This document discusses routing and security issues for trust-based frameworks in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining that routing protocols play an important role in discovering optimal paths between nodes. However, the dynamic and unpredictable nature of MANETs makes routing difficult. The document then examines security issues for MANETs including attacks from malicious nodes. It argues that establishing trust between nodes is important for routing and security. However, existing trust-based routing proposals have issues that are not clearly addressed, such as how to calculate and establish trust between nodes. The document concludes by stating that addressing these open issues could help develop more efficient and robust trust-based routing protocols for MANETs.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
This document presents an abstract of a research paper that proposes a new trust-based lightweight authentication routing protocol for mobile ad hoc networks (MANETs). It aims to improve reliability and security in MANET routing. The protocol initially uses a multipath route discovery technique to select the most reliable path based on packet success ratio. It then calculates a global trust value for each node based on direct and indirect trust assessments. If a node's trust value falls below a threshold, it is authenticated using secret sharing. Simulation results show the proposed protocol improves reliability and security compared to existing routing approaches.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
Improving Network Security in MANETS using IEEACKijsrd.com
This document discusses improving network security in mobile ad hoc networks (MANETs) using an improved version of the EAACK intrusion detection system called IEEACK. IEEACK aims to address some of the weaknesses of EAACK related to link breakage, malicious sources, and partial packet dropping. The document describes the components of IEEACK, including ACK, S-ACK, MRA, digital signatures, and a new trust-based quality of service model. Simulation results show that IEEACK can prevent attacks from malicious nodes and improve security performance metrics like packet delivery ratio and detection of malicious nodes.
The document proposes a secure multipath routing and data transmission approach for mobile ad hoc networks (MANETs). It signs route request (RREQ) packets with digital signatures to authenticate paths during route discovery. It then encrypts message parts using session keys and hashes before fragmenting and transmitting them across multiple paths. The destination node decrypts and recovers the original message. Simulation results show improved packet delivery ratio, reduced delay and packet drops, and increased resilience compared to other approaches.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
This document presents an abstract of a research paper that proposes a new trust-based lightweight authentication routing protocol for mobile ad hoc networks (MANETs). It aims to improve reliability and security in MANET routing. The protocol initially uses a multipath route discovery technique to select the most reliable path based on packet success ratio. It then calculates a global trust value for each node based on direct and indirect trust assessments. If a node's trust value falls below a threshold, it is authenticated using secret sharing. Simulation results show the proposed protocol improves reliability and security compared to existing routing approaches.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
Improving Network Security in MANETS using IEEACKijsrd.com
This document discusses improving network security in mobile ad hoc networks (MANETs) using an improved version of the EAACK intrusion detection system called IEEACK. IEEACK aims to address some of the weaknesses of EAACK related to link breakage, malicious sources, and partial packet dropping. The document describes the components of IEEACK, including ACK, S-ACK, MRA, digital signatures, and a new trust-based quality of service model. Simulation results show that IEEACK can prevent attacks from malicious nodes and improve security performance metrics like packet delivery ratio and detection of malicious nodes.
The document proposes a secure multipath routing and data transmission approach for mobile ad hoc networks (MANETs). It signs route request (RREQ) packets with digital signatures to authenticate paths during route discovery. It then encrypts message parts using session keys and hashes before fragmenting and transmitting them across multiple paths. The destination node decrypts and recovers the original message. Simulation results show improved packet delivery ratio, reduced delay and packet drops, and increased resilience compared to other approaches.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...ijp2p
Peer-to-peer systems are the networks consisting of a group of nodes possible to be as wide as the Internet.
These networks are required of evaluation mechanisms and distributed control and configurations, so each
peer (node) will be able to communicate with other peers. P2P networks actually act as the specific
transportation systems created to provide some services such as searching, large-scale storage, context
sharing, and supervisioning. Changes in configuration, possibly the resultant effects of faults and failures
or of the natural nodes behavior, are one of the most important features in P2P networks. Resilience to
faults and failures, and also an appropriate dealing with threats and attacks, are the main requirements of
today’s most communication systems and networks. Thus, since P2P networks can be individually used as
an infrastructure and an alternative for many other communication networks, they have to be more
reliable, accessible, and resilient to the faults, failures and attacks compared to the client/server approach.
In this work on progress, we present a detailed study on the behavior of various P2P networks toward
faults and failures, and focus on fault-tolerance subject. We consider two different static failure scenarios:
a) a random strategy in which nodes or edges of the network will be removed with an equal probability and
without any knowledge of the network’s infrastructure, b) a targeted strategy that uses some information
about the nodes, and in which the nodes with the highest degree have the most priority to be attacked. By
static faults, we mean a situation where the nodes or components encounter some faults before the network
starts to work or through its operation, and will remain faulty to the end of the work session. Our goal is to
introduce various measures to analyzing P2P networks evaluating their vulnerability rate. The presented
criteria can be used for evaluating the reliability and vulnerability of P2P networks toward both random
and targeted failures. There is no limit to the number and types of failures, the presented measures are able
to be used for different types of failures and even a wide range of networks.
The document proposes a new broadcasting algorithm called Y-Hamiltonian Layers Broadcast (Y-HLB) for wormhole-routed 3D mesh networks. It divides the 3D mesh into layers that are modeled as Hamiltonian paths. The Y-HLB algorithm routes messages along these Hamiltonian paths in an efficient manner to broadcast to all nodes. Previous related work on broadcasting algorithms for wormhole-routed 3D meshes are also discussed, including how they divide the network and route messages. Simulation results show Y-HLB performs better than these previous algorithms in terms of reducing broadcast latency.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
This document discusses improving the performance of intrusion detection systems (IDS) in mobile ad hoc networks (MANETs). It proposes using an inverted table approach to track communication information and identify attacker nodes through data mining. The key approaches are:
1. Maintaining an inverted table to record network communication information for analysis.
2. Using data mining techniques like anomaly detection to identify attacker nodes based on patterns in the table.
3. Discovering preventative paths that avoid identified attacker nodes to improve network throughput and reduce data loss.
The approaches aim to improve IDS performance challenged by attacks that slow detection in MANETs. The work will be implemented in NS2 and evaluate performance based on throughput and
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
This document proposes a protocol for trilateral authentication in ad-hoc networks using multicast conventions. It introduces a central authority that manages key authentication and certification to increase security and reliability. Nodes are grouped into clusters, each with a cluster head. For similar clusters, authentication uses time asymmetry based on TESLA. For cross-cluster traffic, it uses secret information asymmetry where the source sends packets to cluster heads, which relay to members. Evaluation shows the central authority uses less memory than previous methods and the protocol has higher efficiency.
