In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Survey of manet misbehaviour detection approachesIJNSA Journal
Distributed Denial of Service (DDoS) attacks today
have been amplified into gigabits volume with
broadband Internet access; at the same time, the us
e of more powerful botnets and common DDoS
mitigation and protection solutions implemented in
small and large organizations’ networks and servers
are no longer effective. Our survey provides an in-
depth study on the current largest DNS reflection a
ttack
with more than 300 Gbps on Spamhaus.org. We have re
viewed and analysed the current most popular
DDoS attack types that are launched by the hacktivi
sts. Lastly, effective cloud-based DDoS mitigation
and
protection techniques proposed by both academic res
earchers and large commercial cloud-based DDoS
service providers are discussed.
this ppt is useful for both b.e/b.tech students as well as for mca students. in this ppt u will find different types of security issues in manet and their countermeasures.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Survey of manet misbehaviour detection approachesIJNSA Journal
Distributed Denial of Service (DDoS) attacks today
have been amplified into gigabits volume with
broadband Internet access; at the same time, the us
e of more powerful botnets and common DDoS
mitigation and protection solutions implemented in
small and large organizations’ networks and servers
are no longer effective. Our survey provides an in-
depth study on the current largest DNS reflection a
ttack
with more than 300 Gbps on Spamhaus.org. We have re
viewed and analysed the current most popular
DDoS attack types that are launched by the hacktivi
sts. Lastly, effective cloud-based DDoS mitigation
and
protection techniques proposed by both academic res
earchers and large commercial cloud-based DDoS
service providers are discussed.
this ppt is useful for both b.e/b.tech students as well as for mca students. in this ppt u will find different types of security issues in manet and their countermeasures.
A Review Paper on Network Layer attacks in MANETsijsrd.com
The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well-behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource llocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
A Review Paper on Network Layer attacks in MANETsijsrd.com
The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well-behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource llocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
An Ad hoc Network is a pool of wireless mobile node
s energetically forming a network without the use o
f
any pre-accessible network infrastructure or centra
lized administrator. These nodes communicate with
each other by hop-to-hop communication. This dynami
c topology of mobile ad-hoc networks (MANETs)
allows nodes to get attached and leave the network
at any second of time. Thus MANET can be used in a
variety of fields. Current MANETs are designed prim
ary for military utility. This generic characterist
ic of
MANET has rendered its vulnerability to security at
tacks. Due to which unprotected attacks of the
malicious nodes can occur at any time. This paper f
ocuses on one such attack known as “Black hole
attack” and the routing protocol being used here is
AODV
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy
to use. There are some challenges of security and for IT administrators the choice of security protocol is a
critical issue. The main motive of this paper is to make the non-specialist reader knowledgeable about
threats in the wireless security and make them aware about the disadvantages of wireless security
protocols. WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) security protocols are defined and examined here. This security protocols are compared with the
common.
This paper is a comparative analysis of WEP, WPA and WPA2. We have tried to perform and check
authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools.
The test was conducted on Back Track operating system which is considered as dedicated pentesting
operating system. In the test result, we found out that WEP is the weakest, to which WPA was a temporary
solution and WPA2 is a very solid and long term solution.
This paper is a mixture of wireless security weaknesses and counter measures to the problems faced until
recently. After reading this paper the non specialist reader will have complete review and awareness about
the wireless security and vulnerabilities involved with it.
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
Vehicular ad hoc networks (VANETS) have actually attracted a lot of attention over the last few years as
being used to improve road safety. In this paper, cluster based technique has been introduced in VANET.
As VANET is a new form of MANET, so with this cluster based technique in VANET, several handoff
problems have been removed, which were actually difficult to remove in MANET. For this traffic
infrastructure cluster based routing has been used, with two routing protocols i.e. AODV and AODV+. The
network simulator NS2 has been used for removing unpredictable movements that may arise in the network.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Similar to An ids scheme against black hole attack to secure aomdv routing in manet (20)
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Large Language Model (LLM) and it’s Geospatial Applications
An ids scheme against black hole attack to secure aomdv routing in manet
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
DOI : 10.5121/ijans.2015.5101 1
AN IDS SCHEME AGAINST BLACK HOLE
ATTACK TO SECURE AOMDV ROUTING IN
MANET
1
Sonal Shrivastava, 2
Chetan Agrawal & 3
Anurag Jain
1
M-Tech (CSE), 2
Asst Prof (CSE) & 3
HOD (CSE)
Radharaman Institute of Technology & Science Bhopal, India
Abstract
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
Keywords- -AOMDV, MANET, IDS, Black hole attack, Routing misbehavior.
