SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. II (Jan - Feb. 2015), PP 09-13
www.iosrjournals.org
DOI: 10.9790/2834-10120913 www.iosrjournals.org 9 | Page
Preventing Malicious Node and Provide Secure Routing In Manet
R. Gayathri1
, J.Maria Sofi Anusuya2
P.G. Student, Department of Electronics and communication Engineering, Dhanalakshmi srinivasan
Engineering College, perambalur, India1
Associate Professor, Department of Electronics and communication Engineering, Dhanalakshmi srinivasan
Engineering College, perambalur, India2
Abstract: A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless
links. Mobile Ad-hoc Networks (MANET) are characterized by open, distributed and dynamic architectures,
built on top of the shared wireless medium; all features contribute to make MANET very vulnerable to attacks at
any layer of the Internet model. We consider the following problem: nodes in a MANET must separated data
packet using rateless codes but some nodes are assumed to be malicious, i.e., before transmitting a coded packet
they may modify its payload. Nodes receiving corrupted coded packets are prevented from correctly decoding
the original chunk. We propose SIEVE, a fully distributed technique to identify malicious nodes. SIEVE is based
on special messages called checks that nodes periodically transmit. A check contains the list of nodes identifiers
that provided coded packets of a chunk as well as a flag to signal if the chunk has been corrupted. SIEVE
operates on top of an otherwise reliable architecture and it is based on the construction of a factor graph
obtained from the collected checks on which an incremental belief propagation algorithm is run to compute the
probability of a node being malicious. We show that SIEVE is very accurate and robustness under several
attack scenarios and deceiving actions. We also focused on decentralized networks, called MANETs, where
communication between mobile nodes is purely ad-hoc based, exploit- ing rateless coding to minimize data loss
due to transmission unreliability, and detecting malicious nodes sending corrupted packets to detect and prevent
problem in a strongly distributed environments, using SIEVE.
I. Introduction
MOBILE Ad-hoc Networks (MANET) are characterized by open, distributed and dynamic
architectures, built on top of the shared wireless medium; all features contribute to make MANET very
vulnerable to attacks at any layer of the Internet model.
We consider a particular type of active, non cryptography related attack, where insider nodes corrupt
data at the application level (this is also known as pollution attack). In this paper we deem as a use case a data
dissemination application over a MANET. Nodes generate data chunks to be Disseminated to all participants
using rateless codes; some malicious nodes deliberately modify coded packets of a chunk before relaying them
to prevent honest nodes from obtaining the original information.
In this paper we propose SIEVE a decen-tralized, accurate and robust technique to identify malicious
nodes on top of an Other-wise reliable and attacker free architecture. Each node in SIEVE dynamically creates a
bipartite graph whose vertexes are checks and uploading nodes. A check is a report created by a node upon
decoding a data chunk; a check contains a variable length list of nodes identifiers that provided parts of the data
as well as a flag to signal if the data chunk has been corrupted. Detection of the compromised chunks is
achieved exploiting the constraints imposed by linear channel coding. The factor graph is periodically and
independently analyzed by each node running an incremental version of the Belief Propagation (BP) algorithm
[3]–[6]. The proposed algorithm allows each node to compute the probability of any other node being malicious;
these latter probabilities are used to derive a suspect ranking of nodes in the MANET. Each node updates its
local factor graph using the checks obtained by its own decoding operations as well as checks that are
periodically gossiped by neighbor nodes.
1.1 Our Contributions
The major problem of the paper are the identification malicious nodes in terms of the estimation of the
marginal probabilities on a bipartite graph and the proposal of a decentralized and accurate solution based on the
BP algorithm. It is worth pointing out that the Selected data dissemination application is just a quite popular use
case to a single scenario. In particular, SIEVE can be used in any application that uses multi-party download or
collaboration, provided that is possible to detect that a given set of collaborating entities is compromised by at
least one malicious node. As opposed to cryptographic/algebraic techniques proposed in the area of network
coding based wireless mesh networks, e.g., [9]–[12] SIEVE does not rely on verification tools to check the
integrity of every coded block. In SIEVE the BP algorithm is used to infer the identity of the malicious nodes
Preventing Malicious Node and Provide Secure Routing In Manet
DOI: 10.9790/2834-10120913 www.iosrjournals.org 10 | Page
resting upon only on a simple pollution detection mechanism; as an example, in our reference scenario,
pollution detection is achieved as a by product of the data dissemination protocol based on rate-less codes.
Furthermore, the aforementioned solutions may not be suitable for MANET since mobility is likely to affect key
pre distribution, routing mechanisms, attack behavior, etc. SIEVE fits well two key MANETs features that must
be accounted for when devising any security solution: it is fully decentralized and does not rely on any infra-
structure (as opposed to some solutions in the area of peer-to-peer streaming where special well known nodes
are necessary,e.g., [13]). Furthermore, SIEVE requires small computational, storage, and communication costs
for implementation.
II. Sieve
In this paper we consider a MANET created a N wireless nodes moving in a given area. A set of
