ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
A MANET is a continuously self-configuring, infrastructure-less type network, which consists of number of mobile nodes
with wireless network interfaces. In order to make communication among nodes, the nodes demoniacally establish paths among
neighbouring nodes. Security in mobile adhoc network is a big challenge because many nodes perform many kinds of misbehaviour.
In this paper, the main focus is on collaborative attacks in MANET using CBDS approach. CBDS is a approach which consolidate
asset of proactive and reactive defense method in reverse tracing. In reverse tracing method we compare performance of CBDS
approach with DSR and AOMDV routing protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...ijcsit
In the last few years, the Vehicular Ad-hoc Network (VANET) has come to be an important area of research. Significant research has been conducted to improve the performance of VANETS. One output of further research conducted on VANET is the Vehicular Delay Tolerant Network (VDTN). It is an
application of the mobile DTN where nodes relay messages in the network using a store-carry-forward approach. Due to its high mobility, it suffers frequent disconnections and also congestions at nodes which leads to message drops. To minimize the rate of message drops and so optimize the probability of message delivery so that drivers are increasingly aware of the situation of the road, we propose a congestion
control mechanism: Congestion Aware Spray and Wait (CASaW) protocol in this work so as to optimize the
rate of message delivery to its destination and so increase the awareness of drivers in the vehicular environment thereby improve road safety. The results have shown that our proposition performed better than other classical VDTN protocols in terms of message delivery probability and rate of packet drops performance measures. We used the Opportunistic Networking Environment (ONE) simulator to implement the classical VDTN protocols: the PROPHET protocol, the Epidemic protocol, the MaxProp protocol and
the Spray and Wait Protocol. The simulation scenarios shows a better performance for the congestion control mechanism we propose as it maintains a good message delivery rate as well as minimize the rate of packet losses thereby optimizing the chances of messages getting to their destinations and so improve road safety.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
A MANET is a continuously self-configuring, infrastructure-less type network, which consists of number of mobile nodes
with wireless network interfaces. In order to make communication among nodes, the nodes demoniacally establish paths among
neighbouring nodes. Security in mobile adhoc network is a big challenge because many nodes perform many kinds of misbehaviour.
In this paper, the main focus is on collaborative attacks in MANET using CBDS approach. CBDS is a approach which consolidate
asset of proactive and reactive defense method in reverse tracing. In reverse tracing method we compare performance of CBDS
approach with DSR and AOMDV routing protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...ijcsit
In the last few years, the Vehicular Ad-hoc Network (VANET) has come to be an important area of research. Significant research has been conducted to improve the performance of VANETS. One output of further research conducted on VANET is the Vehicular Delay Tolerant Network (VDTN). It is an
application of the mobile DTN where nodes relay messages in the network using a store-carry-forward approach. Due to its high mobility, it suffers frequent disconnections and also congestions at nodes which leads to message drops. To minimize the rate of message drops and so optimize the probability of message delivery so that drivers are increasingly aware of the situation of the road, we propose a congestion
control mechanism: Congestion Aware Spray and Wait (CASaW) protocol in this work so as to optimize the
rate of message delivery to its destination and so increase the awareness of drivers in the vehicular environment thereby improve road safety. The results have shown that our proposition performed better than other classical VDTN protocols in terms of message delivery probability and rate of packet drops performance measures. We used the Opportunistic Networking Environment (ONE) simulator to implement the classical VDTN protocols: the PROPHET protocol, the Epidemic protocol, the MaxProp protocol and
the Spray and Wait Protocol. The simulation scenarios shows a better performance for the congestion control mechanism we propose as it maintains a good message delivery rate as well as minimize the rate of packet losses thereby optimizing the chances of messages getting to their destinations and so improve road safety.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Intelligent black hole detection in mobile AdHoc networksIJECEIAES
Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Similar to A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN (20)
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
Human Resource Competencies: An Empirical AssessmentIJERDJOURNAL
ABSTRACT: Human beings are the essential part of the process. Today, technology and machines are taking over the human resource, as claimed by many people; but technology and machines can never replace human resource entirely. Humans are required for operating and maintaining these machines. Human resource is extremely important for developing or bringing about new and required changes to these machines and technologies. The study of the history and the current Human Resource Management trends points out some important facts
