Submit Search
Upload
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture
•
0 likes
•
43 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i9/IRJET-V4I954.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
Security issues performance in ad hoc oddv
Security issues performance in ad hoc oddv
Editor Jacotech
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
IJMER
Intrusion detection in MANETS
Intrusion detection in MANETS
Pooja Kundu
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
pijans
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
IJCNCJournal
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
Recommended
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
Security issues performance in ad hoc oddv
Security issues performance in ad hoc oddv
Editor Jacotech
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
IJMER
Intrusion detection in MANETS
Intrusion detection in MANETS
Pooja Kundu
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
pijans
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
IJCNCJournal
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
journalBEEI
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
Module 6 Wireless Network security
Module 6 Wireless Network security
nikshaikh786
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
slksagar
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
A New Trust Model for 5G Networks
A New Trust Model for 5G Networks
Paul Bradley
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET Journal
Blug Talk
Blug Talk
guestb9d7f98
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
VLSICS Design
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
Alexander Decker
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
Research review of iot
Research review of iot
Abdullah Aziz
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
IJECEIAES
A Brief Review on Wireless Networks
A Brief Review on Wireless Networks
IRJET Journal
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
IRJET Journal
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
IRJET Journal
More Related Content
What's hot
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
journalBEEI
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
Module 6 Wireless Network security
Module 6 Wireless Network security
nikshaikh786
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
slksagar
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
ijceronline
A New Trust Model for 5G Networks
A New Trust Model for 5G Networks
Paul Bradley
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET Journal
Blug Talk
Blug Talk
guestb9d7f98
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
VLSICS Design
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
Alexander Decker
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET Journal
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
Research review of iot
Research review of iot
Abdullah Aziz
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
IJECEIAES
What's hot
(19)
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Module 6 Wireless Network security
Module 6 Wireless Network security
Eaack—a secure intrusion detection.ppt
Eaack—a secure intrusion detection.ppt
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
A New Trust Model for 5G Networks
A New Trust Model for 5G Networks
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
IRJET - Designing a High Level Co-Orporeate Network Infrastructure with MPLS ...
Blug Talk
Blug Talk
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
Research review of iot
Research review of iot
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Similar to A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture
A Brief Review on Wireless Networks
A Brief Review on Wireless Networks
IRJET Journal
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
IRJET Journal
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
IRJET Journal
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
IOSR Journals
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
BRNSSPublicationHubI
A countermeasure for flooding
A countermeasure for flooding
ijcsa
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
Routing security in ad hoc wireless network
Routing security in ad hoc wireless network
Elanthendral Mariappan
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
pijans
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
pijans
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
4g security presentation
4g security presentation
Kyle Ly
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
IRJET Journal
Similar to A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture
(20)
A Brief Review on Wireless Networks
A Brief Review on Wireless Networks
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A countermeasure for flooding
A countermeasure for flooding
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
Routing security in ad hoc wireless network
Routing security in ad hoc wireless network
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
4g security presentation
4g security presentation
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
result management system report for college project
result management system report for college project
Tonystark477637
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Recently uploaded
(20)
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
result management system report for college project
result management system report for college project