Nsource nodes periodically produces a new data packet to be disseminated to all others once every h seconds.
All nodes cooperate to the diffusion of the data chunks by running a distributed dissemination algorithm based
on Luby Transform (LT) codes [15]. Data is transmitted by source nodes using LT codes [15]: a packet is
divided in K equally sized blocks. The source node then creates and forwards coded packets using LT codes
[15], combining random subsets of the K blocks; the size of each coded packet is Scb = S/K.
2.1 LT Encoding And Decoding Process
LT codes have been proposed in [15] this paper is a rateless codes: these are a particular family of
erasure codes where the rate is not fixed by design, so that the number of coded packets can be decided and
changed on the fly. LT codes are rateless based on the binary Galois field GF(2). In [15] it is shown that
selecting the number of blocks to be combined, termed as the packet degree d, according to the Robust Soliton
Distribution (RSD), one gets optimal asymptotic decoding performance. By optimal performance we mean that
the so called decoding overhead, i.e. the number of coded packets to be received in excess of K, turns to be
negligible for asymptotically large K. In particular, the original chunk can be obtained by any node able to
collect any set of M = K · (1 + ) coded packets. The decoding algorithm can be viewed as the solution of a
system of linear equations with K unknowns (the K original data blocks) and M ≥ K equations. In [15] it is
shown that a simple method based on the recursive cancellation of equations corresponding to packets with
degree 1, i.e. representing one original data blocks, guarantees the desired asymptotic performance.
2.2 LT Dissemination Protocol
The rateless principle and randomness of LT codes is used for spreading data in the MANET by letting
source nodes transmit novel coded packets that can be gene-rated randomly and on the fly. A coded packet
conveys the XOR payloads of the corresponding original packets as well as a header signaling the indexes of the
combined packets. The original chunk can be obtained by any node able to collect any set of K · (1 + ) coded
packets without requiring any coordination among the source nodes.
mobile nodes
Desination
SIEVE
Performance
Analysis
Data
Transmission
Mobile Adhoc
Network
Attack Detection
Prevention
Pollution Attack
Fig 1.1 SIEVE preventing malicious node.
Fig 1.1 ,if the source node can transmitted the data from source to destination throught.
SIEVE. SIEVE using LT code to prevent data from malicious node.It can mainly identify malicious node
produces pollution attack.
Preventing Malicious Node and Provide Secure Routing In Manet
DOI: 10.9790/2834-10120913 www.iosrjournals.org 11 | Page
2.3 Malicious Nodes
The proposed dissemination protocol is an example of a distributed and collaborative approach that has
the potential to simplify and accelerate the spreading of the information in the MANET thanks to node mobility.
On the other hand, few malicious nodes may try to break the system by polluting, i.e. modifying some coded
packets. In this paper we assume that a subset of P  N nodes is composed of malicious nodes, That deliberately
modify the payload of the coded packets to prevent honest nodes from correctly reconstructing the original
chunk. In the presence of coding even a single corrupted coded packet can prevent an honest node from
decoding the original chunk.
III. POLLUTION IDENTIFICATION PROTOCOL
SIEVE uses LT codes decoding scheme to detect changed packet and exploits the Belief Propagation
(BP) algorithm [3] to identify malicious nodes.
3.1 LT codes Verification
The every node keeps collecting from different uploaders sets of coded blocks corresponding to
different chunks. LT codes can be exploited to detect if modified blocks have been collected without the need of
any supplementary verification mechanism. Indeed, a node is able to detect pollution as soon as an
inconsistency is found in the solution of the underlying system of linear equations. This is achieved by
observing that a coded packet with a degree 1 equation represents a data packet in the clear. Such data packet
can be simplified from all the incoming equations. Since LT codes have a certain overhead some coded packets
that are linearly dependent on the ones received previously are always collected before successful decoding; this
amount to the reception of some equations whose terms are all already known. As soon as this condition is met
the LT decoder can check the consistency of the payload carried by the coded packet; in other words, the same
linear combination must be obtained combining a set of already known packets. If this constraint is violated the
whole chunk is recognized as corrupted. Please note that the receiver node is not able to identify the corrupted
block(s) but only that at least one of them has been maliciously manipulated.
3.2 Check Construction and Reporting
SIEVE is based on the concept of checks that are reports created by nodes upon decoding a chunk. A
check contains the list of the identifiers of nodes that provided coded blocks of a chunk and a flag to label such
chunk as corrupted or not. A check describing a corrupted chunk is called a positive check while it is termed a
negative check otherwise. Each nodes n maintains a list of all checks created that is denoted as Ln. Each node,
besides accumulating the checks from its local decoding operations, gossips them in the neighborhood.
3.3 performance analysis
Sieve can be identified three main performance analysis as shown in the graph.
The mainly consider the three performance such as throughput, packet delivery ratio and end to end delay.
3.4 Average End To End Delay
Fig 1.2 shows the accurately identify the performance analysis of average end to end delay
Fig 1.2 Average End To End Delay
Preventing Malicious Node and Provide Secure Routing In Manet
DOI: 10.9790/2834-10120913 www.iosrjournals.org 12 | Page
