IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Architecture and implementation issues of multi core processors and caching –...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Clustering of medline documents using semi supervised spectral clusteringeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A review on implementation of algorithms for detection of diabetic retinopathyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes, maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes, maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Similar to A simulation and analysis of secured aodv protocol in (20)
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
A simulation and analysis of secured aodv protocol in
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 542
A SIMULATION AND ANALYSIS OF SECURED AODV PROTOCOL IN
MOBILE AD HOC NETWORKS
Sesha Bhargavi Velagaleti1
, M. Seetha2
, S. Viswanadha Raju3
1
Assistant Professor, IT Department, 2
Professor, CSE Department, GNITS, Shaikpet, Hyderabad, India
3
Professor, CSE Department, JNTUK, Hyderabad, India
b.velagaleti@gmail.com, smaddala2000@yahoo.com, viswanadha_raju2004@yahoo.co.in
Abstract
A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections
in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits
in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the
performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its
many efficient features. The main aim of this simulator is to provide better networking environment for research and educational
purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the
results with other protocols.
Keywords: MANET, AODV, Network Simulator, DSR
---------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
MANETS provide more flexibility in the creation of a network
in situations like where there is no possibility or less
possibility in setting up the predefined infrastructure. Unlike a
node in an infrastructure based network, all the nodes in a
MANET cooperate with each other to perform routing. All
the nodes in a network are very free to move and hence change
the links very easily. Because the radio transmission range is
very less, there is a lot of overhead involved with respect to
routing, security in particular. This is because the nodes are
more prone to failures and compromises in ad hoc networks
because of their mobility.
MANET is a wireless ad-hoc network which is also a self-
configuring network of mobile routers (and associated hosts)
that are connected by wireless links, and all these together
form an arbitrary topology. The nodes are free to move
randomly and manage themselves and also perform the task of
routing as the nodes themselves act as routers. So the
network’s topology changes very rapidly and unpredictably.
This type of network can easily act as a standalone network as
well as has the capability to connect to the internet. With this
feature, MANET s can be widely used for commercial
purposes very easily. MANET s are very self-organizing and
adaptive. Networks are formed on the fly and devices can
leave and join the network at any time.
Fig1: A Mobile Ad hoc Network
The communication between the devices in this wireless
network which are in their radio range will be in a peer-peer
fashion. Intermediate devices can be used if the devices wish
to communicate with those that are out of the radio range.
Every device acts as a host when providing any information or
requesting from /to any other node in the network. These
devices acts as routers while discovering and maintaining
routes for other nodes in the network.
Mobile ad hoc networks became a popular for research as
laptops and 802.11/Wi-Fi wireless networking became
widespread from 1990s. Many researchers are evaluating the
protocols with different degrees of mobility within a bounded
space, usually with all nodes within a few hops of each other,
and usually with nodes sending data at a constant rate. The
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 543
packet drop rate, the overhead introduced by the routing
protocol, and other measures are also evaluated for different
protocols.
1.1 Characteristics of Mobile Ad Hoc Networks
1. MANETs doesn’t depend on any fixed infrastructure
for the operation of mobile nodes.
2. Any node or device can freely join and leave the
network at any time , which accounts
3. They can be easily attached to any internet or cellular
networks as they need not operate in standalone mode
only.
4. It can be rapidly deployed with user intervention.
5. In MANET, each node act as both host and router.
That is it is autonomous in behaviour.
6. Multi-hop radio relaying- When a source node and
destination node for a message is out of the radio
range, the MANETs are capable of multi-hop routing.
7. Distributed nature of operation for security, routing
and host configuration. A centralized firewall is
absent here.
8. Mobile nodes are characterized with less memory,
power and light weight features.
9. The reliability, efficiency, stability and capacity of
wireless links are often inferior when compared with
wired links. This shows the fluctuating link
bandwidth of wireless links.
10. Mobile and spontaneous behavior which demands
minimum human intervention to configure the
network.
11. All nodes have identical features with similar
responsibilities and capabilities and hence it forms a
completely symmetric environment.