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
This document proposes algorithms for distributing malware signatures across mobile devices to optimize detection and recovery from infections. It describes a greedy algorithm that selects signatures to maximize a "system welfare" metric accounting for individual device utilities. It also describes an encounter-based distributed algorithm where devices exchange signatures opportunistically. Simulation results show the distributed algorithm approaches the performance of the greedy algorithm over time under different mobility models. The goal is to minimize the number of infected devices by optimally distributing signatures across a network of helpers considering device and malware heterogeneity.
This document compares the performance of eco-friendly refrigerants R-507, R-407c, and R404a for retrofitting an R-12 vapor compression refrigeration system. It provides thermodynamic property correlations for these refrigerants and analyzes the coefficient of performance (COP) and compressor volumetric efficiency of a 1-ton refrigeration unit using each refrigerant. The results show the COP and efficiency are nearly the same for R-134a, R-507, R404a and R-407c as for R-12, indicating these refrigerants' suitability for retrofitting existing R-12 systems. In conclusion, retrofitting with these refrigerants is a viable option to phase
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...IOSR Journals
This paper illustrates the main normal and Boron superconducting state temperature properties of magnesium diboride, a substance known since early 1950's, but lately graded to be superconductive at a remarkably high critical temperature Tc=40K for a binary synthesis. What makes MgB2 so special? Its high Tc, simple crystal construction, large coherence lengths, high serious current densities and fields, lucidity of surface boundaries to current promises that MgB2 will be a good material for both large scale applications and electronic devices. Throughout the last seven month, MgB2 has been fabricated in various shape, bulk, single crystals, thin films, ribbons and wires. The largest critical current densities >10MA/cm2 and critical fields 40T are achieved for thin films. The anisotropy attribution inferred from upper critical field measurements is still to be resolved, a wide range of values being reported, γ = 1.2 ÷ 9. Also there is no consensus about the existence of a single anisotropic or double energy cavity. One central issue is whether or not MgB2 represents a new class of superconductors, being the tip of an iceberg that waits to be discovered. Until now MgB2 holds the record of the highest Tc among simple binary synthesis. However, the discovery of superconductivity in MgB2 revived the interest in non-oxides and initiated a search for superconductivity in related materials, several synthesis being already announced to become superconductive: TaB2, BeB2.75, C-S composites, and the elemental B under pressure.
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...IOSR Journals
This study aims to evaluate the effects of the eccentric physical training’s time on daily plasma concentrations of testosterone among sedentary athletes. Sixty male athletes, with homogeneous age, size and weight were selected for the study during three months. They were subjects to a strength training of the extensor and flexor muscles of the knee. After they were divided in two groups of thirty subjects and then had physical training either in the morning between 6 and 7, or in the evening, between 16 and 17. The dosage of testosterone on each athlete was performed before and after submission to an eccentric physical program at the antecubital vein in a restful sitting. Our results have shown that eccentric physical training induces the increase of this steroid hormone in the two groups of athletes and the training in the evening promotes better its production. Our results also showed that the rate of this androgen drop significantly during the day in both groups of athletes trained in the morning or in the evening as well as their respective controls. However, the decline was even more pronounced for subjects trained in the morning
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaIOSR Journals
The study involved 400 subjects, 200 each of the two ethnic groups(100 males and 100 females). The age range was 18-35years. Subjects with facial deformities or surgeries that involved the nasal region were excluded from the study. Subjects that have both parents and grandparents of each ethnic group and who have lived in that environment for at least the first 18years of their lifetime were selected for the study. The nasal length and width were measured using spreading calipers and nasal indices deducted from these measurements. Test for significance was done using the students’ t-test. Results showed the nasal indices of the Ibibio males and females to be 86.58±1.20 and 81.75±1.14 respectively and for the Yakurr males and females, it was 77.76±0.82 and 102.27±1.13 respectively. There was significant ethnic and gender differences in all the nasal parameters (nasal length, nasal width and nasal indices) at p<0.05. From the nasal indices the nose type of the Ibibio males is platyrrhine while that of the Ibibio females is mesorrhine, the Yakurr males also have mesorrhine nose type while the Yakurr females have platyrrhine nose type. With this result, nasal parameters could be a useful tool in gender and ethnic differentiation between the Ibibio and Yakurr ethnic groups.
The document summarizes the design of an auto pilot controlled flying wing unmanned aerial vehicle (UAV) intended for use by quick reaction armed forces. Key points:
1) The UAV is designed for surveillance of disaster areas and aerial photography while also being useful for armed forces operations in enemy territory due to its low heat signature and high maneuverability.
2) It has no need for runways and can be launched by hand from moving vehicles. Its durable design prevents breaking during minor crashes.
3) Automation is enabled through an ArduPilot hardware system and Mission Planner software interface on a laptop, allowing for waypoint navigation, data logging, and simulator training.
4) A
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks un...ijp2p
Peer-to-peer systems are the networks consisting of a group of nodes possible to be as wide as the Internet.
These networks are required of evaluation mechanisms and distributed control and configurations, so each
peer (node) will be able to communicate with other peers. P2P networks actually act as the specific
transportation systems created to provide some services such as searching, large-scale storage, context
sharing, and supervisioning. Changes in configuration, possibly the resultant effects of faults and failures
or of the natural nodes behavior, are one of the most important features in P2P networks. Resilience to
faults and failures, and also an appropriate dealing with threats and attacks, are the main requirements of
today’s most communication systems and networks. Thus, since P2P networks can be individually used as
an infrastructure and an alternative for many other communication networks, they have to be more
reliable, accessible, and resilient to the faults, failures and attacks compared to the client/server approach.
In this work on progress, we present a detailed study on the behavior of various P2P networks toward
faults and failures, and focus on fault-tolerance subject. We consider two different static failure scenarios:
a) a random strategy in which nodes or edges of the network will be removed with an equal probability and
without any knowledge of the network’s infrastructure, b) a targeted strategy that uses some information
about the nodes, and in which the nodes with the highest degree have the most priority to be attacked. By
static faults, we mean a situation where the nodes or components encounter some faults before the network
starts to work or through its operation, and will remain faulty to the end of the work session. Our goal is to
introduce various measures to analyzing P2P networks evaluating their vulnerability rate. The presented
criteria can be used for evaluating the reliability and vulnerability of P2P networks toward both random
and targeted failures. There is no limit to the number and types of failures, the presented measures are able
to be used for different types of failures and even a wide range of networks.