3.5 packet delivery ratio
Fig 1.3 shows the accurately identify the performance analysis of packet delivery ratio
Fig 1.3 Packet Delivery Ratio
3.6 THROUGHPUT RATIO
FIG 1.4 shows the accurately identify the performance analysis of throughput ratio
Fig 1.4 throughput ratio
IV. Results
The simulation methodology and the indexes we defined to evaluate the accuracy, reactivity, and
robustness of SIEVE. In particular, we show the packet delivery ratio, average end to end delay and throughput
ratio of the factor graph and mobility impact the performance of SIEVE as well as how robust it is with respect
to several deceiving actions operated by malicious nodes. Finally, we show a trade-off between coding
efficiency and SIEVE accuracy.
V. Conclusion
In this we used sieve technique to accurately identified the malicious node. The malicious node
produces pollution attack to a original packet. A data can be separated application based on LT code.
Fortunately, the LT decoding procedure can be used by each node to detect that a data chuck has been attacked;
nonetheless, since parallel downloading form multiple nodes is used, such detection does not allow to identify
the malicious nodes. This latter represents the core problem solved by SIEVE. In SIEVE node collaborations are
Preventing Malicious Node and Provide Secure Routing In Manet
DOI: 10.9790/2834-10120913 www.iosrjournals.org 13 | Page
represented by a bipartite graph linking nodes and detection opportunities, the checks. It is worth pointing out
that such representation is quite general and can be used in many other collaborative scenarios
other than the data dissemination use case analyzed in this paper.
Future works will be focused in two main directions. From the one hand we will complete the design
and experimentation of a full system to counteract an active attack in MANET. The techniques adopted for the
identification and the following removal of malicious nodes clearly require a joint and careful design to
optimize the overall performance.
Reference
[1] B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” in Wireless Network
Security, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. New York, NY, USA: Springer, 2007, pp. 103–135.
[2] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless
Commun., vol. 11, no. 1, pp. 38–47, Feb. 2004.
[3] J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Francisco, CA, USA: Morgan
Kaufmann Publishers, Inc., 1988.
[4] D. MacKay, Information Theory, Inference and Learning Algorithms. Cambridge, U.K.: Cambridge University Press, 2003.
[5] J. Yedidia, W. Freeman, and Y. Weiss, “Constructing free-energy approximations and generalized belief propagation algorithms,”
IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2282–2312, Jul. 2005.
[6] J. Yedidia, W. Freeman, and Y. Weiss, “Understanding belief propagation and its generalizations,” in Exploring Artificial
Intelligence in the New Millennium, San Francisco, CA, USA: Elsevier, 2003.
[7] T. Schierl, S. Johansen, A. Perkis, and T. Wiegand, “Rateless scalable video coding for overlay multisource streaming in manets,” J.
Vis. Commun. Image Represent., vol. 19, no. 8, pp. 500–507, 2008.
[8] V. R. Syrotiuk, C. J. Colbourn, and S. Yellamraju, “Rateless forward error correction for topology-transparent
scheduling,”IEEE/ACM Trans. Netw., vol. 16, no. 2, pp. 464–472, Apr. 2008.
[9] S. Agrawal and D. Boneh, “Homomorphic MACs: MAC-based integrity for network coding,” in Applied Cryptography and
Network Security. Berlin, Germany: Springer, 2009, pp. 292–305.
[10] J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless
mesh networks,” in Proc. 2nd ACM Conf. WiSec, Zurich, Switzerland, 2009, pp. 111–122.
[11] Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, “Ripple authentication for network coding,” in Proc. IEEE INFOCOM, San Diego,
CA, USA, 2010, pp. 1–9.
[12] A. Newell and C. Nita-Rotaru, “Split null keys: A null space based defense for pollution attacks in wireless network coding,” in
Proc. 9th IEEE SECON, Seoul, Korea, 2012, pp. 479–487.
[13] Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, “MIS: Malicious nodes identification scheme in network-coding-based peer-topeer
streaming,” in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1–5.
[14] R. Gaeta, M. Grangetto, and R. Loti, “SIEVE: A distributed, accurate, and robust technique to identify malicious nodes in data
dissemination on manet,” in Proc. IEEE ICPADS, Washington, DC, USA, 2012, pp. 331–338.
[15] M. Luby, “LT codes,” in Proc. 43rd FOCS, Washington, DC, USA, 2002, pp. 271–280.
[16] R. Gallager, Low-Density Parity-Check Codes. Cambridge, U.K.: MIT Press, 1963.
[17] W. T. Freeman, E. C. Pasztor, and O. T. Carmichael, “Learning low-level vision,” Int. J. Comput. Vis., vol. 40, no. 1, pp. 25–47,
2000.
[18] M. Luby, M. Mitzenmacher, M. Shokrollahi, and D. Spielman, “Improved low-density parity-check codes using irregular graphs,”
IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 585 –598, Feb. 2001.
[19] G. F. Riley and T. R. Henderson, “The NS-3 network simulator,” in Modeling and Tools for Network Simulation. Berlin,
Germany:Springer, 2010, pp. 15–34.
[20] M. N. Krohn, M. J. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content
distribution,”in Proc. IEEE Symp. Security Privacy, 2004.
[21] C. Gkantsidis and P. Rodriguez, “Cooperative security for network coding file distribution,” in Proc. IEEE INFOCOM, Barcelona,
Spain, 2006.
[22] E. Kehdi and B. Li, “Null keys: Limiting malicious attacks via null space properties of network coding,” in Proc. IEEE INFOCOM,
Rio de Janeiro, Brazil, 2009.
[23] Z. Yu, Y.Wei, B. Ramkumar, and Y. Guan, “An efficient scheme for securing xor network coding against pollution attacks,” in
Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
[24] T. Ho et al., “Byzantine modification detection in multicast networks with random network coding,” IEEE Trans. Inf. Theory, vol.
54, no. 6, pp. 2798–2803, Jun. 2008.