Prospects and Problems of Non-Governmental Organizations in Poverty Alleviati...IJERDJOURNAL
ABSTRACT: The World Bank sponsored Millennium Development Goals (MDGs), launched in 1990 envisaged a world free of poverty by the year 2015. The North-East (where Gombe State is centrally located) is experiencing significantly higher poverty and lack of progress in poverty reduction efforts. With coming to end of 2015, much still need to be done to attain the MDGs. With over 62.6% Nigerian population still very poor, there is need for a continuous search for alternative planning & development options that would help ameliorate poverty and sustained our dream for a world free of poverty and wants. This study examines the prospects and investigates the constraints of Non-Governmental Organizations (NGOs) in poverty alleviation and community development. Literature review, questionnaire and interview methods were used for the study. The findings revealed that: finance, continuity of projects/programmes, conflicts and insecurity were the major problems confronting the NGOs. An interesting revelation is that majority of the respondents indicated that they wait for the NGOs or Government to initiate poverty alleviation programmes/projects. The implication is that the community dwellers need attitudinal change necessary for self reliance. The prospect of NGOs in poverty alleviation and community development in the study area is very bright due to rapid population growth & increasing poverty levels with the attendant positive effects on urban planning and regional development. The study recommends that NGOs should (1) form an association to enable them work together, and utilize social capital in their operation/services. (2) seek to explore avenues for funding from donor agencies. Finally, the Government needs to address some of its short comings.
Development of Regression Model Using Lasso And Optimisation of Process Param...IJERDJOURNAL
ABSTRACT:- Metal Spinning is a concept of describing the forming of metal into seamless, axisymmetric shapes by a combination of rotational motion and force. Sheet metal spinning is one of the metal forming processes, which a flat metal blank is rotated at a high speed and formed into an axisymmetric part by a roller which gradually forces the blank on to a mandrel, bearing the final shape of the spun part. Over the last few decades, sheet metal spinning has developed significantly and spun products have been used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household‟s goods, rocket nose cones, gas cylinders etc. The objective of the current work is to develop the mathematical model for the spinning process with surface roughness as response and the input parameters as Mandrel speed (rpm), geometry of the Roller and Thickness of sheet (mm). Type of mandrel (EN8 Material) considered in the spinning process has the geometrical profile of parabola and single roller and double roller tools (EN8 Material) are used to deform the Al2024-T3 sheet metal paper aims to understand the process parameters that affect the surface finish of the spun component. Full factorial Design of Experiments technique is used to find the minimum number of experimental trials that are required to develop the regression model. A regression model using Least Absolute Shrinkage and Selection Operator (Lasso) is developed to further deepen the understanding between the input parameters and the surface roughness. The model was optimised using Sequential Quadratic Programming.
Use of Satellite Data for Feasibility Study And Preliminary Design Project Re...IJERDJOURNAL
ABSTRACT: In the developing countries like India, need of infrastructure is very high as compared to the available resources. The various organizations put their demands to state and center government for sanction of their project, government depends upon its various department to provide an approximate cost so that priorities can be assigned. The conventional procedure depends upon the land surveying, collection of data from various departments resulting in delay in necessary decision making or some time shelving due to unreasonable cost estimate due to field data being very old. Survey of India, The National Survey and Mapping Organization single handily taking this responsibility thus up gradation of data is far behind the actual development. From the satellite data, which is available in the form of images and terrains (even in 3d LiDAR points for some areas) is very useful for Feasibility Study, and Preliminary Project Report. In the present study natural drain named „Chai Nala‟ meanders through the prime property of Greater Mohali Area Development Authority (GMADA) thus making a big chunk of commercial land inoperative. It was proposed to straighten and channelize to reclaim the land from drain regime. Being the precious land department wanted the most economical and technically sound design without taking any risk. It was decided to counter check the hydraulic data, ground profile, acquired from the Punjab Irrigation Department with the satellite data and Differential Global Positioning System (DGPS). The data from the Google Earth was acquired using Cad Earth software and water shed analysis was carried out using Autodesk Civil 3D software. Comparison of results shows that this technique is quite useful and can be for preliminary feasibility and project preparation. Thus saving huge money and time.