The document proposes a new broadcasting algorithm called Y-Hamiltonian Layers Broadcast (Y-HLB) for wormhole-routed 3D mesh networks. It divides the 3D mesh into layers that are modeled as Hamiltonian paths. The Y-HLB algorithm routes messages along these Hamiltonian paths in an efficient manner to broadcast to all nodes. Previous related work on broadcasting algorithms for wormhole-routed 3D meshes are also discussed, including how they divide the network and route messages. Simulation results show Y-HLB performs better than these previous algorithms in terms of reducing broadcast latency.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
This document discusses improving the performance of intrusion detection systems (IDS) in mobile ad hoc networks (MANETs). It proposes using an inverted table approach to track communication information and identify attacker nodes through data mining. The key approaches are:
1. Maintaining an inverted table to record network communication information for analysis.
2. Using data mining techniques like anomaly detection to identify attacker nodes based on patterns in the table.
3. Discovering preventative paths that avoid identified attacker nodes to improve network throughput and reduce data loss.
The approaches aim to improve IDS performance challenged by attacks that slow detection in MANETs. The work will be implemented in NS2 and evaluate performance based on throughput and
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
This document proposes a protocol for trilateral authentication in ad-hoc networks using multicast conventions. It introduces a central authority that manages key authentication and certification to increase security and reliability. Nodes are grouped into clusters, each with a cluster head. For similar clusters, authentication uses time asymmetry based on TESLA. For cross-cluster traffic, it uses secret information asymmetry where the source sends packets to cluster heads, which relay to members. Evaluation shows the central authority uses less memory than previous methods and the protocol has higher efficiency.
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
This document proposes algorithms for distributing malware signatures across mobile devices to optimize detection and recovery from infections. It describes a greedy algorithm that selects signatures to maximize a "system welfare" metric accounting for individual device utilities. It also describes an encounter-based distributed algorithm where devices exchange signatures opportunistically. Simulation results show the distributed algorithm approaches the performance of the greedy algorithm over time under different mobility models. The goal is to minimize the number of infected devices by optimally distributing signatures across a network of helpers considering device and malware heterogeneity.
This document compares the performance of eco-friendly refrigerants R-507, R-407c, and R404a for retrofitting an R-12 vapor compression refrigeration system. It provides thermodynamic property correlations for these refrigerants and analyzes the coefficient of performance (COP) and compressor volumetric efficiency of a 1-ton refrigeration unit using each refrigerant. The results show the COP and efficiency are nearly the same for R-134a, R-507, R404a and R-407c as for R-12, indicating these refrigerants' suitability for retrofitting existing R-12 systems. In conclusion, retrofitting with these refrigerants is a viable option to phase
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...IOSR Journals
This paper illustrates the main normal and Boron superconducting state temperature properties of magnesium diboride, a substance known since early 1950's, but lately graded to be superconductive at a remarkably high critical temperature Tc=40K for a binary synthesis. What makes MgB2 so special? Its high Tc, simple crystal construction, large coherence lengths, high serious current densities and fields, lucidity of surface boundaries to current promises that MgB2 will be a good material for both large scale applications and electronic devices. Throughout the last seven month, MgB2 has been fabricated in various shape, bulk, single crystals, thin films, ribbons and wires. The largest critical current densities >10MA/cm2 and critical fields 40T are achieved for thin films. The anisotropy attribution inferred from upper critical field measurements is still to be resolved, a wide range of values being reported, γ = 1.2 ÷ 9. Also there is no consensus about the existence of a single anisotropic or double energy cavity. One central issue is whether or not MgB2 represents a new class of superconductors, being the tip of an iceberg that waits to be discovered. Until now MgB2 holds the record of the highest Tc among simple binary synthesis. However, the discovery of superconductivity in MgB2 revived the interest in non-oxides and initiated a search for superconductivity in related materials, several synthesis being already announced to become superconductive: TaB2, BeB2.75, C-S composites, and the elemental B under pressure.
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...IOSR Journals
This study aims to evaluate the effects of the eccentric physical training’s time on daily plasma concentrations of testosterone among sedentary athletes. Sixty male athletes, with homogeneous age, size and weight were selected for the study during three months. They were subjects to a strength training of the extensor and flexor muscles of the knee. After they were divided in two groups of thirty subjects and then had physical training either in the morning between 6 and 7, or in the evening, between 16 and 17. The dosage of testosterone on each athlete was performed before and after submission to an eccentric physical program at the antecubital vein in a restful sitting. Our results have shown that eccentric physical training induces the increase of this steroid hormone in the two groups of athletes and the training in the evening promotes better its production. Our results also showed that the rate of this androgen drop significantly during the day in both groups of athletes trained in the morning or in the evening as well as their respective controls. However, the decline was even more pronounced for subjects trained in the morning
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaIOSR Journals
The study involved 400 subjects, 200 each of the two ethnic groups(100 males and 100 females). The age range was 18-35years. Subjects with facial deformities or surgeries that involved the nasal region were excluded from the study. Subjects that have both parents and grandparents of each ethnic group and who have lived in that environment for at least the first 18years of their lifetime were selected for the study. The nasal length and width were measured using spreading calipers and nasal indices deducted from these measurements. Test for significance was done using the students’ t-test. Results showed the nasal indices of the Ibibio males and females to be 86.58±1.20 and 81.75±1.14 respectively and for the Yakurr males and females, it was 77.76±0.82 and 102.27±1.13 respectively. There was significant ethnic and gender differences in all the nasal parameters (nasal length, nasal width and nasal indices) at p<0.05. From the nasal indices the nose type of the Ibibio males is platyrrhine while that of the Ibibio females is mesorrhine, the Yakurr males also have mesorrhine nose type while the Yakurr females have platyrrhine nose type. With this result, nasal parameters could be a useful tool in gender and ethnic differentiation between the Ibibio and Yakurr ethnic groups.
The document summarizes the design of an auto pilot controlled flying wing unmanned aerial vehicle (UAV) intended for use by quick reaction armed forces. Key points:
1) The UAV is designed for surveillance of disaster areas and aerial photography while also being useful for armed forces operations in enemy territory due to its low heat signature and high maneuverability.
2) It has no need for runways and can be launched by hand from moving vehicles. Its durable design prevents breaking during minor crashes.
3) Automation is enabled through an ArduPilot hardware system and Mission Planner software interface on a laptop, allowing for waypoint navigation, data logging, and simulator training.
4) A
This document summarizes various techniques for data collection in densely populated wireless sensor networks that improve energy efficiency. It discusses plain data collection, in-network aggregation, query-based collection, multipath collection, feedback-based collection, and optimal and suboptimal aggregation techniques. The key goal of these techniques is to reduce the number of transmissions needed to collect sensor data in order to prolong the network lifetime by minimizing energy consumption during data transfer.