More Related Content

What's hot

“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
 
B43011014
B43011014B43011014
B43011014
IJERA Editor
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
1757 1761
1757 17611757 1761
1757 1761
Editor IJARCET
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
eSAT Publishing House
 
I1086066
I1086066I1086066
I1086066
IJERD Editor
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
IJECEIAES
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 

What's hot (13)

“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
B43011014
B43011014B43011014
B43011014
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
1757 1761
1757 17611757 1761
1757 1761
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
I1086066
I1086066I1086066
I1086066
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 

Viewers also liked

B017660813
B017660813B017660813
B017660813
IOSR Journals
 
D012661723
D012661723D012661723
D012661723
IOSR Journals
 
A012310103
A012310103A012310103
A012310103
IOSR Journals
 
E1103043235
E1103043235E1103043235
E1103043235
IOSR Journals
 
B012330714
B012330714B012330714
B012330714
IOSR Journals
 
H1802045666
H1802045666H1802045666
H1802045666
IOSR Journals
 
K010327983
K010327983K010327983
K010327983
IOSR Journals
 
B010221018
B010221018B010221018
B010221018
IOSR Journals
 
J017555559
J017555559J017555559
J017555559
IOSR Journals
 
I1803026164
I1803026164I1803026164
I1803026164
IOSR Journals
 
R01061127135
R01061127135R01061127135
R01061127135
IOSR Journals
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals
 
Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document Clustering
IOSR Journals
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
IOSR Journals
 
E010433640
E010433640E010433640
E010433640
IOSR Journals
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
IOSR Journals
 
B012410616
B012410616B012410616
B012410616
IOSR Journals
 
D011141925
D011141925D011141925
D011141925
IOSR Journals
 
N1102018691
N1102018691N1102018691
N1102018691
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 

Viewers also liked (20)

B017660813
B017660813B017660813
B017660813
 
D012661723
D012661723D012661723
D012661723
 
A012310103
A012310103A012310103
A012310103
 
E1103043235
E1103043235E1103043235
E1103043235
 
B012330714
B012330714B012330714
B012330714
 
H1802045666
H1802045666H1802045666
H1802045666
 
K010327983
K010327983K010327983
K010327983
 
B010221018
B010221018B010221018
B010221018
 
J017555559
J017555559J017555559
J017555559
 
I1803026164
I1803026164I1803026164
I1803026164
 
R01061127135
R01061127135R01061127135
R01061127135
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document Clustering
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
 
E010433640
E010433640E010433640
E010433640
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
 
B012410616
B012410616B012410616
B012410616
 
D011141925
D011141925D011141925
D011141925
 
N1102018691
N1102018691N1102018691
N1102018691
 
I011125160
I011125160I011125160
I011125160
 

Similar to B010120913

Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
Iaetsd Iaetsd
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
IJMER
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
IRJET Journal
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
ijsrd.com
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
ijctet
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
ijtsrd
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
Science journal
Science journalScience journal
Science journal
graphicdesigner79
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
pijans
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
ijgca
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
ijgca
 
Iss 2
Iss 2Iss 2
Iss 2
ijgca
 
Iss3
Iss3Iss3
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
IOSR Journals
 
50120140507006
5012014050700650120140507006
50120140507006
IAEME Publication
 

Similar to B010120913 (20)

Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Science journal
Science journalScience journal
Science journal
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Iss 2
Iss 2Iss 2
Iss 2
 
Iss3
Iss3Iss3
Iss3
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
50120140507006
5012014050700650120140507006
50120140507006
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