I. Introduction
A mobile ad hoc network (MANET) is a network consisting wireless mobile nodes that
conversation with each other without centralized control or established infrastructure [1]. These
nodes which are inside each and every one radio range can convey precisely, while distance nodes
count on their neighboring nodes to forward packets. In MANETS every node can be a host or
router. Mobility, an advantage of wireless communication, allows a freedom of moving around
although being linked to a network environment. Ad-hoc networks are so adaptable that nodes can
join and move a network easily as compare to wired network [2]. Such networks can be used in the
battlefield application, in disaster management and in remote areas where establishment and
management of fixed network is not possible. These can also be used in the areas where the
establishment of fixed infrastructure is very difficult. MANETs can also be used to deploy and
coordinate the drones in the battle field.
But this flexibility of mobile nodes proved in an ever-changing topology that forms it very tough
in establishing secure ad-hoc routing protocols. The radio channel employ for ad hoc networks is
propagate in nature and is common by all the nodes in the network. Data transmitted by a node is
collect by all the nodes within its direct transmission range. So attackers can easily affect the data
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
2
being transmitted in the network. If the ad hoc network lacks some form of network level or link
layer security, a MANET routing protocol [3] will be more vulnerable to many forms of malicious
attacks. It can be simple attack like snooping network traffic, transmissions replay, manipulation of
the packet headers, and redirecting the routing messages, within an Ad hoc network without any
appropriate security provisions. In Black hole attack, malicious nodes get a chance to attack during
route discovery process. A black hole means that one malicious node apply the routing protocol to
affirm itself of having shortest path to the destination node, and drops routing packets and does not
send packets to its adjacent node [4]. A single Black hole node can easily attack on mobile Ad hoc
networks [5]. There is various detection schemes for detecting single black hole, but failed when
cooperative black hole attack occurs. Cooperative black hole attack means malicious nodes act in a
group. In this attack, one malicious node receives data and forwards it to other malicious node
instead of forwarding it towards destination. To provide complete security in this paper we
proposed a secure IDS scheme for AOMDV [6] routing protocol of MANET. We required secure
routing procedure protocol for appends the possibilities of actual data delivery in network as
compare to attacker infected data. Since nodes involved in the routing cannot by themselves ensure
the secure and uninterrupted delivery of transmitted data.
The absence of centralized authority is the major reason of attack in MANET. The malicious nodes
are easily affected the routing performance to be a part of it. It implies malicious node are already
present in network and always perform the same function as normal nodes, hence the identification
of these nodes are not easy.
The routing misbehavior of attacker or malicious nodes drop the data routed through that nodes or
range on these nodes. Misbehaving nodes can interrupt the route discovery by acting the
destination, by replying with stagnant or demoralized routing information, or by propagating
progressed control traffic. With the substantial thing in secure routing in the mobile Ad-hoc
network we propose a new algorithm for developing network interpretation from attack like
throughput, Routing load and delay [8].
Security in Mobile Ad-Hoc Network (MANET) is the greatest essential firm for the basic affinity
of network. Accessibility of network services, esoteric and integrity of the data can be
accomplished by ensuring that security issues have been met. MANET frequently suffer from
security attacks due to its features like unclosed medium, changeful its topology dynamically,
absence of central monitoring and management, cooperative algorithms and no clear defense
mechanism. These aspects have developed the battle field position for the MANET against the
security threats.
The remaining of this paper is organized as follows. In Section II we show the typed of attack
classification. The Section III is presents the Previous work done in this field. Section IV is
described the proposed IDS security scheme in depth. The Section V presents the description of
simulation environment. The section VI is presents the simulation results using ns2 are presented
and In Section V, we conclude our work with future extension.