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...IOSR Journals
The document presents theorems characterizing when the Hardy-Steklov operator is bounded from one two-exponent Lorentz space to another. Specifically, it provides conditions on weights v and w such that the operator is bounded from L(0,∞)qpv to L(0,∞)srw. It defines the Hardy-Steklov operator and two-exponent Lorentz spaces. It states two theorems that characterize the weights using inequalities involving the weights and derivatives of the functions defining the Hardy-Steklov operator. The theorems assume the functions satisfy certain conditions like being strictly increasing and having derivatives satisfying an inequality.
Securing Group Communication in Partially Distributed SystemsIOSR Journals
This document summarizes an approach for securing group communication in partially distributed systems. The approach divides groups into regions, each with their own Key Distribution Center (KDC). Intra-region communication uses public-key cryptography, while inter-region communication uses a hierarchical key exchange approach involving symmetric keys. Key graphs are used to represent the partial distribution structure, and rekeying strategies are employed when users join or leave groups to dynamically update keys and prevent unauthorized access. The approach aims to provide security properties like authenticity, confidentiality and integrity, while maintaining scalability for distributed systems with changing group membership.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
This document describes the fabrication of a thermoelectric solar fridge. It contains the following key points:
1. A thermoelectric module uses the Seebeck and Peltier effects to generate electrical power from a temperature gradient or convert electrical energy into a temperature gradient for cooling. A solar panel charges a battery through photovoltaic effect, and the battery powers the thermoelectric module.
2. The thermoelectric module is composed of P-type and N-type semiconductors, usually bismuth telluride, between ceramic substrates. When current passes through, it absorbs heat on one side and releases heat on the other, allowing one side to be used for cooling.
This document outlines an approach to developing a soft tool for conducting a life cycle assessment of residential buildings to estimate their environmental impacts, such as carbon emissions. The tool calculates embodied carbon emissions from building materials used in construction and from electricity consumption over the building's 50-year lifespan. Testing on a residential building in Pune, India found total embodied carbon from materials was 748579 kg and from electricity was 4266150 kg over 50 years. The results indicate opportunities to reduce impacts by using sustainable materials and non-conventional energy sources.
The document studies the fatigue crack growth behavior of an aluminum alloy specimen with a notch. Finite element analysis is used to simulate a fatigue crack growth test on an arc-shaped aluminum specimen with a notch. The simulation results agree well with experimental fatigue crack growth test results. Both show that the crack propagation depends on the stress intensity range, with the crack growing faster at higher stress intensity values approaching the material's critical stress intensity value.
This document analyzes the classification of soil types described in the Bangladesh National Building Code (BNBC) 2006 by performing response spectrum analysis of the Los Angeles 9-story SAC steel building model under different BNBC response spectra. The study develops three response spectra for Dhaka zone 2 soils - RS1 for soil type 1, RS2 for soil type 2, and RS3 for soil type 3. Response spectrum analysis finds that structural outputs for RS3 are 1.57-2.07 times greater than RS2 and RS1 respectively. Outputs for RS2 are 1.31 times greater than RS1, indicating more severe seismic loading with increasing soil type number.
This document describes a proposed method for printing flexible, ion-sensitive ECG electrodes. It begins with background on ECG signals and the limitations of existing gel-based electrodes. It then discusses the skin electrical model and sources of noise in electron conduction-based ECG recording. The document proposes printing carbon nanotube thin-film transistors on flexible substrates to sense ion currents, along with ion-sensitive membranes and reference electrodes. It provides details on printing and fabricating each component and suggests evaluating contact resistance to optimize device performance for ECG signal detection. The goal is a fully printable electrode capable of continuous, online ECG monitoring.
This document summarizes a study on the performance and emissions of a twin cylinder compression ignition engine using cottonseed oil blended with methanol as the fuel. The study found that using a 70% cottonseed oil and 30% methanol blend as fuel resulted in lower specific fuel consumption and higher brake thermal efficiency compared to diesel fuel. Emissions of carbon monoxide and unburned hydrocarbons were also lower for the cottonseed oil-methanol blend compared to diesel, especially at full engine load. Smoke emissions from the engine decreased when using the cottonseed oil-methanol blend compared to diesel as well. The study concluded that cottonseed oil-methanol blends are a suitable alternative fuel for compression ignition engines that can reduce emissions compared
This document describes how to create a cellular digitized map on Google Earth. It begins by explaining the importance of accurate coverage estimation for network planning. It then discusses propagation models, focusing on the Hata-Okumura model. Cell radius and path loss calculations are shown for different frequencies. Using these calculations, single cell coverage is drawn on Google Earth. Finally, a 7-cell cluster is formed, demonstrating how a full digitized map can be created on Google Earth at low cost.
The document proposes a rapid and reliable receiver-based approach for delivering warning messages in vehicular ad-hoc networks. It selects the best receiver node based on both location and energy to ensure timely propagation of warnings without delay. The approach ranks potential receiver nodes based on their distance to an ideal forwarding location and remaining energy. It also uses epidemic routing to further improve performance, where messages are replicated across mobile nodes to increase the probability of reaching destinations. Simulation results showed the proposed method achieved high reliability, enhanced timeliness, and higher delivery ratios with lower overhead compared to existing solutions.
This document proposes a quick development model for change-oriented software processes. It discusses how changes are now common in software projects and increase maintenance costs. A quick or agile methodology is presented to simplify handling changes. The key benefit is accommodating changes without extensive refactoring. Common agile methods like XP, Scrum, Crystal and FDD are described. A proposed model categorizes change requests, prioritizes them, and integrates them into agile iterations using techniques like test-driven development. An incremental approach is suggested to implement changes in phases using repeated agile iterations.
Effect of bio-finishes on designer’s naturally coloured cotton khadi stripe f...IOSR Journals
Abstract: The present study involves the eco-friendly naturally coloured cotton DDCC-1 and white cotton
yarns which were used to produce pin and medium stripe khadi fabrics and given special bio-finishes viz.,
enzymatic de-sizing, bio-polishing and silicon softener finish and further tested to know their impact on different
structural, performance and durable properties. Multiple linear regressions were used to analyse their influence
on one another. It was found that on special finishing, both WC and DDCC-1 yarns became finer and slight
increase in cloth count; considerable reduction in bending length; improvement in crease recovery angle and
drapability of both the stripe fabrics was observed. Whereas, tensile strength and elongation were reduced; and
no considerable change was observed in abrasion and pilling. Keywords: DDCC-1, Designer’s fabrics, enzyme finish, medium stripe, naturally coloured cotton, physical
properties, pin stripe, softener wash, and special finish
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
For enhancing VANET security, an autonomic trust and reputation monitoring scheme is proposed which uses a trust based data transfer protocol based on reputation and plausibility checks. The proposed framework uses autonomic principles and trust monitoring scheme to provide uniform trust information throughout the network with minimum overhead. It aims to reduce the impact of double-face attacks by isolating selfish and malicious nodes. The scheme generates local and global trust tables to evaluate node trustworthiness and identify malicious nodes for isolation from the network.