Microwave Assisted Sol Gel Synthesis of Magnesium Oxide(Mgo)IJERDJOURNAL
ABSTRACT: Magnesium oxide (MgO) nanoparticles have been synthesized by Microwave assisted Sol gel synthesis method by using the precursors citric acid (C2O4H2) and magnesium chloride (Mgcl2.6H2O). It is a simple, novel and cost effective method. The structure, morphology and crystalline phase of the magnesium oxide nanocrystals have been investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray diffraction (XRD).Presence of functional groups and optical characters are analyzed by using FTIR and UV- visible techniques
Development of Enhanced Frequency Drive for 3-Phase Induction Motors Submitte...IJERDJOURNAL
ABSTRACT: Three-phase induction motors produce mechanical power by electromagnetic induction and run on a 3-phase ac supply. They require efficient speed control, to enable them do variable speed operations, save power consumption and reduce machine noise. In this dissertation, a new switching device called MosControlled Thyristor (MCT) for frequency drive is introduced. Based on the new switching device and AT89C52 microcontroller, an enhanced frequency drive for controlling the speed and torque of 3-phase 15kW squirrel cage induction motor is modeled. Different voltages ranging from 342V to 415V and frequencies ranging from 50Hz to 60Hz are used in a systematic manner to simulate the system based on the new switching device. The simulation program is written in C language and tested with Proteus 7.6 simulation software. Voltage and frequency have significant impact on the actual speed and torque of the motor. Simulation results show that with the new model, the torque (56.66Nm) developed by the motor which is constant throughout each speed range is directly proportional to the ratio (6.7:1) of the applied voltage and the frequency of the supply and the selected speeds (1450, 1510, 1570, 1630, 1690 and 1750 rpm) are locked irrespective of change in load. This is unlike other models where magnetic saturation and conduction drop of IGBT lead to voltage/frequency imbalance resulting in excessive drawing of current by the motor and overheating. This new control method has a speed regulation of ±2 to 3% of maximum frequency, speed response of 3Hz, speed control range of 1: 40 and efficiency of 88%, as further advantages. Comparison of the system with other speed control techniques shows improved energy-saving, cost effectiveness and safety in operation. The contributions of this research aim to make Volts per Hertz speed control method based on MCT a reliable better alternative to other well known methods in speed control of three-phase induction motors
Short-Term Load Forecasting Using ARIMA Model For Karnataka State Electrical ...IJERDJOURNAL
ABSTRACT: Short-term load forecasting is a key issue for reliable and economic operation of power systems. This paper aims to develop short-term electric load forecasting ARIMA Model for Karnataka Electrical Load pattern based on Stochastic Time Series Analysis. The logical and organised procedures for model development using Autocorrelation Function and Partial Autocorrelation Function make ARIMA Model particularly attractive. The methodology involves Initial Model Development Phase, Parameter Estimation Phase and Forecasting Phase. To confirm the effectiveness, the proposed model is developed and tested using the historical data of Karnataka Electrical Load pattern (2016). The forecasting error of ARIMA Model is computed and results have shown favourable forecasting accuracy.
Optimal Pricing Policy for a Manufacturing Inventory Model with Two Productio...IJERDJOURNAL
ABSTRACT: When a new product is launched, a manufacturer applies the strategy of offering a quantity incentive initially for some time to boost up the demand of the product. The present paper describes a manufacturing inventory model with price sensitive demand enhanced by a quantity incentive. Later on demand becomes time increasing also. Inventory cycle starts with low production rate which is followed by higher production rate when demand is boosted up. Shortages are not allowed in this model. Presentation of numerical examples, tables, graphs and sensitivity analysis describes the model very well. Lastly case without incentive illustrates that usually the quantity incentive offered initially is beneficial.