12. High user density and large level of user mobility.
13. Nodal connectivity is intermittent.
1.2 MANET Challenges
A MANET environment has to overcome certain issues of
limitation and inefficiency. It includes:
• The wireless link characteristics are time-varying in
nature: There are transmission impediments like
fading, path loss, blockage and interference that adds
to the susceptible behaviour of wireless channels.
The reliability of wireless transmission is resisted by
different factors.
• Limited range of wireless transmission – The limited
radio band results in reduced data rates compared to
the wireless networks. Hence optimal usage of
bandwidth is necessary by keeping low overhead as
possible.
• Packet losses due to errors in transmission –
MANETs experience higher packet loss due to
factors such as hidden terminals that results in
collisions, wireless channel issues (high bit error rate
(BER)), interference, frequent breakage in paths
caused by mobility of nodes, increased collisions due
to the presence of hidden terminals and uni-
directional links.
• Route changes due to mobility- The dynamic nature
of network topology results in frequent path breaks.
• Frequent network partitions- The random movement
of nodes often leads to partition of the network. This
mostly affects the intermediate nodes.
Fig2: Types of Attacks on MANET’s
The application of this wireless network is limited due to the
mobile and ad hoc nature. Similarly, the lack of a centralized
operation prevents the use of firewall in MANETs. It also
faces a multitude of security threats just like wired networks.
It includes spoofing, passive eavesdropping, denial of service
and many others. The attacks are usually classified on the
basis of employed techniques and the consequences.
Fig3: Architecture of MANET
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 544
1.3 Applications of MANET’s
With the increase of portable devices as well as progress in
wireless communication, ad-hoc networking is gaining
importance with the increasing number of widespread
applications. Ad-hoc networking can be applied anywhere
where there is little or no communication infrastructure or the
existing infrastructure is expensive or inconvenient to use.Ad
hoc networking allows the devices to maintain connections to
the network as well as easily adding and removing devices to
and from the network. The set of applications for MANET is
diverse, ranging from large-scale, mobile, highly dynamic
networks, to small, static networks that are constrained by
power sources. Besides the legacy applications that move from
traditional infra structured environment into the ad hoc
context, a great deal of new services can and will be generated
for the new environment. Typical applications include:
1. Military Battlefield: Military equipment now
routinely contains some sort of computer equipment.
Ad- hoc networking would allow the military to take
advantage of commonplace network technology to
maintain an information network between the
soldiers, vehicles, and military information
headquarters. The basic techniques of ad hoc network
came from this field.
2. Commercial Sector: Ad hoc can be used in
emergency/rescue operations for disaster relief
efforts, e.g. in fire, flood, or earthquake. Emergency
rescue operations must take place where non-existing
or damaged communications infrastructure and rapid
deployment of a communication network is needed.
Information is relayed from one rescue team member
to another over a small hand held. Other commercial
scenarios include e.g. ship-to-ship ad hoc mobile
communication, law enforcement, etc.
3. Local Level: Ad hoc networks can autonomously
link an instant and temporary multimedia network
using notebook computers or palmtop computers to
spread and share information among participants at
e.g. conference or classroom. Another appropriate
local level application might be in home networks
where devices can communicate directly to exchange
information. Similarly in other civilian environments
like taxicab, sports stadium, boat and small aircraft,
mobile ad hoc communications will have many
applications.
4. Personal Area Network (PAN): Short-range
MANET can simplify the intercommunication
between various mobile devices (such as a PDA, a
laptop, and a cellular phone). Tedious wired cables
are replaced with wireless connections. Such an ad
hoc network can also extend the access to the Internet
or other networks by mechanisms e.g. Wireless LAN
(WLAN), GPRS, and UMTS. The PAN is potentially
a promising application field of MANET in the future
pervasive computing context.8.5 MANET-VoVoN: A
MANET enabled version of JXTA peer-to-peer,
modular, open platform is used to support user
location and audio streaming over the JXTA virtual
overlay network. Using MANET-JXTA, a client can
search asynchronously for a user and a call setup
until a path is available to reach the user. The
application uses a private signalling protocol based
on the exchange of XML messages over MANET-
JXTA communication channels.
1.4 Limitations of MANET’s
1. Most of the nodes constantly change their positions in
the network which makes routing discovery very
complex.
