinity, it request the Sybil node
(Ni) to return the random number because it has no empty
member field for Ni in its history. Since, the Ni node, that is
now (during tl) in the vicinity of SKj, is a legitimate node (not
a Sybil node (Ni)) and has no random number in its history for
the sink node (SKj), it sends a warning message to the sink
node. Upon receiving the alarm, the sink node understands
that Ni is captured by enemy. Therefore, it considers Ni as a
Sybil node. It should be noted that each sink node generates
and sends the random number to Ni just and only once;
however, it may request the Ni (when the node is in its
vicinity) to return the random number several times during the
network lifetime.
5. PERFORMANCE EVALUATION AND
SIMULATION RESULTS
In this section, we first evaluate the proposed algorithm
memory, communication, and processing overheads, then
present the simulation results.
5.1 Performance Evaluation
Memory Overheads: in the proposed algorithm, each sensor
node requires a memory space with O (m) function and each
sink node requires a memory space with O (n) function to
store data in history. Since sink nodes are not resource-limited,
memory overheads with O (n) function can be imposed on
these nodes. Yet, given that the number of sink nodes in most
of the sensor networks are generally are too small (less than
10), sensor nodes of the memory overheads tolerate very little
memory.
Communication overheads: Assuming that each node has d
neighbors, on average, each sink node “sends” or “requests” d
random numbers during each time period. Also, each sensor
node, sends at least 0 and at most m message for the sink
nodes in each time period, during the test phase. Because it
may have no sink node or many sink nodes in its vicinity.
Therefore, connection overheads of sensor nodes and sink
nodes are of O (m) and O (d) type, respectively.
Processing Overheads: in each time period, during the test
phase, each sink node has to update its history (which is of O
(d x n) time order) per all its existing neighbors and each
sensor node requires at most O (m2
) processing time to update
its history (by assuming a linear search), as well. Because in
any of the time periods during the test phase there may appear
m sink nodes in the vicinity.
5.2 Simulation Results
After running the proposed algorithm, its performance is
evaluated through a series of tests. The main criterion in the
evaluation is detection rate; i.e. the amount of Sybil nodes
detected by a security algorithm. What is more, the proposed
4. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 436
algorithm performance is compared with those given in [8-
10,13,14,16], in terms of average detection rate and average
rate of error.
In simulation, it is assumed that the network includes n sensor
nodes and m sink nodes which are randomly distributed in 100
x 100 m2
area. The function area has W=5 malicious hostile
nodes (Sybil attack runners) and each malicious node creates S
Sybil identity. So, (W x S) Sybil nodes are available in the
network. All the nodes (normal and malicious) has equal radio
range (r=10). In addition, the mobility model of [21] is
employed for the nodes movement in the function area. In
order to be sure of the results validity, each test is repeated
100 times and the final result is the average of these 100 tests.
Experiment 1: parameters considered in this experiment are
n=30, S=20, and m=1, 2, 3. Detection rate of the proposed
algorithm is evaluated in time periods 25 to 200 during the test
phase. Figure 3 indicates the experiment results. The results
indicate that increasing time periods of the test phase increases
the Sybil nodes detection rate. For example, when the number
of sink node equals to m=1, detection rates of time period 25,
100, and 200 are about 27%, 88%, and 100%, respectively.
The reason is clear; assume that enemy has captured Ni and its
malicious node creates a Sybil node with Ni identity, after
being distributed in the network. In this case, a sink node can
detect Sybil Ni only if it faces with both legitimate Ni and
malicious hostile node (in its vicinity) during the test phase
(not necessarily in a certain time period). Accordingly, by
increasing the number of phase test periods, it is more
probable that the sink node faces with both Ni and the
malicious node.
Also, since, in the proposed algorithm, sink nodes detects
Sybil nodes in a fully independent way, its detection rate
increases by increasing the number sink nodes (m). Figure 3
clearly indicates the test results.
Detectionrate(%)
The number of test phase periods
Figure 3 – Detection rate of the proposed
algorithm per different parameter (m) values and
different test phase periods
Experiment 2: This experiment is to evaluate the effect of
Sybil identities number, distributed by malicious nodes (S), on
the proposed algorithm performance. Parameters considered in
this experiment are n=300 and m=1. Detection rate of the
proposed algorithm is evaluated for Ss 4 to 20 (by increasing 4
units per step). Figure 4 indicates the experiment results for
time periods 25 to 200 during the test phase. The experiment
results prove that changes of S have no significant effect on
detection rate of the proposed algorithm because what matters
the most in this algorithm is the presence of malicious and
legitimate nodes, the identities of which is captured by the
enemy, in the vicinity of sink nodes during the test phase. But,
considering the Sybil attack model assumed here (i.e.