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313 A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture Miss. Shraddha V. Pawar1 , Prof. Sachin P. Patil2 1Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. 2Department of Computer Science and Engineering Annasaheb Dange college of Engineering & Technology,Ashta. ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - The WiMAX and LTE are two wireless radio data transmission technologies based on IEEE 802.16 designed to ensure broadband wireless access. This paper considers the problem of detecting rogue node in WiMAX networks. A rogue node is an attacker node that duplicates a legitimate node. It may lead to disturbance in service. In this paper we have proposed an efficient technique forsecure datatransmissionto ensure the security and integrity of the data packet in the WiMAX network. We have used an ECDH algorithm for ensuring secure data transmission. Key Words: Rogue Node, Distributed Security, Elliptic Curve Diffie Hellman Algorithm(ECDH), Worldwide Interoperable for Microwave Access(WiMAX). 1. INTRODUCTION Vehicular communications have received a great deal of attention in recent years due to the demand for multimedia applications during travel andforimprovements in safety. Safety applications often require fast message exchanges but do not use much bandwidth. On the other hand, multimedia services require high bandwidth for vehicular users.Hence,toprovidemobilebroadbandservices at a vehicular speed of up to 350 km/h. Worldwide interoperable for Microwave Access (WiMAX) and Long- Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth- Generation (4G) wirelesstechnologiesthathavewell-defined quality of service (QoS) and security architectures. WiMAX and LTE resemble each other in some key aspects, including operating frequency spectrum, high capacity, mobility, strong QoS mechanisms, and strong security with a similar key hierarchy from the core network to the access network. However WiMAX and LTE also differ from each other in certain aspects, as they haveevolvedfrom different origins. LTE has evolved from 3rd Generation Partnership Projects (3GPP): thus, the LTE network has to support the existing 3G users' connectivity, but there is no such constraint for WiMAX. Particularly, on the security aspect, the WiMAX authentication process uses Extensive Authentication Protocol Tunneled. Maintaining QoS requirements of a specific application has become a significant topic and priority is to maximize the QoS experienced by the user. QoS is the ability of a network to provide premier service to some fraction of total network traffic over specific underlying technologies. QoSmetricsare delay, jitter (delay variation), serviceavailability,bandwidth, throughput, packet loss rate. Metrics are used to indicate performance of particular scheme employed. QoS can be achieved by resource reservation (Integrated services), prioritization (differentiated services). 2. EASE OF USE As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. The main cause for the MAC layer security threatsin4Gvehicular networks is due to certain unprotected MAC management messages between Mobilestation(MS)andBaseStation(BS). When the control messages are in plain text, the attackers/intruders can easily spoof, modify,andreplythose control messages for the intended receiver node. The severity of the security threats may vary based on the modification of those control messages. Similarly, the attackers may send the continuous false packets unnecessarily to the receiving node for the water torture attacks. Many research efforts have been published on MAC layer security threats in both WiMAX and LTE networks and a few of them discussed the implementationofIPSecsecurity for WiMAX networks. In multihop WiMAX, once the user is registeredwith the home network the security layer may use three levels of protections for the MAC management messages, i.e., No protection, CMAC, and Encrypted by AES-CCM. As a consequence of adding the encryption support for MAC messages, some of the security threats discussed no longer exist for multihop WiMAX. However, one of the security threats such as rogue RN attack is exists that adds a rouge node/Fake node in network and creates big threaten to the 4G multihop wireless networks. Such attack causes network QoS gets degraded. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop. But enhancing security should not degrade network QoS. Hence we proposed Elliptic Curve Diffie-Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks. ECDH is competitor to RSA public key algorithm and has very good security. ECDH consumes less power and suitable for 4G wireless networks.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314 3. LITERATURE SERVEY In [1] authors Proposed QoS aware distributed security architecture based on the Elliptic Curve Diffie-Hellman (ECDH) protocol. Worldwide Interoperability for Mobile Access (WiMAX) and Long Term Evolution (LTE) are 4G wireless technologies which have better Quality of Service (QoS) and security architectures. Security threats likeDenial of Service (DoS), Water Torture Attack, rouge RN attack, etc in WiMAX and LTE are present issues. So there is a need for strong security mechanisms and strict authentication methods to overcome the existing security threats in 4G multihop wireless networks. But enhancing security should not degrade network QoS. In [2] authors have researched that there in the VANET communication, especially in Multihop networks the forwarder node authentication is more important. So, we need to