The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
This document discusses trust-based routing in mobile ad hoc networks (MANETs). It provides an overview of several trust management approaches that have been proposed for MANET routing:
1. A direct and indirect trust formation approach that calculates trust values based on a node's own observations and recommendations from peer nodes. This allows resources to be shared only among trusted nodes.
2. A hybrid trust management framework (HTMF) that more robustly evaluates trust based on direct observations and second-hand information. This makes it resistant to certain attacks.
3. An adaptive multi-level trust (AMLeT) framework that calculates two complementary trust levels - hard and soft trust - depending on security needs. It introduces
This document discusses trust-based routing in mobile ad hoc networks (MANETs). It provides an overview of several trust management approaches that have been proposed to improve routing reliability in MANETs. Specifically, it summarizes three approaches:
1. A framework that calculates trust values using direct observation and indirect recommendations to determine access control between nodes. Trust is mapped to access levels.
2. A hybrid trust management framework (HTMF) that evaluates trustworthiness based on direct observations and second-hand information to improve robustness against attacks.
3. An adaptive multi-level trust (AMLeT) framework that calculates two complementary trust levels - hard and soft trust - based on criteria like time and security
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
1) The document discusses detection and prevention of denial of service (DoS) attacks in mobile ad-hoc networks.
2) It focuses on identifying malicious nodes that conduct traffic jamming attacks by disrupting communication.
3) The proposed approach detects malicious nodes using a reliability value determined by broadcast reliability packets, where nodes that don't respond in a set time have their reliability value decreased until it reaches below zero, identifying them as malicious.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
This document discusses techniques for eliminating malicious nodes in mobile ad hoc networks (MANETs) through clustering. Specifically, it proposes finding a single trusted cluster head node based on both transmission range and highest energy, rather than just highest energy, in order to avoid selecting malicious nodes as cluster heads. The proposed approach is tested through simulation in NS2, showing improved network performance compared to existing techniques. Distributed denial of service (DDoS) attacks pose a challenge in MANETs due to their open nature, and trust-based routing protocols have been developed to help mitigate such attacks by identifying malicious or untrusted nodes.
This document summarizes a research paper that proposes a new trust management scheme to enhance security in mobile ad hoc networks (MANETs). The scheme uses uncertain reasoning to evaluate trust values based on direct observation from a node and indirect observation from neighboring nodes. Trust is evaluated using Bayesian inference for direct observation and Dempster-Shafer theory for indirect observation. Simulation results show the scheme improves throughput, packet delivery ratio, and security with a slight increase in delay and overhead compared to the standard Ad Hoc On-Demand Distance Vector (AODV) routing protocol.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSpijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
This document summarizes a survey on attacks against mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their unique characteristics and vulnerabilities. It then categorizes the different types of attacks that can occur in MANETs based on their nature (active vs passive), location (external vs internal), and which layer of the protocol stack they target (physical, data link, network, transport, etc.). Specific attacks are defined at each level. The document aims to provide an overview of the security issues in MANETs and different classifications of attacks.
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and
disadvantages. Providing safe communication between mobile nodes, recognization the position of
nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in
ad-hoc network, so providing trust schemes is an important in this network. MANET provides some
basic functions like routing, communication, network management and packet forwarding etc over
self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and
leaves the network within a random period of time. It effects energy, bandwidth and memory
computations of network. Providing trust in MANET is such a crucial task because it doesn’t having
centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.
This document summarizes three trust-based security models for mobile ad hoc networks (MANETs):
1) The Secure MANET Routing Trust Intrigue (SMRTI) model calculates direct and recommended trust values to evaluate nodes, packets, and routes. It uses these evaluations to make security decisions.
2) The Maturity-Based model incorporates relationship maturity, where trust in long-term neighbors is given more weight. It uses a Recommendation Exchange Protocol for nodes to share recommendations.
3) The Trust Based Information Sharing (TRUISM) model defines properties like direct trusted neighbors and context-dependent trust. It calculates recommendation trust from opinions shared between neighbors.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsScyllaDB
ScyllaDB monitoring provides a lot of useful information. But sometimes it’s not easy to find the root of the problem if something is wrong or even estimate the remaining capacity by the load on the cluster. This talk shares our team's practical tips on: 1) How to find the root of the problem by metrics if ScyllaDB is slow 2) How to interpret the load and plan capacity for the future 3) Compaction strategies and how to choose the right one 4) Important metrics which aren’t available in the default monitoring setup.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Ukraine
Під час доповіді відповімо на питання, навіщо потрібно підвищувати продуктивність аплікації і які є найефективніші способи для цього. А також поговоримо про те, що таке кеш, які його види бувають та, основне — як знайти performance bottleneck?
Відео та деталі заходу: https://bit.ly/45tILxj
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 01-05
www.iosrjournals.org
DOI: 10.9790/0661-17320105 www.iosrjournals.org 1 | Page
Routing and Security Issues for Trust Based Framework in
Mobile Ad Hoc Networks
Mukesh Kumar Garg1
, Neeta Singh2
1
(Department of Computer Engineering, YMCA University of Science & Technology, Faridabad, Haryana,
India)
2
(Department of Computer Science and Engineering, School of I.C.T., Gautam Buddha University, Greater
Noida, Uttar Pradesh, India)
Abstract: Mobile means moving and Ad Hoc means temporary without any fixed infrastructure, so mobile ad
hoc networks (MANETs) are a kind of temporary networks in which nodes are moving without any fixed
infrastructure or centralized administration. It is the new emerging technology which enables user to
communicate without any physical infrastructure regardless of their geographical location, that’s why it is also
referred to as an “infrastructure less” network. Unfortunately, ad hoc networks are particularly vulnerable due
mainly to their lack of infrastructure. Other reasons could be: high mobility, wireless links, limited bandwidths,
lack of boundaries, short lifetime batteries and weak capacity of equipments. The execution and survival of ad
hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common
assumption in the routing protocols that all nodes are trustworthy and cooperative. However, this naïve
dependency on intermediate nodes makes the ad hoc networks vulnerable to passive and active attacks by
malicious nodes. Trust based routing and Security in MANETs are the most important concern for the basic
functionality of Network. The availability of network services, confidentiality and integrity of data can be
achieved by assuring that routing & security issues have been met. In this paper an attempt has been made to
review various routing and security issues for trust based framework in MANETs.