“simultaneous” model), whenever the malicious node moves
to a new location in the network, it sends “Hello”, routing, etc.
messages, per each of its Sybil identities. So, the number of
distributed Sybil identities of the malicious node does not
matter; however, it is enough to be in the neighboring
environment of the both malicious and legitimate nodes, with
captures identity, only once, then the sink node can detect the
Sybil nodes.
Detectionrate(%)
The number of test phase periods
Figure 4 – the effect of parameter (S) on detection rate
of the proposed algorithm
Experiment 3: This experiment is to evaluate the effect of
network nodes number (n) on the proposed algorithm
performance. Parameters considered in this experiment are
S=10 and m=1. Detection rate of the proposed algorithm is
evaluated for ns 100 to 500. Figure 5 indicates the experiment
results for time periods 25 to 200 during the test phase. The
experiment results prove that network nodes number (n) has
no significant effect on detection rate of the proposed
algorithm because, unlike other algorithms, such the one
developed in [9], the proposed algorithm is not based on
network density but on confrontation of malicious and
legitimate nodes, the identities of which is captured by the
enemy, in the vicinity of sink nodes. Therefore, increase or
decrease of the number of nodes in the network leaves no
effect on detection rate of the proposed algorithm.
Experiment 4: in this experiment, the proposed algorithm
performance is compared with others in terms of average
detection rate and average rate of error. Figure 6 and figure
7 indicate the average detection rate and average rate of error.
The average detection rate of the proposed algorithm, [8], and
[16] are almost 100% which is better than others. Also, it is
worth noting that, unlike other algorithms, the proposed
algorithm makes no error in detecting Sybil nodes. Whereas,
error rates of other algorithms in [8] and [16] are 6% and 5%,
respectively. It is because the other algorithms are based on
information collected from the neighborhood or on RSSI. So,
they may have error in detecting Sybil nodes. But, the
underlying idea of the proposed algorithm is confrontation of
malicious nodes with sink and legitimate nodes, the identities
of which is captured by the enemy.
5. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 437
Detectionrate(%)
The number of test phase periods
Figure 5 – The effect of parameter (S) on wrong
detection of the proposed algorithm
Averagedetectionrate(%)
Figure 6 – Comparison of the average
detection rate of the proposed algorithm
with other algorithms
Averaherateoferror(%)
Figure 7 - Comparison of the average error rate of
the proposed algorithm with other algorithms
6. CONCLUSION
The current research proposes a new lightweight algorithm for
detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The main underlying idea of the proposed
algorithm is generate random numbers by sink nodes and
exchange them between sink and sensor nodes to detect Sybil
nodes. The proposed algorithm is implemented to be assessed
in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the
results of other available algorithms revealed optimal
performance of the proposed algorithm.
7. REFERENCES
[1] Akyildiz Ian F. and Kasimoglu Ismail H., "Wireless sensor
and actor networks: research challenges", in: Proceedings
of the Ad Hoc Networks 2, pp. 351–367, 2004.
[2] Karlof C. And Wagner D, “Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”, in:
Proceedings of the AdHoc Networks, pp. 299-302, year
2003.
[3] Padmavathi G. and shanmugapriya D, "A survey of
attacks, security mechanisms and Challenges in Wireless
sensor networks", in: Proceedings of the International
Journal of Computer Science And Information Security
(IJCSIS), Vol. 4, No. 1 & 2, August 2009.
[4] Douceur J. R., “The Sybil attack”, in: Proceedings of the
Douceur J. R., “The Sybil attack”, in: Proceedings of the
First International Workshop on Peer-to-Peer Systems
(IPTPS '02), 2002.
[5] Newsome J., Shi E., Song D. and Perrig A., “The Sybil
attack in sensor networks: analysis and defenses”, in:
Proceedings of the International Symposium on
Information Processing in Sensor Networks, pp. 259–
268, April 2004.
[6] D. Liu, P. Ning, “Establishing pairwise keys in distributed
sensor networks”, in: Proceedings of the ACM
Conference on Computer and Communications Security,
pp. 52–61, October 2003.