II. Types of attacks in MANET
The attacks in MANETS are classified into two major categories [7, 9], namely
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
3
Passive Attacks - Passive attacks are those, established by the adversaries merely to intrude the
data exchanged in the network. These attackers in any mode don’t divert the action of the
network. Such attacks recognition get very rigorous since network itself does not impacted and
they can depreciate by using persuasive encryption techniques.
Active Attacks - The active attack attempts to change or demolish the data that is being
exchanged, by that distressing the standard operation of the network. In MANET malicious and
unwanted nodes to interrupted the natural operating in the network.
Some of the common attacks [9, 10] in MANET are as follows:-
1) Black Hole Attack - The aim of this attack is to enhance the congestion in network. In this
attack the adversary node does not transmit any packets transmitted to it, rather drops them all.
Due to this attack the packets sends by the nodes do not come their proposed destination and the
congestion in the network expand due to retransmissions.
2) Wormhole Attack - In wormhole attack, two concurring nodes are mentioned and one
node tunnels the packet to some other node in the consistent network over a huge speed private
wired link or wireless link these packets are then dislike from that location into the network. This
tunnel between two selfish nodes is known as wormhole.
3) Denial of Service (DoS) Attack and Flooding - The purpose of this attack is to exhaust
the gentle working of the network. This attack is executed by constantly forwarding packets into
the network inducing the proposed node in the network to work them and hold them employed
resulting in the colliding of that node. By executing this attack, the attacker holds the targeted
node active in developing its induced packets and discarding the legitimized RREQs to be
dropped. This attack can get the network substructure to break-down.
4) Sybil Attack - In the Sybil attack [11], an attacker act to have multiple identities. A
malicious node can play as if it were a enormous number of nodes either by acting other nodes or
justly by claiming wrong identities. Sybil attacks are divided into three divisions like direct or
indirect communication, fabricated or stolen identity, and simultaneity. In the direct
communication, Sybil nodes convey instantly with legitimize nodes, whereas in the indirect
convey messages sent to Sybil nodes are routed through malicious nodes. An attacker can
assemble a new identity or it can simply rob it after destructing or temporarily disenabling the
impersonated node. All Sybil identities can act together in the network or they may be cycled
through.
5) Byzantine attack - In a Byzantine attack [12] compromised intermediate node perform by
itself, or a set of compromised intermediate nodes execute in complicity and perform attacks such
as generating routing loops, transmitting packets through non-optimum route, or selectively
dropping packets, which outcomes in annoyance or degradation of the routing services.
6) Rushing attack - In rushing attack [7, 13] an attacker occupy the RREQ packet from
source node disperse over the packet promptly to all the other nodes in the network, earlier they get
the same packet from the source. Formerly the primary RREQ packet comes to the nodes, they
consider it is a replicate and repudiate it since they preliminarily have the packet from adversary.
III. Work Accomplished in this field
The Secured routing schemes for MANETs have received increasing attention in the recent years,
with main focus on data forwarding.
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
4
In this paper [14], an approach have been proposed to diminish the black hole attack using
AOMDV (Ad hoc on Demand Multipath Distance Vector) routing protocol. Some recoveries
have been made in AOMDV protocol. The proposed approach based upon AOMDV (Ad hoc on
demand Multipath Distance Vector) route discovery and creates a new logic for avoiding black
hole attack using Legitimacy or trust factor of a node. This approach detects black hole node and
discovers node disjoint multipath, which reduces the overhead of a specific node. These meliorate
produce the protocol vigorous against black hole attack along multipath route discovery process.
In this paper [15] they proposed SAODV protocol which is the extension of AODV. This
protocol is secure and efficient MANET routing protocol which aims to address the security is not
strong of the AODV protocol and is able to perform of enduring the black hole attack.
This paper [16] proposed a secured message security scheme for MANETs (our so-called T-
AOMDV) that uses a trust-based multipath AOMDV routing combined with a soft-encryption
methodology to securely transfer messages. More precisely, our approach consists of three steps:
(1) Message encryption: where at the source node, the message is segmented into three parts and
these parts are encrypted using one another using some XOR operations, (2) Message routing:
where the message parts are routed separately through different trust based multiple paths using a
novel node disjoint AOMDV protocol, and (3) Message decryption: where the destination node
decrypts the message parts to recover the original message.