provide authentication for each and every hops. Hop by Hop message authentication is required to provide high level security in VANET. Simultaneously, the address of the data origin known by the attacker leads to node capture attack. In [3] authors have researched on measuring the QoS performance for node protection in 4G wireless networks using network coding. Exclusive OR (XOR) network codingis used to explain the node protection for multihop 4G wireless networks. It is followed by measurement of the QoS performance, such as packet delivery ratio (PDR), latency and jitter, for different scenarios. Failure of a single and two relay node with and without proposed protection scheme is tested along with user's mobility. In [4] authors proposed Network Protection Codes (NPC) using network coding to protecttheoperationofthe network against link and node failures. Their interest was to find the limits of their NPC and where to deploy their NPC using several network graphs with a minimum number of edges. The authors also considered the problem of providing protection against a single node failureusingnetwork coding and reduced capacity technique for wired networks. In [6] authors proposed, cross layer QoS architecture for 4G heterogeneous network services. QoS engine and cross layer algorithms are the main components. QoS engine is composed of QoS daemon, QoS agent and control module. Cross Layer Architecture monitors and adjusts resources periodically. In the absence of CLA, average latency and average packet loss are reduced by 2% and 8.5% respectively. But throughput achievedisslightlylowerinCLA than traditional layered approach. In these existing research efforts, the authors implemented the relaynodeprotectionusingnetwork coding for different networks such as wired networks, Wireless Sensor Networks (WSNs)andoptical networks.However,the QoS performance of network coding for relay node protection in a multihop wireless network is not tested until now. Also, the relay node protection is very useful for multihop 4G wireless networks. 4. SYSTEM ARCHITECTURE Figure 1 shows System architecture for proposed system. After generating WiMAX Multihop network and implementing ECDH on it, we generateattack byaddingnode in existing network. Then ECDH detects the rouge node by using hop-by-hop authentication after completing intial ranging process. By using distributed security architecture we prevent the node which is detected as rouge node and forward massage to next node. This process repeats until destination node found. Fig – 1: System Architecture 5. METHODOLOGY There are four Modules in system: 5.1. Generation of 4G Multihop Network and ECDH implementation on it. 5.2. Attack Detection 5.3. Attack Prevention 5.4. Performance Evolution 5.1 Generation of 4G Multi Hop WiMAX Network and ECDH implementation- In this module, we are implementing initial configuration and setup of 4G Multihop WiMAX network in NS 2or NS 3 Network simulator tool. We are adding base station node, mobile station node and relay node. It creates multihop network. Having one base station and multiple ECDH Detect node by Distributed Sec. Prevent Attacker node Send Packets to the Destination Secured Initial Ranging Process Generate WiMAX Network
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315 mobile stations,relaynodes.Hereweareimplementinginitial ranging process of ECDH. Which is shown in figure 2.After downlink channel synchronization (DL Sync),the MS will send ranging request (RNG_REQ)message. In turn,BS will responds with RNG_RES message.ThentheSubsequentsteps are following. EAP Based Authentication- The authenticator intheAccessNetwork Gateway(ASN-GW) sends an EAP Identity request to the MS, and the MS will respond to the request by sending PKM-REQ (PKMv2 EAP- Transfer) message. A PKM-REQ message contains thedetails of SIM or X.509 certificate. Then the ASN-GW forwards the PKM-REQ to the AAA server over radius protocol. The AAA server authenticates the device and provides the Master Session Key (MSK) in an EAP-TTLS protocol. Then, it forwards MSK to the authenticator. The authenticator generates Authorization Keys (AK) from the MSK and forwards to the BS. At the same time, the MS also generates the same AK from the MSK. Now, the BS and MS can mutually authenticate each other using AK. Authorization and Security Association- Once the device or the user is authenticated by the network, the BS has to authorize the user by its unique Security Association Identity (SAID) using SA-Transport Encryption Key (SA-TEK) challenge messages, as depicted in the second block in Figure 2. Traffic EncryptionandMACMessageEncryption- Fig – 2 : Initial Ranging Process for WiMAX The MS establishes an SA for each service flow where the BS provides both uplink and downlink TEK to encrypt the data. Initially TEK is generated from the EAP-based authentication and then refreshed by BS periodically. 5.2 Attack Detection- As author Ebrahim Halil Saruthan has proposed system to detect and prevent rouge node in real time wireless network [9] it shows real example of rouge node in network. Different architectures like Access Point (AP) architecture, client architecture etc. are used to Detectand Prevent rouge node. So, we are generating attack in network using simulator. Network having attack, adds new rouge/fake node to existing one to receive data and hand over to some other nodes, creates traffic jam or to spoof or modify data etc. Now we have to detect the rouge node with the help of ECDH. First step is secured initial ranging process for 1st hop to nth hop node is shown in figure 3.In initial ASN GW AAA MS BS EAP Based Authentication Authorization and Security Association (SA) Traffic encryption and MAC Message Encryption Master Session Key Establishment Ranging Request Ranging Response MS context initialization