Keywords: MANETs, Routing Issues, Trust, Security Issues.
I. Introduction
MANETs have received significant research attention since the development of packet radio networks in
the 1970s. MANETs [1-4] are wireless networks that continually re-organize themselves in response to their
environment without the benefit of a pre-existing infrastructure. It is an autonomous system in which mobile
hosts connected by wireless links are free to move randomly and often act as routers at the same time. A
fundamental characteristic of MANETs is that they are able to configure themselves on-the-fly without the
involvement of a centralized administrator. Although all wireless networks as shown in Fig. 1 work without any
physical connection but with a fixed infrastructure. The increasing use of wireless portable devices such as
mobile phones and laptops as part of everyday life, is leading to the possibility for unstructured or ad hoc wireless
communication. With these types of devices, there is a fundamental ability to share information. There is no need
of access points, each node act as a router and node at the same time. These mobile nodes (router) can leave and
join the network according to their own wish. Every node finds the route-by-route request.
Fig. 1 An example of various Wireless Networks
2. Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
DOI: 10.9790/0661-17320105 www.iosrjournals.org 2 | Page
Routing is a mechanism, which is used to find the path between the source to the destination among
randomly distributed nodes. Routing protocol plays an important role to send the data from source to destination
that discovers the optimal path between the two communication nodes [5]. Every protocol has its own rules to
finds the route or maintenance the route. There are various routing protocol proposed by researchers. These are
broadly divided into three categories (based on the Routing Information Update Mechanism) [1], [3]: Proactive
(table-driven), Reactive (source-initiated on-demand-driven) and Hybrid. The proactive protocols maintain
routing information about each node in the network. The information is updated throughout the network
periodically or when topology changes. Each node requires to store their routing information. For example:
Bellman-Ford Routing Protocol, Destination Sequenced Distance Vector Routing (DSDV), Source Tree
Adaptive Routing (STAR). The reactive routing protocols look for the routes and are created as and when
required. When a source wants to send to a destination, it invokes the route discovery mechanisms to find the
path to the destination. For example: Ad-Hoc On-demand Distance Vector (AODV), Dynamic Source Routing
(DSR), Dynamic MANET On-demand (DYMO). The hybrid routing protocols are using the best features of
both the on-demand and table driven routing protocols. For example: Temporally Ordered Routing Algorithm
(TORA), Zone Routing Protocol (ZRP).
Since nodes in MANETs can move arbitrarily the topology may change frequently at unpredictable
times. Transmission and reception parameters may also impact the topology. So it is very difficult to find and
maintain an optimal route taking trust as a parameter. The routing algorithm must react quickly to topological
changes as per the degree of trust of a node or a complete path between a source and a destination pair. Nodes in
MANETs communicate over wireless links. Therefore efficient calculation of trust is a major issue in MANETs
because an ad hoc network depends on cooperative and trusting nature of its nodes. Although the security
requirements are different from one application to another, they are not negligible in most cases. To enhance
security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without central
authorities. A considerable amount of work has been done on trust based routing. Yet there are some issues
which are not addressed clearly in the existing papers. These issues are like concept of malicious node/selfish
node, calculation of trust, concept of central trust authority, proactive nature of calculation and lack of security
model for cryptographic analysis of trust based routing. If these issues may be taken care of then an efficient and
robust trust based protocol can be developed. Trust based routing and Security in MANETs are the most
important concern for the basic functionality of Network. The availability of network services, confidentiality
and integrity of data can be achieved by assuring that routing & security issues have been met. The highly
dynamic nature of MANETs coupled with limited bandwidth and battery power imposes severe restrictions on
routing protocols especially on achieving the routing stability. Due to all these constraints, designing of a
routing protocol is still a challenging task for researchers. As the nodes are dynamic the number of nodes in
route selection is always changing thus the degree of also keep changing. There are some issues in MANETs
regarding trust based routing which are not being mentioned clearly in the existing trust based routing proposals
[5-11], [22-26].
In this paper an attempt has been made to review various routing and security issues for trust based
framework in MANETs. Some of these issues are pointed out in this paper in Section 2. The rest of the paper is
organized as follows: Section 3 presents security, security goals, security attacks on ad hoc networks and secure
routing for MANETs. Section 4 describes the concept of trust, trust establishment and some issues related to
trust based routing in MANETs. Finally, Section 5 gives the conclusion which includes the highlights of trust
based system and future work.
II. Problem Formulation and Major Issues
The key issue with ad-hoc networking is how to send a message from one node to another with no
direct link. The nodes in the network are moving around randomly, and it is very difficult that which nodes are
directly linked together and the intermediate node judges its ability to forward the RREQ packets or drop it [12].
The number of packets transferred successfully by each node. Route from source to destination is determined by
selecting the most trusted path [13]. Here battery capacity is not considered as an issue for selecting the path
between source and destination. Same time topology of the network is constantly changing and it is very
difficult for routing process. We efforts to simulate and analyze of these two parameters to discover a reliable
route between the source and destination and reduce power consumption. Trust is extracted from social
relationship. It is always established between two parties for a specific action. In particular, one party trusts the
other party to perform an action. Trust may be referred as belief or reputation of one entity to other to perform
an action [14]. Trust in entities is based on the fact that the trusted entity will not act maliciously in a particular
situation. As no one can ever be absolutely sure of this fact, trust is solely dependent on the belief of the trustor.
Trust may be calculated directly or indirectly depending upon the nature of the protocol. While in most of the
proposals it is calculated indirectly with the use certification method. In this case no direct trust can be
established between two nodes rather nodes become dependent of the previous calculations of other
3. Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
DOI: 10.9790/0661-17320105 www.iosrjournals.org 3 | Page
neighbouring nodes. Different metrics can be used for trust like belief, reputation, linguistic descriptions in [15],
discrete integers in [16], continuous value in [0,1] in [17], a 2-tuple in [0,1]2 in [18], and a triplet in [0,1]3 in
[19].
III. Security in Ad Hoc Network
The research on wireless ad hoc network indicates that security is a major issue providing protected
communication between mobile nodes in a hostile environment. Owing to the challenges posed by inherent
characteristics of MANETs, the existing security mechanisms of wired networks cannot be applied to MANETs.