In this paper [17], they proposed a method uses Intrusion Detection using Anomaly Detection
(IDAD) to defend against black hole attacks established by both single and multiple black hole
nodes. It proved the specific result increases network performance by reducing formation of
control (routing) packets including effectively defend black hole attacks opposed to mobile ad-
hoc networks.
In this paper [18], they proposed a method uses promiscuous mode to find malicious node and
transmit the data of malicious node to every some other nodes in the network. The efficiency of
suggested mechanism as throughput of the network does not decay in existence of the black holes.
In this paper [19], they proposed two possible solutions to study black hole attack. The first
solution is to study several route to the destination. The second is to apply the packet sequence
number contained in any packet header. In study to AODV routing scheme, the second solution is
superior and of the route to the destination rely upon on the pause time at a lowest cost of the delay
in the networks.
In this paper [20], they have proposed a solution the requesting node wait and check the replies
from all neighboring node to find a safe route. It is provide better performance than the
conventional AODV in the existence of Black holes with smallest additional delay and overhead.
In this paper [21], they apply a reactive routing protocol called as Ad hoc On-demand Distance
Vector (AODV) routing for examine of the outcome of the black hole attack when the destination
sequence number is altered via simulation. Then, they determine characteristic in order to define
the normal state from the character of black hole attack. They proposed training scheme for huge
accuracy detection by modifying the training data in every given time intervals and adaptively
specifying the normal state according to the changing network environment.
IV. Problem Statement
In MANET environment the problem is, nodes are supposed to collaborate among each other
dynamically to give routing service and transmit packets. This need represent a security challenge
when malicious nodes are exhibit in the network. Certainly, the presence of such nodes may not
simply interrupt the normal network operations, but cause serious message security concerns. The
security concern is necessary in absence of centralized administration because of no system in
network is to monitor the routing information and malicious activities. The routing misbehavior is
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
5
degrades the network performance by dropping the data packets or capturing the data packets in
network.
1. The attacker replies false route information.
2. The all data is dropped by attacker to forward through malicious nodes.
3. The sender has continuously tried to send data after failure number of iterations.
4. The routing packets are more deliver to send little amount of data.
The proposed scheme is improves the routing misbehavior from malicious nodes
V. Proposed IDS Scheme to secure MANET
Route discovery is a susceptibility of on demand Multipath Ad-hoc routing protocols, especially
(Ad hoc On Demand Multipath Distance Vector) AOMDV, which an adversary can get to act a
black hole attack on mobile ad-hoc networks. A malicious node in the network evolving an
RREQ message respond to source nodes by forwarding a fake RREP message that includes
valuable parameters to be preferred for packet delivery to destination nodes. After reassuring (by
sending a fake RREP to affirm it has a route to a destination node) to source node that it will
transmit data, a malicious node begins to drop all the network traffic it.
Secure connection has been established between source nodes to destination nodes. The Proposed
IDS algorithm finds out the multiple routes from source to destination using AOMDV routing
algorithm. After finding multiple routes, all the routes are classified based on the conviction factor
of existence of attacker in route. Then it will prefer the best route which is having no existence of
malicious attack or black-hole attack. In this method the data is secured in presence of IDS
algorithm. Then it routes the data through best single route of multiple established path in
MANET.
In this research we consider three modules of routing:
a) Normal AOMDV routing Module: To evaluated the performance of normal Multipath
routing protocol without presence of attacker.
b) The second in presence of black hole attack: - The multipath is reliable for
communication because the attacker blocks the established route then it delivers data through next
possible routes but multiple attackers are blocks all the possible paths.
c) The third is proposed IDS module: This module is proposed to provide security in
presence of black hole attack. The attackers are absolutely performing no routing misbehavior and
provide reliable routing. The whole procedure of IDS algorithm is mentioned in next point.
Proposed Algorithm to Identify and Prevent from Attack:
Number of nodes = 50
Routing Protocol = AOMDV
Type of attacker = Black hole as a Malicious attacker
Security Provider = IDS (Intrusion Detection System)
Step1: Sender has sending the request to all intermediate nodes between sources to destination.