Analysis of failure behavior of shear connection in push-out specimen by thre...IJERDJOURNAL
ABSTRACT:- This study analyzes the failure mechanism of shear connection by three-dimensional finite element analysis (FEA) of push-out specimens that was practically unaffordable experimentally or by twodimensional FEA. For the analysis of the failure behavior of the compression strut formed in the loaded concrete member, the three-dimensional principal stress space is transformed into two-dimensional space by means of the relation between the hydrostatic stress and the deviatoric stress. The analysis of the stress state in the compression strut revealed that the deviatoric stress increases with larger load particularly in the concrete surrounding the lower part of the shear stud. Accordingly, bearing failure of concrete occurred locally within a limited region in the slab. The steep increase of the deviatoric stress accompanying the increase of the load resulted in the failure of concrete around the lower part of the shear stud, which in turn provoked the deformation and the development of bending moment of the shear stud. Finally, plastic hinge formed in the shear stud leading it to reach its limit state. The proposed finite element model can also be used to model the shear connection of the composite beam and, the proposed stress analysis method can be applied to analyze its composite action behavior.
Discrete Time Batch Arrival Queue with Multiple VacationsIJERDJOURNAL
ABSTRACT:- In this paper we consider a discrete time batch arrival queueing system with multiple vacations. It is assume that the service of customers arrived in the system between a fixed intervals of time after which the service goes on vacations after completion of one service of cycle is taken up at the boundaries of the fixed duration of time. This is the case of late arrival. In case of early arrival i.e. arrival before the start of next cycles of service. If the customer finds the system empty, it is served immediately. We prove the Stochastic decomposition property for queue length and waiting time distribution for both the models.
Regional Rainfall Frequency Analysis By L-Moments Approach For Madina Region,...IJERDJOURNAL
ABSTRACT:- In arid regions, extreme rainfall event frequency predictions are still a challenging problem, because of the rain gauge stations scarcity and the record length limitation, which are usually short to insure reliable quantile estimates. Regional frequency analysis is one of the popular approaches used to compensate the data limitation. In this paper, regional frequency analysis of maximum daily rainfall is investigated for Madinah province in the Western Kingdom of Saudi Arabia (KSA). The observed maximum daily rainfall records of 20 rainfall stations are selected from 1968 to 2015. The rainfall data is evaluated using four tests, namely, Discordance test (Di), Homogeneity test (H), Goodness of fit test (Zdist) and L-moment ratios diagram (LMRD). The Di of L-moments shows that all the sites belong to one group (Di <3.0).><1). Finally, the Zdist is used to evaluate five probability distribution functions (PDFs) including generalized logistic (GLO), generalized extreme value (GEV), generalized normal (GNO), generalized Pareto (GPA), and Pearson Type III (PE3). Zdist and LMRD both showed that PE3 distribution is the best among the other PDFs. The regional parameters of the candidate PDF are computed using L-moments approach and accordingly the regional dimensionless growth curve is developed. The results enhance the accuracy of extreme rainfall prediction at-sites and also they can be used for ungauged catchment in the region.
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
ABSTRACT: In this digital mobile world, it‟s need of time to streamline and increase efficiency in business processes like effective data collection, measurement, automatic validation, editing and estimation of measurement data, analysis and dashboard for forecasting and ease in end user accessibility with Just in Time. This paper is following two methodology in this process. CEMLI is an extensive framework for developing and implementing for Oracle whereas OUM is business process and use case driven process which supports products, tool, technologies and documentation. This paper have focused on analytical data, system automation functionality along with prototype designing. For this, analysts and administrators will collect and define calculation rule for data collection and measurement, deployment methods, dashboards and security features. This paper gives measure understanding of cloud technologies and their features like services (SaaS), deployment methods, security and ability to reduce overhead cost, downtime, and automate business processes with 360 degree review and analysis. It consolidates data in one system with volumes of analog and interval data which facilitates new customer with offering and effective program. Also it maximizes return on investments and protects revenue through comprehensive exception management.