The challenges being include wireless medium, highly dynamic topology, distributed cooperation, resource-
constrained capability, and limited physical security. In fact, these challenges necessitate the building multifence
security solutions that achieve both broad protection and desirable network performance.
3.1 Security Goals
Every routing protocol needs secure transmission of data. Security service requirements of MANETs
are similar to wired or any infrastructure wireless network. Following are major security goals which are needed
for protecting the data and resources from attacks:
i) Authentication ensures that the communication or transmission of data is done only by the authorized nodes.
Without authentication any malicious node can pretend to be a trusted node in the network and can adversely
affect the data transfer between the nodes.
ii) Availability ensures the survivability of the services even in the presence of the attacks. Availability is
concerned with the fact that the network services should be available whenever they are needed. Systems
ensuring the availability in MANET’s should be able to take care of various attacks such as denial of services,
energy starvation attacks, and node misbehavior.
iii) Confidentiality ensures that information should be accessible only to the intended party. No other node
except sender and receiver node can read the information. This can be possible through data encryption
techniques.
iv) Integrity ensures that the transmitted data is not being modified by any other malicious node. Modification
includes writing, changing status, deleting and creating. Integrity assures that a message being transferred is
never corrupted.
v) Non-Repudiation ensures that neither a sender nor a receiver can deny a transmitted message. Non-
repudiation helps in detection and isolation of compromised node.
vi) Anonymity means all information that can be used to identify owner or current user of node should default
be kept private and not be distributed by node itself or the system software.
vii) Authorization assigns different access rights to different types of users. For example a network management
can be performed by network administrator only.
3.2 Security Attacks on MANETs
In Infrastructure less networks there is much more need for the security as each node is free to move in
any direction and there is no centralized security provision in such networks which implies the identification of
potential attacks, threats and vulnerability of a certain system. The security attacks on MANET’s are broadly
divided into two major categories:
i) Active Attacks: Those attacks which try to interrupt the proper functionality of the network. This can be done
either through reading and changing the information on the data packets, denial of Services, altering the routing
path by changing routing information, hop count etc. These attacks are easier to be detected as compare to their
counterpart i.e. Passive attacks. For e.g.:
○ MAC layer attacks: Jamming
○ Network layer attacks: Black hole, Gray hole, Worm hole etc.
○ Transport layer attacks: Session hijacking
○ Application layer attacks: Repudiation
ii) Passive Attacks: Those attacks which do not alter the normal functionality of network but silently try to
listen or retrieve the vital information inside the data packets. These kinds of attacks are hard to detect. For e.g.:
○ Snooping, Selfishness
3.3 Secure Routing for MANETs
Security protocols for MANETs can be mainly categorized in two major categories:
i) Prevention: This mechanism involves protocols which prohibit the attacking node to initiate any action. This
approach requires encryption technique to authenticate the confidentiality, integrity, non-repudiation of routing
packet information.
4. Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
DOI: 10.9790/0661-17320105 www.iosrjournals.org 4 | Page
ii) Detection and Reaction: Detection and Reaction mechanism as the name suggest will identify any malicious
node or activity in the network and take proper action to maintain the proper routing in the network.
IV. Trust in Ad Hoc Networks
The execution and survival of an ad hoc network is solely dependent upon the cooperative and trusting
nature of its nodes. Trust and security are two tightly interdependent concepts that cannot be desegregated. For
example, cryptography is mean to implement security but it is highly dependent on trusted key exchange.
Similarly, trusted key exchange cannot take place without requisite security services in place. It is because of
this inter-reliance that both these terms are used interchangeably when defining a secure system. The term trust
can be defined as:
Trust is the degree of belief about the future behaviour of other entities, which is based on the ones the
past experience with and observation of the other’s actions. In other words it can define as the trust is always
established between the two parties for a specific action. In particular, one party trusts the other party to perform
the action.
Trust is also time dependent, it grows and decays over a period of time. A pure ad-hoc network closely
resembles this human behaviour, where a number of people/nodes that have never met each other, are able to
communicate with each other based on mutual trust levels developed over a period of time.
Trust establishment in wired networks is usually achieved using indirect trust mechanisms, including
trusted certification agencies and authentication servers. However, establishing this indirect trust still requires
some out-of-band mechanism for initial authentication and is usually dealt with physical or location-based
authentication schemes.
Trust establishment in ad-hoc wireless networks is still an open and challenging field.
4.1 Trust Establishment in Ad Hoc Networks
Trust has been established in ad-hoc networks using a number of assumptions including:
● Pre-configuration of nodes with secret keys.
● Presence of an omnipresent central trust authority.
● Mutual trust levels developed over a period of time.
4.2 Trust Issues and Requirements
There are some issues in mobile ad hoc networks regarding trust based routing which are not being
mentioned clearly in the existing trust based routing proposals [5-11]. Some of these issues are pointed out in
this section as follows:
i) Malicious/Selfish Node: Definition of a malicious/selfish node is come into existence in [20] Whenever a
node receives a request to relay traffic, it normally perform an action on the request while practically,
intermediate node may not wish to consume their energy to carry some other node’s traffic. This is known as
selfish behaviour of a node and that node is referred as a selfish node. In the similar fashion if a large number of
nodes behave selfishly and refuse to act as an intermediate node between a pair of source and destination,
network efficiency will be reduced upto a great extent. Although a definition of malicious node is given here but
yet none of the existing definition of malicious node in the existing proposals defines the reason or ground rules
for marking a node as malicious or selfish node. In other words none of the previous work identifies that why a
node is not interested in forwarding the relay traffic between a source-destination pair. So there is a need to
introduce some ground rules or a set of all possible reasons due to which a node may be considered as malicious
or selfish node.
ii) Definition and Calculation of Trust: In case of trust again there are confusions in the definition of trust
because in wired networks whether a node is reliable or not is identified by certification mechanism which is an
indirect method of trust calculation. On this basis reliability and non-maliciousness can be clubbed together.