B010120913

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. II (Jan - Feb. 2015), PP 09-13 www.iosrjournals.org DOI: 10.9790/2834-10120913 www.iosrjournals.org 9 | Page Preventing Malicious Node and Provide Secure Routing In Manet R. Gayathri1 , J.Maria Sofi Anusuya2 P.G. Student, Department of Electronics and communication Engineering, Dhanalakshmi srinivasan Engineering College, perambalur, India1 Associate Professor, Department of Electronics and communication Engineering, Dhanalakshmi srinivasan Engineering College, perambalur, India2 Abstract: A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Mobile Ad-hoc Networks (MANET) are characterized by open, distributed and dynamic architectures, built on top of the shared wireless medium; all features contribute to make MANET very vulnerable to attacks at any layer of the Internet model. We consider the following problem: nodes in a MANET must separated data packet using rateless codes but some nodes are assumed to be malicious, i.e., before transmitting a coded packet they may modify its payload. Nodes receiving corrupted coded packets are prevented from correctly decoding the original chunk. We propose SIEVE, a fully distributed technique to identify malicious nodes. SIEVE is based on special messages called checks that nodes periodically transmit. A check contains the list of nodes identifiers that provided coded packets of a chunk as well as a flag to signal if the chunk has been corrupted. SIEVE operates on top of an otherwise reliable architecture and it is based on the construction of a factor graph obtained from the collected checks on which an incremental belief propagation algorithm is run to compute the probability of a node being malicious. We show that SIEVE is very accurate and robustness under several attack scenarios and deceiving actions. We also focused on decentralized networks, called MANETs, where communication between mobile nodes is purely ad-hoc based, exploit- ing rateless coding to minimize data loss due to transmission unreliability, and detecting malicious nodes sending corrupted packets to detect and prevent problem in a strongly distributed environments, using SIEVE. I. Introduction MOBILE Ad-hoc Networks (MANET) are characterized by open, distributed and dynamic architectures, built on top of the shared wireless medium; all features contribute to make MANET very vulnerable to attacks at any layer of the Internet model. We consider a particular type of active, non cryptography related attack, where insider nodes corrupt data at the application level (this is also known as pollution attack). In this paper we deem as a use case a data dissemination application over a MANET. Nodes generate data chunks to be Disseminated to all participants using rateless codes; some malicious nodes deliberately modify coded packets of a chunk before relaying them to prevent honest nodes from obtaining the original information. In this paper we propose SIEVE a decen-tralized, accurate and robust technique to identify malicious nodes on top of an Other-wise reliable and attacker free architecture. Each node in SIEVE dynamically creates a bipartite graph whose vertexes are checks and uploading nodes. A check is a report created by a node upon decoding a data chunk; a check contains a variable length list of nodes identifiers that provided parts of the data as well as a flag to signal if the data chunk has been corrupted. Detection of the compromised chunks is achieved exploiting the constraints imposed by linear channel coding. The factor graph is periodically and independently analyzed by each node running an incremental version of the Belief Propagation (BP) algorithm [3]–[6]. The proposed algorithm allows each node to compute the probability of any other node being malicious; these latter probabilities are used to derive a suspect ranking of nodes in the MANET. Each node updates its local factor graph using the checks obtained by its own decoding operations as well as checks that are periodically gossiped by neighbor nodes. 1.1 Our Contributions The major problem of the paper are the identification malicious nodes in terms of the estimation of the marginal probabilities on a bipartite graph and the proposal of a decentralized and accurate solution based on the BP algorithm. It is worth pointing out that the Selected data dissemination application is just a quite popular use case to a single scenario. In particular, SIEVE can be used in any application that uses multi-party download or collaboration, provided that is possible to detect that a given set of collaborating entities is compromised by at least one malicious node. As opposed to cryptographic/algebraic techniques proposed in the area of network coding based wireless mesh networks, e.g., [9]–[12] SIEVE does not rely on verification tools to check the integrity of every coded block. In SIEVE the BP algorithm is used to infer the identity of the malicious nodes