Step2: Add the next hop in routing table if we have to destination route, otherwise rebroadcast the
request and maintaining the hop count information.
Step 3: If destination is found then select the route of minimum hop count and deliver data through
that minimum hop count path h.
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
6
1. Multiple paths are selected on the basis of hop counts h1, h2, h3…….. hn, n=1,23…
2. ∑ Hn = (h1, h2, h3…….. hn) up to destination is Minimum then select for data sending and next
route of hop count h1, h2, h3 …….. hn ≥ Min is select for multiple path.
Step4: We compare the AOMDV routing table through IDS system to next hop routing table, if
table is matched it means no attack in the network and route is true, and then forward all data
packet.
Step5: If next node is false, and the next hop information is not matched (M means data entry)
If next hop h1, h2, h3…. hn-1 ≠ M.
It means no previous data deliver through that hop, insert the table new entry which have shortest
path to destination.
Step6: If next hop is true, sending data through that hop is false then send the data packet for
checking the reliability through proposed IDS security scheme.
Step7: IDS (Intrusion Detection system) verify if routing table information is not matched related
to actual hop count means some misbehavior activity occurs in the network through malicious
nodes.
Step8: Applied prevention scheme is and block that hop and change the path, forward data packet.
Also forward the nodes ID (identification) in network by that the attacker neither is nor select in
routing procedure.
Step 9 If the attacker is be present in selecting path for data delivery then avoids that path and
preferred another suitable path from multiple paths established by AOMDV.
Attacker exists on Hop count h1, h2, h3 …….. hn = Min then,
Select route of Hop count h1, h2, h3 …….. hn ≥ Min
Step10: If routing is matched then forward data packet until send all data packet reach to
destination.
Step 11: Exit
Flow Chart of Proposed IDS Security Scheme against Malicious Attack
The flow of proposed security scheme is represents the steps to identified the attacker and
obstruct the activities of attacker by that secure communication in possible.
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
7
Fig.1. shows that proposed flow chart of algorithm
Hop count –The hop count represents the total number of devices of data packet passes between
sources to destination. The more hops data must traverse to reach their destination, the greater the
transmission delay incurred.
Routing Table -A routing table contents the data essential to transmit a packet along the finest
route toward its destination. Each packet includes data about its source and destination.
When a packet is collected, a network tool observes the packet and equals it to the routing table
entering giving the best equivalent for its destination. The tables then supply the tool with
instructions for forwarding the packet to the next hop on its path across the network.
IDS –Intrusion Detection system (IDS) is the process of detecting an adversary and preventing its
subsequent action. It is anomaly activities will monitor network traffic and compare normal
activities
8. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
8
V. Simulation Description & Parameters
The simulation of all three modules i.e. normal AOMDV routing, Attack in AOMDV and IDS
scheme against Malicious attack in AOMDV done in Network Simulator (NS-2) version 2.3. 1 A
network was creating for the simulation aim and then observed for a number of parameters. The
TCL (Tool Command Language) of modules simulated for 20, 40, 60, 80 and 100 nodes.
Simulation time is taken 100 sec. Each node moves randomly and has a transmission range of
250m. The minimum speed for the simulations is 3 m/s while the maximum speed is 30 m/s. Each
mobile node in the MANET is allotted primary location within the simulation dimensions of
800×800 meters and joins the network at an arbitrary time. The packets are created using FTP and
CBR with rate of 3 packets per seconds. Nodes are generally allocated when initiated, and the
original location for the node is defined in a movement scenario file generated for the simulation
using a factor inside ns-2. The propagation model is used two ray ground and the MAC layer
technology of 802.11 is considered for wireless communication. The number of attacker nodes is
created 4 and against them IDS nodes are plot 2 in network.