Business Intelligence - A Gift for Decision Maker for the Effective Decision ...IJERDJOURNAL
ABSTRACT: Business Intelligence is a socio-technical concept emerged to help managers especially in their decision making tasks. A manager with different decision making styles has been started to make use of business intelligence in their own ways. Are the all managers taking benefits of Business intelligence in the same way? Does Business intelligence give each category what they want in the decision making process? If the answer to these questions is – No, then what is the expectation of managers from BI having different decision making style? Will BI could satisfy their needs? If yes, then how? By using well-formed theory in different styles of decision making and taking BI capabilities into consideration this paper highlights the framework which defines appropriate BI capabilities with each decision making style. Study shows in order to serve each style of decision in which BI capabilities changes with respect to style. It is believed that by making BI customized based on decision making styles; BI would be the much more successful in serving all the categories of managers
Effect of Water And Ethyl Alcohol Mixed Solvent System on the Stability of Be...IJERDJOURNAL
ABSTRACT: The stabilities of ternary complexes of metal ions (copper, nickel, zinc and cobalt) with betahydroxy ketone(BHK) derivatives and benzotriazole(BTAZ) derivatives in various mixed solvent systems (Water+Ethyl Alcohol) medium in 0.1 M KNO3 ionic strength at 250C using pH metric titration method have been established. The data reveal that the copper forms more stable complexes, which is followed by zinc and Ni complexes with these ligands. Cobalt form less stable complexes with these ligands. The stabilities of these complexes are further quantified with Δ log K values, intra-molecular equilibrium constants and percentage of stacking interaction in the ternary systems. The observed positive Δ log K values suggest that the flexible side chain alkyl moiety (ethyl group, butyl group) or aromatic moiety (phenyl group) in BHK ligand overlaps with the fixed aromatic moiety of BTAZ ligand in the ternary complex, which results in the enhanced stabilities for the (BHK-Alk)-Metal(II)-BTAZ and (BHK-Ph)-Metal(II)-BTAZ systems. Interestingly, the positive Δ log K values for both BHK-Alk and BHK-Ph ligands in their corresponding ternary complexes are about the same. This suggests the flexible Alkyl or phenyl side chain of BHK is overlapping with the triazole ring, but not the phenoxy ring of the BTAZ ligand.
Design of Synthesizable Asynchronous FIFO And Implementation on FPGAIJERDJOURNAL
ABSTRACT: This paper presents a design of asynchronous FIFO which, along with the regular status signals, consists of some extra status signals for more user-friendly design and added safety. Gray code pointers are used in the design. For synchronisation purpose, two synchroniser modules are used which contain two D-flip-flops each. The design is implemented and synthesised at register transfer level (RTL) using Verilog HDL. Simulation and implementation is done using Xilinx ISE Design Suite. Further, the design is implemented on Basys 2 Spartan-3E FPGA Board. Asynchronous FIFO is used to carry out steady data transmission at high speeds between two asynchronous clock domains.
Prospect and Challenges of Renewable Energy Resources Exploration, Exploitati...IJERDJOURNAL
ABSTRACT: This paper enumerates the status and challenges of exploration, exploitation and development of renewable energy resources and its roles in sustainable development in Africa. A brief review of energy and renewable energy resources in Africa was succinctly done. The concept of sustainable development as it borders on the Renewable Energy Technologies and their roles were also discussed. The challenges facing the acceptance, deployment and promotion of Renewable Energy Technologies in Africa were also highlighted. The barriers were classified as; policy, regulation and institutional; information and technical capacity and financial. Recommendations were made towards solving problems peculiar to exploration, exploitation and development of Renewable Energy in entirety in Africa.
Power Quality Disturbaces Clasification And Automatic Detection Using Wavelet...IJERDJOURNAL
Abstract— In this paper a development method to detect and classify the several power quality problems using the discrete wavelet transformation and artificial neural networks combined. There are several other methods in use to detect the same problem like Hilbert transform, Gabor transform, Gabor-Wigner transform, S transform, and Hilbert-Haung transform. The method of using wavelet and ANN includes the development of voltage waveforms of sampling rate and number of cycles, and also large number of power quality events with help of MATLAB software. The wavelet transformation and ANN tools used to get required coefficients. The obtained events of power quality monitored in each step to classify the particular event. These steps of the paper lead towards the automatic real time monitoring, detection and classification of power signals
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 13, Issue 8 (August 2017), PP.46-51
46
A Novel Approach To Detect Trustworthy Nodes Using Audit
Based Scheme For WSN
*1
Nagalambika S P, 2
Dayanand Jamkhandikar, 3
Manikrao Mulge
1
M.Tech Student, CSE Department GND Engineering College Bidar, Karnataka
2
Professor, CSE Department GND Engineering College Bidar, Karnataka
3
Asst. Professor, CSE Department GND Engineering College Bidar, Karnataka
Corresponding author: Nagalambika S P
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving
nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system
that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system
integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based
on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis,
without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover,
AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multi-
channel networks or networks consisting of nodes with directional antennas. This work implements the AMD
approach by considering the rushing attack. The analysis of the results confirms that AMD based method with
rushing attack performs better as compared to the non rushing attack.