While marking a node as malicious or no reliable in MANETs is not easy due to dynamic changing topology. It
is very difficult to incorporate certification mechanism in ad hoc networks, because reliability and maliciousness
has to be taken care as separate issues. In wireless network reliability/security is a global issue while trust is a
local issue of the routing and as in the existing trust based routing proposal authors have given a trust based
model without specifying a security analysis of the proposed model against attacks. Therefore there is need to
develop a trust based model considering security as an important parameter. Calculation of trust for an
individual node or a path is done in several papers [5-11], [21]. But it is not mentioned clearly in any of the
referenced paper that how nodes can calculate and advertise the trust among the network. Although a detailed
method is presented in [21] but again calculation of advertise trust is not clearly mentioned.
iii) Proactive Nature of Trust based Protocols: All the existing work shows that dynamic computation of trust
is proactive in nature and contain a lot of overheads due to access use of control packets which are used for
advertising trust, calculating observed trust and issuing certificates in the trust calculation. This overhead is due
5. Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
DOI: 10.9790/0661-17320105 www.iosrjournals.org 5 | Page
to the indirect calculation of trust of a node or a path. Therefore direct trust mechanism is required instead of
recommendation from trusted third party.
V. Conclusion and Future Work
In this paper some of the challenges of MANETs are discussed in term of routing & security issues.
There are also requirement of changes related to trust based routing has been pointed out. These issues are
supposed to take good care for developing an efficient, secure and robust routing protocol for wireless ad hoc
networks. Taking these issues in to account handling and identification of malicious node can be done easily as
well as a model can be developed for calculating trust and analyzing security of the model.
Acknowledgements
The authors wish to acknowledge Dr. Ela Kumar, Professor and Dean Academic Affairs, Department
of Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Kashmere Gate,
Delhi, India, for her continual support to carry out this work. The authors also wish to acknowledge YMCA
University of Science & Technology, Faridabad, Haryana, India, for its continual support to carry out this work.
References
[1]. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Net-works, Architecture and Protocols,” Pearson Education, Fourth
Impression, 2009.
[2]. M. Abolhasan, T. Wysocki and E. Dutkiewicz, “A review of Routing Protocols for Mobile Ad Hoc Networks”, Ad Hoc Networks,
Vol. 2, Issue 1, PP. 122, Jan. 2004.
[3]. Elizabeth M. Royer and Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE
Personal Communications Magazine, Vol. 6, No. 2, PP. 46-55, April 1999.
[4]. Scott Corson and Joseph Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation
Considerations”, IETF MANET, RFC 2501, 1999.
[5]. Huafeng Wu1, Chaojian Shi1,” A Trust Management Model for P2P File Sharing System”, International Conference on Multimedia
and Ubiquitous Engineering, IEEE Explore 978-0-7695-3134-2/08, 2008.
[6]. Z. Ye., S. V. Krishnamurthy and S. K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks”. In the
Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2003, 270-280.
[7]. X. Li, M. R. Lyu, J. Liu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks”. In the Proceedings of IEEE
Aerospace Conference (IEEEAC), 6-13 March 2004, Vol. 2, 1286-1295.
[8]. M. Virendra, M. Jadliwala, M. Chandrasekaran, S. Upadhyaya, “Quantifying Trust in Ad-Hoc Networks”. In the Proceedings of
IEEE international Conference on Integration of Knowledge Intensive Multi Agent systems (KIMAS) 2005, 65-71.
[9]. Z. Liu, A. W. Joy and R. A. Thompson, “A Dynamic Trust Model for Mobile Ad Hoc Networks”. In the Proceedings of 10th IEEE
international workshop on Future Trends of Distributed Computing Systems (FTDCS), 28 May 2004, 80-85.
[10]. L. Eschenuer, V. D. Gligor, J. Baras, “On Trust Establishment in Mobile Ad-Hoc Networks”. Security Protocols: 10th International
Workshop, 2002, 47-62.
[11]. Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad-hoc Networks”. In the Proceedings of the 27th
Australasian Conference on Computer Science, Vol. 26, PP. 47-54, 2004.
[12]. P. Sinha, R. Sivakumar, and V. Bharghavan, “CEDAR: A Core Extraction Distributed Ad-hoc Routing Algorithm”. IEEE Journal
on Selected Areas in Communications,Vol. 17, No. 8, pp. 1454-1466, 1999.
[13]. M. Tamilarasi, T. G Palani Velu, “Integrated Energy-Aware Mechanism for MANETs using On-demand Routing”, International
Journal of Computer, Information and Systems Science and Engineering 2; www.waset.org Summer 2008.
[14]. D. H. McKnight and N. L. Chervany, “The meanings of Trust,” MISRC Working Paper Series, Technical Report 94-04, Arlson
School of Management, University of Minnesota, 1996.
[15]. M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” In Proceedings of the 1996 IEEE Symposium on
Security and Privacy, PP. 164-173, May 1996.
[16]. A. A. Rahman and S. Hailes, “A Distributed Trust Model”. In the Proceedings of the ACM workshop on New Security Paradigms
1998, 48-60.
[17]. U. Maurer, “Modeling a public-key infrastructure,” In Proceedings 1996 European Symposium on Research in Computer Security
(ESORICS’ 96), Volume 1146 of Lecture Notes in Computer Science, PP. 325-350, 1996.
[18]. G. Theodorakopoulos and J. S. Baras, “Trust Evaluation in Ad-Hoc Networks,” In Proceedings of the ACM Workshop on Wireless
Security (WiSE’04), Oct. 2004.
[19]. A. Jsang, “An Algebra for Assessing Trust in Certification Chains,” In Proceedings of the Network and Distributed Systems
Security (NDSS’99) Symposium,1999.
[20]. Vikram Srinivasan, Pavan Nuggehalli, Ramesh R. Rao, “Energy Efficiency of Ad Hoc Networks with Selfish Users”, San Jose,
California, Mobicom-01. 2002.
[21]. Kamal Deep Mekaetal, “Trust Based Routing Decisions in Mobile Ad Hoc Networks,” In Proceedings of The Second Secure
Knowledge Management Workshop (SKM), 2006, National Science Foundation and the Polytechnic University, Brooklyn, NY.
[22]. A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks”, International
Journal on Computer Science and Engineering (IJCSE), Vol. 02, No. 02, 400-408, 2010.
[23]. Parul Tomar, Prof. P. K. Suri and Dr. M. K. Soni, “A Comparative Study for Secure Routing in MANET”, International Journal of
Computer Applications, Volume 4 - No. 5, PP. 17-22, July 2010.
[24]. Sudhir Agrawal, Sanjeev Jain and Sanjeev Sharma, “A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc
Networks”, Journal of Computing, Vol. 3, Issue 1, January 2011.
[25]. Priyanka Goyal, Vinti Parmar and Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, International Journal
of Computational Engineering & Management (IJCEM), Vol. 11, 32-37, January 2011.
[26]. Manisha and Dr. Mukesh Kumar, “Implementation and Removal of Co-operative black hole and worm hole Attacks on MANET
with DSR”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 3, Issue 12,
PP. 4147-4151, December 2014.