Performance Metrics
The following performance metrics are used for comparing the performance of three modules:
i. The packet delivery ratio - The ratio of the data delivered to the destination to the data sent out
by the source. The PDF shows how successful a protocol performs delivering packets from origin
to destination.
ii. The average end-to end delay - This is the average delay between the sending of packets by
the source and its receipt by the receiver. This includes all possible delays reasons during data
gaining, route discovery, processing at intermediate nodes, retransmission delays, and
propagation time. It is measured in milliseconds.
iii. The normalized routing overhead - The number of routing packets transmitted per data
packet delivered at the destination. The routing overhead minimum is shows better performance.
iv. Throughput - Throughput is the average rate of successful message delivery over a
communication channel. A high throughput network is desirable.
V. EVALUATED RESULT
The results evaluated on the basis of considered simulation parameters are mentioned in this
section.
a). Data Drop Analysis in case of AOMDV, Attack and IDS - The packet drop due attack
at the time of routing is the routing misbehavior in network. The attacker is affected the
performance of routing by dropping the data packets in network. In this graph the packet drop
percentage is identify in case of routing misbehavior of attacker. The performance is illustrated in
nodes density of 20, 40, 60, 80 and 100. The drop percentage is identified from the trace file and in
trace file only attacker nodes are drop the packets. The drop percentage is about 19% at the end of
simulation. The drop through attacker is not identified in presence of proposed IDS scheme. The
security scheme obstruct the attacker activities and provide attacker free network. That’s why the
drop through in case of IDS scheme in not identified in IDS module simulation.
9. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
9
Fig. 1 Data Drop Analysis
b). Packet Delivery Ratio Analysis in case of AOMDV, Attack and IDS
The packets successful transmission is improves the performance of network besides that the
packet dropping is degrades the performance of network.
The routing misbehavior through black hole attack is degrades the percentage of data receiving in
node densities of 20, 40, 60, 80 and 100. The attacker is consuming whole data packets that are not
forwarded to destination after positive route reply. The percentage of packets successful receiving
in case of normal AOMDV, Attack and IDS scheme is illustrated in this graph. The attacker
performance is about 2 % up to simulation time of 50 seconds. The attacker has drop the most of
the data packets by that the routing performance of AOMDV routing is degrades. The proposed
IDS security scheme is improve the PDR performance is presence of attacker. The PDR in case of
IDS scheme is about 95 % and it is almost equal to normal AOMDV routing performance.
Fig. 2 PDR Analysis
0
200
400
600
800
1000
1200
1400
1600
20 40 60 80 100
DataPackets
Nodes
Data Drop Analysis
PktsDrop_AOMDV
PktsDrop_BHA
PktsDrop_IDS
0
20
40
60
80
100
120
20 40 60 80 100
PacketsPercentage
Nodes
PDR Analysis
PDR_AOMDV
PDR_BHA
PDR_IDS
10. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
10
c). Routing Overhead Analysis in case of AOMDV, Attack and IDS
The routing overhead is counted through the number of routing packets are deliver in network. The routing
packets are flooding in network to establishment connection in between sender and receiver through
intermediate nodes. The nodes are forming dynamic topology by that the link establishment is the
challenging issue in MANET. This graph illustrated the routing overhead in case of AOMDV, Attack
and IDS scheme and observes that the performance of IDS scheme is recovers the performance in
presence of attacker in 20, 40, 60, 80 and 100 nodes scenario. The routing overhead of 20 nodes is
about 315 and rest of them is more than 20 except 40 nodes. In case of IDS the packet receiving is
more as respect to routing packets are deliver in network but in case of attacker it is negligible
compare to that. The routing overhead of normal and IDS are overlapped due to that not visible
clearly and it is too much less then attacker performance.
Fig. 3 Routing Load Analysis
d). Throughput Analysis in case of AOMDV, Attack and IDS
The packets receiving in MANET is not being on any supervision or administrator. The data
delivery in that kind of network is not safe. In this graph we illustrated the throughput analysis in
case of normal AOMDV, Attack and proposed IDS scheme. The packet per unit of time in case of
attack is almost negligible in network but in case of proposed IDS scheme the throughput is much
better as compare to attacker in 20, 40, 60, 80 and 100 nodes scenario. The throughput in case of
normal AOMDV routing is about more than 3500 packets/seconds and not less than
600packets/seconds. It implies that the throughput in case of IDS is more as compare to normal
AOMDV routing. The reason behind is that if the attacker is existing in established path then in
that case that path is not select for data delivery to maintaining the reliability and the next
alternative path is chosen more reliable and strong that minimizes packet dropping and improves
data delivery in presence of attacker.