  • 2. Preventing Malicious Node and Provide Secure Routing In Manet DOI: 10.9790/2834-10120913 www.iosrjournals.org 10 | Page resting upon only on a simple pollution detection mechanism; as an example, in our reference scenario, pollution detection is achieved as a by product of the data dissemination protocol based on rate-less codes. Furthermore, the aforementioned solutions may not be suitable for MANET since mobility is likely to affect key pre distribution, routing mechanisms, attack behavior, etc. SIEVE fits well two key MANETs features that must be accounted for when devising any security solution: it is fully decentralized and does not rely on any infra- structure (as opposed to some solutions in the area of peer-to-peer streaming where special well known nodes are necessary,e.g., [13]). Furthermore, SIEVE requires small computational, storage, and communication costs for implementation. II. Sieve In this paper we consider a MANET created a N wireless nodes moving in a given area. A set of Nsource nodes periodically produces a new data packet to be disseminated to all others once every h seconds. All nodes cooperate to the diffusion of the data chunks by running a distributed dissemination algorithm based on Luby Transform (LT) codes [15]. Data is transmitted by source nodes using LT codes [15]: a packet is divided in K equally sized blocks. The source node then creates and forwards coded packets using LT codes [15], combining random subsets of the K blocks; the size of each coded packet is Scb = S/K. 2.1 LT Encoding And Decoding Process LT codes have been proposed in [15] this paper is a rateless codes: these are a particular family of erasure codes where the rate is not fixed by design, so that the number of coded packets can be decided and changed on the fly. LT codes are rateless based on the binary Galois field GF(2). In [15] it is shown that selecting the number of blocks to be combined, termed as the packet degree d, according to the Robust Soliton Distribution (RSD), one gets optimal asymptotic decoding performance. By optimal performance we mean that the so called decoding overhead, i.e. the number of coded packets to be received in excess of K, turns to be negligible for asymptotically large K. In particular, the original chunk can be obtained by any node able to collect any set of M = K · (1 + ) coded packets. The decoding algorithm can be viewed as the solution of a system of linear equations with K unknowns (the K original data blocks) and M ≥ K equations. In [15] it is shown that a simple method based on the recursive cancellation of equations corresponding to packets with degree 1, i.e. representing one original data blocks, guarantees the desired asymptotic performance. 2.2 LT Dissemination Protocol The rateless principle and randomness of LT codes is used for spreading data in the MANET by letting source nodes transmit novel coded packets that can be gene-rated randomly and on the fly. A coded packet conveys the XOR payloads of the corresponding original packets as well as a header signaling the indexes of the combined packets. The original chunk can be obtained by any node able to collect any set of K · (1 + ) coded packets without requiring any coordination among the source nodes. mobile nodes Desination SIEVE Performance Analysis Data Transmission Mobile Adhoc Network Attack Detection Prevention Pollution Attack Fig 1.1 SIEVE preventing malicious node. Fig 1.1 ,if the source node can transmitted the data from source to destination throught. SIEVE. SIEVE using LT code to prevent data from malicious node.It can mainly identify malicious node produces pollution attack.
  • 3. Preventing Malicious Node and Provide Secure Routing In Manet DOI: 10.9790/2834-10120913 www.iosrjournals.org 11 | Page 2.3 Malicious Nodes The proposed dissemination protocol is an example of a distributed and collaborative approach that has the potential to simplify and accelerate the spreading of the information in the MANET thanks to node mobility. On the other hand, few malicious nodes may try to break the system by polluting, i.e. modifying some coded packets. In this paper we assume that a subset of P N nodes is composed of malicious nodes, That deliberately modify the payload of the coded packets to prevent honest nodes from correctly reconstructing the original chunk. In the presence of coding even a single corrupted coded packet can prevent an honest node from decoding the original chunk. III. POLLUTION IDENTIFICATION PROTOCOL SIEVE uses LT codes decoding scheme to detect changed packet and exploits the Belief Propagation (BP) algorithm [3] to identify malicious nodes. 3.1 LT codes Verification The every node keeps collecting from different uploaders sets of coded blocks corresponding to different chunks. LT codes can be exploited to detect if modified blocks have been collected without the need of any supplementary verification mechanism. Indeed, a node is able to detect pollution as soon as an inconsistency is found in the solution of the underlying system of linear equations. This is achieved by observing that a coded packet with a degree 1 equation represents a data packet in the clear. Such data packet can be simplified from all the incoming equations. Since LT codes have a certain overhead some coded packets that are linearly dependent on the ones received previously are always collected before successful decoding; this amount to the reception of some equations whose terms are all already known. As soon as this condition is met the LT decoder can check the consistency of the payload carried by the coded packet; in other words, the same linear combination must be obtained combining a set of already known packets. If this constraint is violated the whole chunk is recognized as corrupted. Please note that the receiver node is not able to identify the corrupted block(s) but only that at least one of them has been maliciously manipulated. 3.2 Check Construction and Reporting SIEVE is based on the concept of checks that are reports created by nodes upon decoding a chunk. A check contains the list of the identifiers of nodes that provided coded blocks of a chunk and a flag to label such chunk as corrupted or not. A check describing a corrupted chunk is called a positive check while it is termed a negative check otherwise. Each nodes n maintains a list of all checks created that is denoted as Ln. Each node, besides accumulating the checks from its local decoding operations, gossips them in the neighborhood. 3.3 performance analysis Sieve can be identified three main performance analysis as shown in the graph. The mainly consider the three performance such as throughput, packet delivery ratio and end to end delay. 3.4 Average End To End Delay Fig 1.2 shows the accurately identify the performance analysis of average end to end delay Fig 1.2 Average End To End Delay