Keywords: Attack detection, AMD, Rushing attack, Misbehaving nodes.
I. INTRODUCTION
In the absence of a supporting infrastructure, wireless ad hoc networks realize end-to-end
communications in a cooperative manner. Nodes rely on the establishment of multi-hop routes to overcome the
limitations of their finite communication range. In this paradigm, intermediate nodes are responsible for relaying
packets from the source to the destination; network model presupposes that intermediate nodes are willing to
carry traffic other than their own. When ad hoc networks are deployed in hostile environments (tactical
networks) [1], or consist of nodes that belong to multiple independent entities, a protocol-compliant behavior
cannot be assumed. Unattended devices can become compromised and drop transit traffic in order to degrade the
network performance. Moreover, selfish users may misconfigure their devices to refuse forwarding traffic in
order to conserve energy. This type of behavior is typically termed as node misbehavior
II. LITERATURE SURVEY
Literature survey is the most important step in software development process. Before improving the
tools it is compulsory to decide the economy strength, time factor. Once the programmer„s create the structure
tools as programmer require a lot of external support, this type of support can be done by senior programmers,
from websites or from books. In this paper, [2] author discussed about in mobile ad hoc networks (MANETs),
an essential requirement for the foundation of communication among nodes is that nodes should coordinate with
one another. In the presence of malicious nodes, this requirement may lead serious security concerns; for
instance, such node may disturb the routing process. In this context, preventing or detecting malicious nodes
launching rushing attack gray hole or collaborative black hole in challenge. This project attempts to determine
this issue by designing a dynamic source routing (DSR)- based routing mechanism, which is referred to as the
cooperative bait detection scheme(CBDS), that coordinates the advantages of both proactive and reactive
defense Architectures. Our CBDS system implements a reverse tracing technique to help in achieving the stated
goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS
outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in
terms of packet delivery ratio and routing overhead (chosen as performance metrics).
In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication
among nodes is that nodes should cooperate with each other [3]. In the presence of malicious nodes, this
necessity may lead to serious security concerns; for example, such nodes may disturb the routing process. In
these contexts, preventing or detecting malicious nodes launching gray hole or collaborative black hole attacks
is a challenge in mobile adhoc network. In this paper attempts to resolve this issue by designing a routing
mechanism in which MD5 (Message Digest 5) technique is used. This method will help in achieving the stated
2. A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
47
goal. In proposed work we will try to achieve packet delivery ratio and routing overhead will be considered and
choosen as performance metrics.
In Mobile Ad-hoc Networks (MANETs), the main problem is the security as well as formation of
communication amongst nodes is that nodes must work together with each other. Avoiding or sensing malicious
nodes initiation through rushing attack gray hole or collaborative black hole attacks is the main challenge [4].
Cooperative bait detection approach mixes the advantages of both proactive and reactive defense architectures.
Here it uses the technique of transposition for implementing security and the CBDA technique outfits a reverse
tracing method to help in attaining the specified aim. The demonstration in the occurrence of malicious-node
attacks, the CBDA outperforms the DSR, and Best-Effort Fault-Tolerant Routing (BFTR) protocols in relations
to packet delivery ratio and routing overhead. In the transposition method we use the key which is the as key
value of the character which is encrypted at sender side and decrypted at receiver. In paper [5] the authors
proposed a system in which nodes accumulate credit to transmit their own packets. To ensure correctness, the
credit reward to traffic and congestion condition, while credit-based systems motivate selfish nodes to corporate,
they provide no incentive to malicious nodes .such nodes have to intend to collect for forwarding their own
traffic moreover ,credit based systems do not identify misbehaving nodes, thus allowing them to remain within
network indefinitely.