0
50
100
150
200
250
300
350
20 40 60 80 100
Load
Nodes
Routing Load Analysis
RoutingLoad_AOMDV
RoutingLoad_BHA
RoutingLoad_IDS
11. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
11
Fig. 4 Throughput Analysis
e). Packets Receive Analysis in case of AOMDV, Attack and IDS
Multipath routing is enhanced the possibility of successful receiving by proving the alternative
path in network if first one is fail. The UDP protocol is the transport layer protocol provides end to
end delivery in network. In this graph the performance of UDP packet received is examine in case
of normal AOMDV, Attack in AOMDV and proposed IDS scheme. The packet receiving in case
attacker is negligible due to routing misbehavior of AOMDV protocol. The packet receiving in
case of proposed IDS scheme is much more in 20, 40, 60 80 and 100 nodes densities also AOMDV
provides the almost same performance. That provides the better receiving.
Fig. 5 Packets Received analysis
VI. Conclusion & Future Work
The central coordination system absence, security is the major issue in MANET. The data packets
in network are delivering in between sender and receiver through routing mechanism of connection
establishment. The performance is illustrated in 20, 40, 60, 80 and 100 nodes scenario. The
attackers are dropping the all data packets that are the reason of routing misbehavior in MANET.
0
500
1000
1500
2000
2500
3000
3500
4000
20 40 60 80 100
PacketsinUnitTime
Number of Nodes
Throughput Analysis
AOMDV
BHA
IDS
0
2000
4000
6000
8000
10000
20 40 60 80 100
DataPacketsReceived
Nodes
Packets Receiving Analysis
PktsReceive_AOM
DV
PktsReceive_BHA
PktsReceive_IDS
12. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
12
The malicious attacker action is wedged by proposed IDS security scheme and provides the
attacker free network. The AOMDV protocol provides the alternative if the problem in accessible
path is occurred. The routing performance is measured by performance metrics in case of normal
AOMDV routing, Malicious Attack and proposed IDS scheme. The proposed IDS scheme
identified the attacker through next hop information of data delivery and also forward the
Identification of node ID of attacker in network. If that ID is exist in routing establishment then the
alternative route is select for data delivery.
The routing performance of AOMDV protocol and IDS scheme on AOMDV is almost equal that
means nearly the network is provides equivalent performance. In attacker module degrades the
whole performance of network but in presence of attacker their activities are completely blocked
by IDS scheme after identifying them in network. Moreover after dump the performance of
network by attacker proposed IDS scheme recovers 95 % of data loss as compare to normal
AOMDV.
In future we also apply this IDS scheme on other routing attacks like wormhole attack and Grey-
hole attack. Also analyze the effect of attack on energy consumption of mobile nodes i.e. the
major or only source of communication. Without energy existence nodes in MANET are not
survives for a long time.
Acknowledgement
I would like to thank Prof. Anurag Jain, Assistant Prof. Chetan Agrawal, for accepting me to
work under his valuable guidance. He closely supervises the work over the past few months and
advised many innovative ideas, helpful suggestion, valuable advice and support.
References
[1] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks, Architectures and Protocols”,
Second Edition, Low price Edition, Pearson Education, 2007.
[2] S Gowrishankar , T G Basavaraju, and Subir Kumar Sarkar, “Effect of Random Mobility Models
Pattern in Mobile Ad hoc Networks”, IJCSNS International Journal of Computer Science and
Network Security, VOL.7, No.6, June 2007.
[3] Saleh Ali K. Al-Omari and Putra Sumari, “ An Over View of Mobile Ad Hoc Networks for Existing
Protocols and Applications,” International Journal on applications of graph theory in wireless ad hoc
networks and sensor networks (Graph-Hoc), Vol.2, March 2010.
[4] Songbai Lu, Longxuan Li , Kwon-Yan Lam and Lingvan Jia “SAODV: A MANET Routing Protocol
that can Withstand Black Hole Attack,” Proceedings of International Conference on Computational
Intelligence and Security, pp. 421-425, 2009.