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316 ranging process as shown in figure. 2 any WiMAX node (MS/RS) wants to establish connection with BS generates the public and private key pairs and sends public key to BS initial ranging codealongwithRNG_REQmessage.Whichis encrypted using BS public key.BS responds with RNG_RSP message which is encrypted using BS public key. Fig - 3 : Distributed Security using ECDH BS responds with RNG_RSP message which is encrypted with the MS/RS Public key. Hence MS/RS establish secure tunnel with BS and subsequent MAC messages encrypted using ECDH public key. In secure initial ranging process the only additional bandwidth overhead is the exchange of global parameters and public keys. Now next step is distributed security using ECDH in multihop WiMAX network. To establish hop to hop authentication and to reduce computational overhead of centralized node distributed architecture is necessary. In which new node is actually identified in WiMAX network. Figure 3 shows SA and key management in proposed security architecture. 5.3 Attack Prevention- This module shows how ECDH helps to prevent RN Attack using key exchange.NeighborauthenticationandSAisnext step. If the new RS is connected with network, the BS will inform to the updated member list to the existing RSs group in Downlink Channel Descriptor (DCD) message. Now if new RS will find another RS during channel scanning it verifies new RS is genuine or not verifying RS_ID. Then it sends public key and RS_ID to the neighbor RS to establish SA. The neighbor RS will also send the public key in response. At the end of association, RS’s generate uplink BS MS1 RS2 RS1 RS3 MS4MS3MS2 MS5 WiMAX Air i/f withECDH key agreement Tunnel i/f for ECDH key agreement
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317 1 1 1 2 3 4 Fig - 4 : Neighbor Authentication Process using ECDH and downlink CMAC digital signaturesamongthem.Figure 4 shows neighbor authentication process.instep1,theRS3 receives updated list after ECDH agreement with BS. During scanning process, RS3 may find the DCD and other downlink parameters of RS2 as shown in step 2.Since RS3 knows that RS2 is a legitimate node based on list received from BS, it establishes theECDHagreement.AfterthatBoth share their digital signatures as shown in step3andstep4. 5.3 Performance Evaluation- This module calculates QoS performance andshows that how it maintains its stability after applying ECDH using NS 2 or 3 supporting tools such as X-Graph. We can consider parameters for calculating performance like latency, service availability, jitter, Packet loss rate, throughput performance. 6. CONCLUSION As the increase in demand for multimedia applications and for the safety of mobile users, providing Internet that supports QoS-aware and safe multimedia services for vehicular networks is mandatory for service providers. To provide high bandwidth support at the vehicular speedof up to 350 km/h, the WiMAX and LTEnetworksarethepreferred candidates. 4G networks have well-defined QoS and security architectures. However, some major security threats suchas DoS attack still exist in 4G multihop networks, because certain MAC messages are transmitted only in plain text. For this reason, we have proposed a distributed security architecture using the ECDH algorithm in Layer 2 for 4G multihop wireless networks. In the proposed scheme, the wireless nodes are initially authenticated by the home network and then authorized by the access node.Inaddition, the proposed scheme requires only a slightly higher bandwidth and computational overhead than the default standard scheme. REFERENCES [1] Perumalraja Rengaraju, Chung-Horng Lung, Member, IEEE, and Anand Srinivasan “QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 6, JULY 2014. [2] Vinoth V. and C. Monica Manoreya “A SAMA Scheme For Improving Qos in 4G Multihop Wireless Networks” Department of Information Technology, Sathyabama University, Chennai, India,VOL 10,no-7,2015. [3] Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan, ”QoS and protection of relay nodes in 4G wireless networks using network coding”, 9th International Conference on Wireless Communications and Mobile Computing (IWCMC), Sardinia ,pp. 282 - 287 ,July 2013 [4] S. Aly and A.Kamal, “ Networking Coding-Based Protection Strategies Against Node Failures” Proc. of IEEE ICC.,2009.pp.1-5. [5] S. Aly, A.Kamal and A.Walid, “Network Design and Protection using Network coding” Proc. of IEEE Theory Information Workshop.2010, pp.1-5. [6] Jiann-Liang Chen, Ming-Chiao Chen, Shih-Wei Liu, Jyun- Yu Jhuo, “Cross-layer QoS architecture for 4G heterogeneous network services”, 11th Int.Conf. BS
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318 Advanced Communication Technology (ICACT 2009),Phoenix Park, pp.73-77,Jan 2009. [7] A. Rammoorthy,and S. Li.”Protection against Link Errors and Failures using Network Coding in Overlay Networks”,Proc. Of IEEE International Symposium on Information Theory, July 2009,pp.986-990. [8] A. Kamal,”1+N Network Protection for Mesh Networks:Network Coding-Based Protection using p- Cycles” ,IEEE/ACM Transactions on Networking, Feb 2010,pp.67-80. [9] Ibrahim Halil Saruthan,”Detecting and Preventing rouge devices on network”SANS institutes 2007.
Download now