Routing attack to monitor and identify misbehaving nodes is considered in [6]. A node with a high
packet dropping rate is given by bad reputation by its neighbors. This reputation information is propagated
periodically throughout the network and is used as an important metric in selecting routes. This method can
identify suspicious hops that exhibit high packet loss. Dynamic source routing (DSR) protocol for multi-hop
wireless and adhoc networks is considered in [7]. Acknowledgement and cryptographic methods are used for
identifying malicious nodes use of any routing protocols for detecting selective packet-dropping attacks in
highly dynamic environment. The authors in [8] introduced an approach which is uses two algorithms which
will be used in parallel in such a way that the results generated by one of them are further processed by other to
finally generate the list of misbehaving nodes. This part detects the misbehaving links using the 2ACK.
III. SYSTEM ARCHITECTURE
Figure 1: System Architecture
The above figure1 shows the proposed system architecture. This deals with audit processing in which it
gives authentic details for detecting malicious nodes, the detection of malicious nodes done by use of rushing
attack, is considered as enhancement. Initially the source node broadcasts its RREQ messages to all neighbor,
source select route with highest reputation path value, mainly shorter routes are preferred [9]. The source node
estimates the average of all nodes acknowledgement time called threshold value, the intermediate node rejects
all paths which are having minimum threshold, is said to be attacked, the further analysis made only if there
exist a path value greater in two different routes, in that case shorter route are preferred. Use of routing protocols
such as AODV, DSR etc. communication done through WSN.
IV. METHODOLOGY
In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes
which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that
effectively and efficiently isolates both continuous and selective packet droppers [9].The AMD system
integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based
3. A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
48
on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis,
without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover,
AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multi-
channel networks or networks consisting of nodes with directional antennas. The absence of a supporting
infrastructure, wireless ad hoc networks realize end-to-end communications in a cooperative manner [10].
Nodes rely on the establishment of multi-hop routes to overcome the limitations of their finite communication
range. In this paradigm, intermediate nodes are responsible for relaying packets from the source to the
destination. This network model presupposes that intermediate nodes are willing to carry traffic other than their
own. When ad hoc networks are deployed in hostile environments (tactical networks), or consist of nodes that
belong to multiple independent entities, a protocol-compliant behavior cannot be assumed. Unattended devices
can become compromised and drop transit traffic in order to degrade the network performance. Moreover,
selfish users may misconfigure their devices to refuse forwarding traffic in order to conserve energy. This type
of behavior is typically termed as node misbehavior as shown below in figure2.
Source
node
Route
calculation
Neighbour
Detection
Auditofnodes
Malicious
activities
Detection
ofattack
Figure 2: Use Case diagram
Implementation
Network simulator 2 is used as the simulation tool in this project. It has an open source code that can be
modified and extended and is an object–oriented, discrete event simulator for networking and provides
substantial support for simulation. It is written in C++, with an Otcl interpreter as a command and configuration
interface. C++ is a compiled programming language needs to be compiled (i.e., translated) into the executable
machine code where as Otcl is an interpreted programming language [11]. Upon execution, the interpreter
translates Otcl instructions to machine code understandable to the operating system line by line.
To perform simulation and evaluate the performance following simulation parameters are used:
Simulator NS2
Channel type Channel/Wireless channel
Radio propagation n model Propagation/Two ray ground
Network interface type Phy/wireless Phy
MAC type MAC/802_11
Interface queue type Queue/Drop Tail/Pri Queue
Link layer type LL
Antenna model Antenna/Omni antenna
Max packet in ifq 300
Number of mobile nodes(nn) 50
Routing protocol AODV
X dimension of topography 1670
Y dimension of topography 1200
Set opt initial energy 100
Table1: Parameters used
4. A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
49
V. RESULTS AND DISCUSSION
The simulation was carried out by using the above parameters. The following evaluation metrics are considered.
Throughput.
Delay
Overhead
Packet delivery ratio(PDR)
The below table 2 show the parameters and the resulting graph by considering the X-graph tool.