[5] Devid Cerri, Alessandro Ghioni, CEFRIEL-Politecnico di Milano “Securing AODV: The A-SAODV
Secure Routing Prototype,”IEEE Communication Magazine, pp. 120-125, 2008.
[6] Mahesh K. Marina and Samir R. Das, "On-demand Multipath Distance Vector Routing in Ad Hoc
Networks", Wireless Communications and Mobile Computing, Wiley Inter Science pp. 969–988,
2006.
[7] S. Yi and R. Kravets, "Composite Key Management for Ad Hoc Networks", Proceeding of the 1st
Annual International Conference on Mobile and Ubiquitous Systems: Networking and
Services(MobiQuitous’04), pp. 52-61, 2004.
[8] Sonal Shrivastava, Chetan Agrawal & Anurag Jain, " Survey of Black Hole Attack and Security
Scheme in MANET ", International Journal of Information and Communication Technology Research
(IJICT) Volume (4): Issue (3) pp. 104-113, 2014.
[9] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, "Different Types of Attacks on
Integrated MANET-Internet Communication", International Journal of Computer Science and
Security (IJCSS) Volume (4): Issue (3) pp. 265-274, 2010.
[10] Abu Taha Zamani, Javed Ahmad, "A Novel Approach to Security in Mobile Ad Hoc Networks
(MANETs)", International Journal of Computer Science and Information Technology Research, Vol.
2, Issue 1, pp. 8-17, January-March 2014.
13. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
13
[11] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis and
Defences,” presented at the 3rd Int. Symposium Information Processing in Sensor Networks (IPSN), ,
pp. 259–268, 2004.
[12] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-demand Secure Routing Protocol
Resilient to Byzantine Failures", Proceedings of the ACM Workshop on Wireless Security, pp. 21-30,
2002.
[13] Y. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network
Routing Protocols", Proceeding of the ACM Workshop on Wireless Security (WiSe), pp. 30-40, 2003.
[14] Jyoti Rani, Naresh Kumar "Improving AOMDV Protocol for Black Hole Detection in Mobile Ad hoc
Network" IEEE International Conference on Control, Computing, Communication and Materials
(ICCCCM), 2013.
[15] Songbai Lu , Longxuan Li , Kwok-Yan Lam, "S-AODV: A manet Routing Protocol that can
withstand Black hole attack” 2009 International Conference on Computational Intelligence and
security", pp. 412-425, IEEE 2009.
[16] Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obaidat, Ting-Yun Chi, Sanjay
K. Dhurandher, " Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks" IEEE
Globecom 2011 proceedings.
[17] Yibeltal Fantahun Alem Zhao Cheng Xuan, " Preventing Black Hole Attack in Mobile Ad-hoc
Networks Using Anomaly Detection" IEEE 2nd International Conference on Future Computer and
Communication (ICFCC), pp.V3-672 - V3-676, 21 to 24 MAY 2010.
[18] Pramod K. Singh and Govind Sharma, “An Efficient Prevention of black hole problem in AODV
routing protocol in MANET,” 2012 IEEE 11th International Conference on Trust ,Security and
Privacy in Computing and Communications, pp. 902-905.
[19] Ms Nidhi Sharma, Mr Alok Sharma “The Black-hole node attack in MANET" 2012 Second
International Conference on Advanced Computing & Communication technologies, 546-550 2012
IEEE.
[20 ]Latha Tamilselvan, Dr. V Sankaranarayanan, "Prevention of Blackhole Attack in MANET", In
Proceedings of IEEE 2nd International Conference on Communications, IEEE 2007.
[21] G.S. Mamatha and Dr. S. C. Sharma "A Highly Secured Approach against Attacks in MANETS",
International Journal of Computer Theory and Engineering, Vol. 2, No. 5, 1793-8201, October, 2010.
[22] Satoshi Kurosawa1, Hidehisa Nakayama1, Nei Kato1, Abbas Jamalipour2, and Yoshiaki Nemoto, "
Detecting Blackhole Attack on AODV based Mobile Ad Hoc Networks by Dynamic Learning
Method", International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007.
[23] NS2 simulation package, http://www.isi.edu/nsnam/ns/ (Last visited, September 2014).