[7] Zhong S., Li L., Liu Y. G. and Yang Y. R., "Privacy-
preserving location based services for mobile users in
Wireless Networks", In: Proceedings of the Technical
Report YALEU/DCS/TR-1297, Yale Computer Science,
2004.
[8] Demirbas M. and Song Y., "An RSSI-based scheme for
Sybil attack detection in wireless sensor networks", In:
Proceedings of the IEEE Computer Society International
Symposium on World of Wireless, Mobile and
Multimedia Networks, pp. 570–574, 2006
[9] Ssu K. F, Wang W. T. and Chang W. C., “Detecting Sybil
attacks in wireless Sensor Networks using neighboring
information”, in: Proceedings of the Computer Networks
53, pp. 3042–3056, 2009.
[10] Chen S., Yang G. and Chen S., “A Security Routing
Mechanism against Sybil Attack for Wireless Sensor
Networks”, in: Proceedings of the International
Conference on Communications and Mobile Computing,
2010.
6. International Journal of Computer Applications Technology and Research
Volume 5– Issue 7, 433 - 438, 2016, ISSN:- 2319–8656
www.ijcat.com 438
[11] Misra S. and Myneni S., “On Identifying Power Control
Performing Sybil Nodes in Wireless Sensor Networks
Using RSSI”, in: Proceedings of the IEEE
Communications Society, 2010.
http://www.csee.usf.edu/~labrador/Share/Globecom/DA
TA/03-384-04.PDF
[12] ZHANG Y., FAN K.-.F., ZHANG S.-B. and MO W.,
”AOA based trust evaluation sheme for Sybil attack
detection in WSN”, in: Proceedings of the journal on
Application Research of Computers, 2010.
[13] Muraleedharan R., Ye X. and Osadciw L.A., “Prediction
of Sybil Attack on WSN Using Bayesian Network and
Swarm Intelligence”, in: Proceedings of the Wireless
Sensing and Processing, Orlando, FL, USA, March 2008.
[14] Jangra A., Swati, Priyanka, “Securing LEACH Protocol
from Sybil Attack using Jakes Channel Scheme (JCS)”,
in: Proceedings of the International Conferences on
Advances in ICT for Emerging Regions(ICTer2011),
2011.
[15] Jiangtao W., Geng Y., Yuan S. and Shengeshou C.,
“Defending Against Sybil Attacks Based on Received
Signal Strength in Wireless Sensor Networks”, in:
Proceedings of the journal of elctronics, Vol. 17,No. 4,
Oct. 2008.
[16] Jamshidi, M., Esnaashari, M. and Meybodi, M. R., "An
Algorithm for Defending Sybil Attacks based on Client
Puzzles and Learning Automata for Wireless Sensor
Networks", in: Proceeding of 18th National Conference
of Computer Society of Iran , Sharif University, Tehran,
Iran, March 14-16, 2013.
[17] Jamshidi, M., Esnaashari, Nasri A., Hanani A. and
Meybodi, M. R., "Detecting Sybil Nodes in Mobile
Wireless Sensor Networks using Observer Nodes”, in:
Proceeding of 10th International ISC Conference On
Information Security &Cryptologhy, Computer Society
of Iran , yazd University, yazd, Iran, August 29-30, 2013.
[18] Rezai A., Jamshidi M. and AkbariTorkestani J., "A
lightweight and robust algorithms to detect Mobile Sybil
Nodes in Moblie Wireless Sensor Networks using
Information about the mobility of nodes”, in: Proceeding
of 10th International ISC Conference On Information
Security &Cryptologhy, Computer Society of Iran , yazd
University, yazd, Iran, August 29-30, 2013.
[19] Butler K. and et al., “Leveraging Identity-Based
Cryptography for Node ID Assignment in Structured P2P
Systems”, in: Proceedings of the IEEE transaction on
parallel and distributed systems, Vol. 20, 2009.
[20] Piro C., Shields C. and Levine B. N. , ”Detecting the
Sybil Attack in Mobile Ad hoc Networks”, in:
Proceedings of the Securecomm and Workshops, pp 1-
11, 2006.
[21] Yu C. M., Lu C. S. , and Kuo S. Y., “Mobile Sensor
Network Resilient Against Node Replication Attacks” In:
Proceedings of the IEEE Conference on Sensor, Mesh
and Ad Hoc Communications and Networks (SECON),
June 2008.