Results
Parameters Without rushing With rushing
Throughput (kbps) 160.70 174.80
Delay(msec) 28.2001 83.20
PDR (%) 0. 9792 0. 98
Overhead(load) 2.922 3.106
Table 2: parameters graph for plotting
Figure 3: Throughput comparison Graph
The figure3 shows that, X-graph explains about throughput in terms of time more amount of data is transferred
i.e. throughput increases, 174 bits are transmitted in. This is one of the advantages of improving network
throughput.
5. A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
50
Figure 4: Average end to end delay graph
The figure4 shows that the end to end delay is calculated using difference in sent and received time, measured in
mili seconds or micro seconds. Includes all possible delays caused by buffering during route discovery at
queuing significant in understanding the delay introduced by path discovery.
Figure 5: Packet delivery ratio (PDR) comparison graph
The figure5 shows that, PDR for total packet sent by total packet received, measured in percentage (%).
Represents value for packet delivery ratio. The number of packets transmitted by source and the number of
packets acknowledge by destination.
6. A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
51
Figure 6: Overhead comparison graph
The figure 6 shows that, the number of packet processed, measured in terms of load.
VI. CONCLUSION AND FUTURE ENHANCEMENTS
This work focuses on identifying the set of nodes that misbehave in a particular path, from source to
the destination. This deals with audit processing, in which it gives authentic details for detecting malicious
nodes. The detection of malicious nodes is done by using rushing attack. Initially the source node broadcasts its
RREQ packet to all neighbors. Source select path with highest reputation path value, mainly shorter routes are
preferred. The various parameters such as throughput, delay, PDR and overhead conforms this method of AMD
by using rushing attack performs better as compared to the methods without rushing attack. For better
performance combine rushing attack with warm hole attack gives good results in future.
.
ACKNOWLEDGMENT
We indebted to management of GNDEC, Bidar for excellent support in completing this work at right
time. A special thanks to the authors mentioned in the references.
REFERENCES
[1]. J.crowcroft, R.Gibbens, F.Kelly, and S.Ostring.modelling incentives for collaboration in mobile adhoc networks. In proceeding of
WiOpt, 2010.
[2]. C. Chang, Y.Wang, and H. Chao, in mobile ad hoc networks (MANETs), an essential requirement for the foundation of
communication among nodes is that nodes should coordinate with one another.IEEE explorer ,2009
[3]. A. Baadache and A. Belmehdi, in mobile ad hoc networks (MANETs), a primary requirement for the establishment of
communication among nodes is that nodes should cooperate with each other.IEEE explorer 2010
[4]. K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan In Mobile Ad-hoc Networks (MANETs), the main problem is the security as
well as formation of communication amongst nodes is that nodes must work together with each other.IEEE explore 2013.
[5]. L.Buttyan and J.P.Hubax.simulating cooperation in self organizing mobile adhoc networks.ACM/KLuwer mobile networks and
applications, 8(5):579-592, Oct 2010.
[6]. J.Eriksson,M.Faloutsos,andS.Krishnamurthy.Routing amid colluding attackers.2010
[7]. D.B.Jhonson, D.A.Maltz, andJ.Broch.DSR: dynamic source routing protocol for multi-hop wireless and adhoc networks.2010.
[8]. Shirin Samreen, G.Narsimha (2014), an efficient approach for the Detection of Node Misbehavior in an MANET based on link
Misbehavior, 2013 3rd
IEEE.
[9]. Tao Shu and Marwan Krunz.Privacy- Preserving and truth full detection packet dropping attacks in wireless adhoc networks ,IEEE
Transactions on mobile adhoc networks,july 2014.
[10]. Vasantha.V, Dr.Manimegalai (2010), Mitigating Routing Misbehaviors using Subjective Trust Model in Mobile Ad hoc Networks,
IEEE.
[11]. C.perkins and p.bhagwat proactive protocol in MANET, M.Greis.Tutorial for the network simulator NS2, available at:
http://www.isi.edu/nsnam/ns/tutorial.
*Dayanand Jamkhandikar. “A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme
For Wsn.” International Journal of Engineering Research and Development, vol. 13, no. 08, 2017, pp. 46–
51.