2. Out-of date routes are also generated in the network,
which adds more overhead.
3. Most of the links are asymmetric in ad hoc networks.
4. As links come and go depending on their
transmission characteristics,one transmission may
interfere with other, which causes lot of interruptions
in the entire network.
5. Because of the dynamic topology, the medium
characteristics also change frequently, and more
complex routing algorithms have to be employed.
1.5 Routing protocols for MANET’s
Fig4: Classification of Routing Protocols
There are many ways of classifying the routing protocols but
most of them rely on routing strategy and network structure.
Mainly these are classified as Flat, hierarchical, and
Geographic position based routing protocols. Another major
classification is based on whether they are on-demand or
table-driven. Flat routing protocols are further divided into
several types based on whether the routing table is generated
statically before itself or whether it is generated only ion
demand as when the need comes so as to make a routing
decision. Examples of table-driven protocols are
a) Optimized Link state Routing (OLSR)
b) Fish-eye state routing (FSR)
c) Destination -Sequenced Distance Vector Routing (DSDV)
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 545
d) Cluster-head Gateway Switch Routing Protocol (CGSR)
Examples of on-demand routing protocols are:
a)Ad-hoc on demand Distance Vector(AODV)
b) Dynamic source Routing Protocol (DSR)
c) Temporally ordered Routing Algorithm (TORA)
d) Associativity based routing (ABR)
e) Signal Stability based Associative Routing (SSAR)
f) Location –Aided Routing Protocol (LAR)
Several hybrid protocols are also used to find a balance
between the above two types which take the domain
information into account. Examples of hybrid routing
protocols are Zone routing protocol and Wireless ad hoc
routing protocol. As the size of the network increases, flat
routing protocols does not perform well because of the lot of
overhead incurred . In such cases hierarchal routing algorithms
perform better. Examples of such algorithms are
a) Hierarchical state routing
b) Zone routing protocol
c) Cluster head Gateway switch routing protocol
d) Landmark ad hoc routing protocol
Another class of routing protocols are based on te location
information and takes the geographic co-ordinates into
account and maintain reference points to compute the routes.
Examples of such algorithms are Geocast (geographic
addressing and routing), DREAM (Distance Routing effect
algorithm for mobility) and GPSR (Greedy perimeter stateless
routing).
2. EXISTING WORK
The secure routing algorithms in wireless communication are
addressed and have been suggested for increasing the security
levels [4]. However, these algorithms are unable to protect the
network from attackers, who acquired the key information [5].
J.Li et al[6] proposed a common key encryption mechanism
for MANETs using Dynamic Source Routing(DSR).
Drawback of this model is that it dropped more packets even if
the network had few malicious users [7]. Adhoc On-Demand
Distance Vector (AODV), which is used to provide secure and
reliable data transmission over the MANETs [8]. Several
strategies are used to detect the non-cooperate nodes while
forwarding the data packets to the destination [9]. In [10],
authors discussed a trusted approach to establish the
communication between the mobile users. Here, the
communication takes place based on the watch dog. The
trusted values are represented from -1 to +1. A black hole
attack is a kind of denial of service where a malicious node
can attract all packets by falsely claiming a fresh route to the
destination and then absorb them without forwarding them to
the destination[11]. Smith et al[12] examined the routing
security of distance vector protocols in general and developed
countermeasures for vulnerabilities by protecting both routing
messages and routing updates. They propose sequence
numbers and digital signatures for routing messages and
updates as well as including predecessor information in
routing updates.
3. IMPLEMENTATION OF MANET ROUTING
PROTOCOL ON NS2
3.1 Introduction to NS2
NS2 is available under Linux, with a GPL license. Few
algorithms like DSR, AODV and DSDV were already
implemented on this simulator.NS2 is a network simulator;
built with C++ and TCL. The main goal here is to simulate
different kinds of networks, and to implement and test
different routing algorithms on those networks, and to find the
limitations of each. It has been developed in the California
University, by LBL, Xerox PARC, UCB, and USC/ISI
through the VINT project supported by DARPA. NS2 was
initially built for fixed wired networks. First, this simulator
was build for fixed network: all links among nodes were
wired. That means that the neighbour had no direct neighbour:
if two nodes were very close, they don’t communicate each
other if they don’t have a cable between each other. So, later,
an extension for wireless network was developed by UCB
Deedless, CMU Monarch projects and Sun Microsystems.
The simulator is composed of two parts: 1. The TCL code: it is
used to communicate with the simulator, and permits to define
different simulation parameters.
3.2 AODV: Ad-hoc On Demand Distance Vector
AODV is a distance vector type routing. The basic feature of
AODV is that the active nodes need not maintain the routes to
destinations. AODV works well when the communication end
points have correct routes to the router. Different messages
used by the AODV protocol for routing management are :
Route Requests(RREQs), Route Replies(RREPs), and Route
Errors(RERRs).UDP is used to receive messages and some
sort of IP header processing is also applied. It makes use of a
destination sequence number for each route entry. The
destination sequence number is created by the destination for
any information it sends to request nodes. These are used to
know which new routes are found on the way, of the many
routes available. A route with the highest sequence number is
chosen from multiple routes available for the node. An RREQ
is broadcasted as and when there is a need to find a route to
another node, until either the destination is reached or another
node is found with a fresh enough route to the destination (a
fresh enough route is a valid route entry for destination whose
associated sequence number is at least as great as that
contained in the RREQs). Then a RREQ is sent back to the
source and the discovered route is made available. Acitive
nodes which are part of the connection mar send HELLO
messages to its immediate neighbours. If Hello messages stop
arriving from a neighbour beyond some given time threshold,
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 546
the connection is assumed to be lost. When a node detects that
a route to a neighbour node is not valid it removes the routing
entry and send a REER message to neighbours that are active
and use the route; this is possible by maintaining active
neighbour lists. This procedure is repeated at nodes that
receive REER messages. A source that receives an REER can
reinitiate a RREQ message. The main drawback of this AODV
is that there is no provision to handle unidirectional links.
3.3 Dynamic Source Routing Protocol
Dynamic Source Routing (DSR) is routing protocol for
wireless mesh networks. Determining source routes requires
accumulating the address of each device between the source
and destination during route discovery. The accumulated path
information is cached by nodes processing the route
discovery packets. The learned paths are used to route packets.
To accomplish source routing, the routed packets contain the
address of each device the packet will traverse. This may
result in high overhead for long paths or large addresses,
like IPv6. To avoid using source routing, DSR optionally
defines a flow id option that allows packets to be forwarded on
a hop-by-hop basis.
This protocol is truly based on source routing whereby all the
routing information is maintained (continually updated) at
mobile nodes. It has only two major phases, which are Route
Discovery and Route Maintenance. Route Reply would only
be generated if the message has reached the intended
destination node (route record which is initially contained in
Route Request would be inserted into the Route Reply).
To return the Route Reply, the destination node must have a
route to the source node. If the route is in the Destination
Node's route cache, the route would be used. Otherwise, the
node will reverse the route based on the route record in the
Route Request message header (this requires that all links are
symmetric). In the event of fatal transmission, the Route
Maintenance Phase is initiated whereby the Route Error
packets are generated at a node. The erroneous hop will be
removed from the node's route cache; all routes containing the
hop are truncated at that point. Again, the Route Discovery
Phase is initiated to determine the most viable route.
3.4 Simulation Parameters
Simulation time 3000s
No.of clusters 12
Transmission range 200m
No.of cluster heads 10
No. of nodes 100
Topology size 1000*1000m
Routing protocol AODV
Node mobility 0 to 10m/s
Channel capacity 2Mbps
Traffic type CBR
CBR packet size 512 bytes
Frequency 2.4GHz
Simulator NS2
Pause time 1s
Number of packets 30000
Mobility model Random way
3.5 Simulation Results
We tried to implement this model with 250 nodes with
different arrival rates and with 3 clusters heads. The
simulation results are shown in the below figure. No. of data
packets sent are around 5 to 20 packets/second. We tried to
compare the no. of malicious nodes with the packet delivery
ratio so that the performance of the network in case of huge
no. of malicious nodes can be observed so as to take any
preventive action. From the obtained results we observed that
the proposed model delivered around 70% of the packets when
compared to the existing AODV protocol which delivers
almost 62% of the packets. The total network load is also
compared with end-to-end delay and was found that as the
network load increased the delay also gradually increased. We
can also conclude that AODV transferred packets at a lesser
delay compared to other protocols.
CONCLUSIONS AND FUTURE SCOPE
In this paper, we tried to implement several routing protocols
like AODV and DSR for MANET’s and compared the results
obtained with our proposed protocol with different no of
malicious nodes to identify the performance of the network
under different scenarios. The simulation results were shown
and it is found that AODV delivers packets with lesser delays
when compared to DSR protocol. In future, extensive complex
simulations could be carried out for different parameters with
more increased no. of nodes and more detailed in-depth
analysis of the entire network under various scenarios can be
done.
0
2.5
3.5
4.5
0
4.4
1.8
2.8
0
2 3
5
0
2
4
6
8
10
12
14
Correlation between no of malicious nodes
and packets delivery ratio
DSR
AODV
Proposed
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 547
REFERENCES
[1]. TCP over Ad Hoc Networks: NS-2 Simulation Analysis
by Ren Mao, Haobing Wang, Li Li, Fei Ye
[2]. SIMULATION AND COMPARISION OF AODV AND
DSR ROUITNG PROTOOCLS IN MANETS by vivek kumar
under the supervision of M.sumit miglani.
[3]. NEW SECURITY ALGORITHM FOR MOBILE
ADHOC NETWORKS USING ZONAL ROUTING
PROTOCOL by G.Varaprasad, S. Dhanalakshmi,, M. Rajaram
,Department of Computer Science and Engineering, B.M.S.
College of Engineering, Bangalore, India
[4]. Y.Zhang, W. Lee, and Y.-A. Huang, “Intrusion Detection
Techniques for Mobile Wireless Networks”, ACM Wireless
Networks, Vol. 9, pp. 545 – 556(2003).
[5].Y. C. Hu and A. Perrig, “A Survey of Secure Wireless
Adhoc Routing,” IEEE Security and Privacy Magazine, Vol.
2, No. 3, pp. 28-39(2004).
[6].J. Li, J. Jannotti, Douglas S. J. D. Couto, David. R. Karger,
and R. Morris, “A Scalable Location Service for Geographic
Adhoc Routing”, In Proceedings of International Conference
on Mobile Computing and Networking, pp. 120-130(2002)
[7]. B. Karp and H. Kung, “Greedy Perimeter Stateless
Routing for Wireless Networks”, In Proceedings of
International Conference on Mobile Computing and
Networking, pp. 243-254(2003).
[8].Y. A. Huang and W. Lee, “Attack Analysis and Detection
for Adhoc Routing Protocols,” In Proceedings of International
Symposium on Recent Advances in Intrusion Detection, pp.
125-145(2004).
[9]. L. Zhou S. B. Fred, and R. Van Renesse, “COCA: A
Secure Distributed Online Certification Authority”, ACM
Trans. on Computer Systems, Vol. 20, No. 4, pp. 329-
368(2002).
[10]. M. Gasser and E. McDermott, “An Architecture for
Practical Delegation in a Distributed System”, In Proceedings
of IEEE Symposium on Security and Privacy, pp. 20-
30(2004).
[11]. 11. Z. J. Haas, M. Perlman, “The Performance of Query
Control Schemes of Zonal Routing Protocol”, IEEE Trans. on
Networking, vol. 9, no. 4, pp. 427-438(2001).
[12]. Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna-
Aceves, “Securing Distance Vector Routing Protocols”, In
Proceedings of Internet Society Symposium on Network and
Distributed System Security, pp. 85-92(1997).
[13]. “Simulation Study and Implementation on Routing
Protocols in MANET” IJCSMS International Journal of
Computer Science & Management Studies, Vol. 12, Issue 03,
September 2012 ISSN (Online): 2231 –5268 Anju Yadav
M.Tech Scholar, Shekhawati Engineering College, Jhunjhunu,
Rajasthan.
[14].Wikipedia for AODV and DSR Routing Protocols.