  • 4. Preventing Malicious Node and Provide Secure Routing In Manet DOI: 10.9790/2834-10120913 www.iosrjournals.org 12 | Page 3.5 packet delivery ratio Fig 1.3 shows the accurately identify the performance analysis of packet delivery ratio Fig 1.3 Packet Delivery Ratio 3.6 THROUGHPUT RATIO FIG 1.4 shows the accurately identify the performance analysis of throughput ratio Fig 1.4 throughput ratio IV. Results The simulation methodology and the indexes we defined to evaluate the accuracy, reactivity, and robustness of SIEVE. In particular, we show the packet delivery ratio, average end to end delay and throughput ratio of the factor graph and mobility impact the performance of SIEVE as well as how robust it is with respect to several deceiving actions operated by malicious nodes. Finally, we show a trade-off between coding efficiency and SIEVE accuracy. V. Conclusion In this we used sieve technique to accurately identified the malicious node. The malicious node produces pollution attack to a original packet. A data can be separated application based on LT code. Fortunately, the LT decoding procedure can be used by each node to detect that a data chuck has been attacked; nonetheless, since parallel downloading form multiple nodes is used, such detection does not allow to identify the malicious nodes. This latter represents the core problem solved by SIEVE. In SIEVE node collaborations are
  • 5. Preventing Malicious Node and Provide Secure Routing In Manet DOI: 10.9790/2834-10120913 www.iosrjournals.org 13 | Page represented by a bipartite graph linking nodes and detection opportunities, the checks. It is worth pointing out that such representation is quite general and can be used in many other collaborative scenarios other than the data dissemination use case analyzed in this paper. Future works will be focused in two main directions. From the one hand we will complete the design and experimentation of a full system to counteract an active attack in MANET. The techniques adopted for the identification and the following removal of malicious nodes clearly require a joint and careful design to optimize the overall performance. Reference [1] B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” in Wireless Network Security, Y. Xiao, X. S. Shen, and D.-Z. Du, Eds. New York, NY, USA: Springer, 2007, pp. 103–135. [2] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Commun., vol. 11, no. 1, pp. 38–47, Feb. 2004. [3] J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Francisco, CA, USA: Morgan Kaufmann Publishers, Inc., 1988. [4] D. MacKay, Information Theory, Inference and Learning Algorithms. Cambridge, U.K.: Cambridge University Press, 2003. [5] J. Yedidia, W. Freeman, and Y. Weiss, “Constructing free-energy approximations and generalized belief propagation algorithms,” IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2282–2312, Jul. 2005. [6] J. Yedidia, W. Freeman, and Y. Weiss, “Understanding belief propagation and its generalizations,” in Exploring Artificial Intelligence in the New Millennium, San Francisco, CA, USA: Elsevier, 2003. [7] T. Schierl, S. Johansen, A. Perkis, and T. Wiegand, “Rateless scalable video coding for overlay multisource streaming in manets,” J. Vis. Commun. Image Represent., vol. 19, no. 8, pp. 500–507, 2008. [8] V. R. Syrotiuk, C. J. Colbourn, and S. Yellamraju, “Rateless forward error correction for topology-transparent scheduling,”IEEE/ACM Trans. Netw., vol. 16, no. 2, pp. 464–472, Apr. 2008. [9] S. Agrawal and D. Boneh, “Homomorphic MACs: MAC-based integrity for network coding,” in Applied Cryptography and Network Security. Berlin, Germany: Springer, 2009, pp. 292–305. [10] J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks,” in Proc. 2nd ACM Conf. WiSec, Zurich, Switzerland, 2009, pp. 111–122. [11] Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, “Ripple authentication for network coding,” in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1–9. [12] A. Newell and C. Nita-Rotaru, “Split null keys: A null space based defense for pollution attacks in wireless network coding,” in Proc. 9th IEEE SECON, Seoul, Korea, 2012, pp. 479–487. [13] Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, “MIS: Malicious nodes identification scheme in network-coding-based peer-topeer streaming,” in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1–5. [14] R. Gaeta, M. Grangetto, and R. Loti, “SIEVE: A distributed, accurate, and robust technique to identify malicious nodes in data dissemination on manet,” in Proc. IEEE ICPADS, Washington, DC, USA, 2012, pp. 331–338. [15] M. Luby, “LT codes,” in Proc. 43rd FOCS, Washington, DC, USA, 2002, pp. 271–280. [16] R. Gallager, Low-Density Parity-Check Codes. Cambridge, U.K.: MIT Press, 1963. [17] W. T. Freeman, E. C. Pasztor, and O. T. Carmichael, “Learning low-level vision,” Int. J. Comput. Vis., vol. 40, no. 1, pp. 25–47, 2000. [18] M. Luby, M. Mitzenmacher, M. Shokrollahi, and D. Spielman, “Improved low-density parity-check codes using irregular graphs,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 585 –598, Feb. 2001. [19] G. F. Riley and T. R. Henderson, “The NS-3 network simulator,” in Modeling and Tools for Network Simulation. Berlin, Germany:Springer, 2010, pp. 15–34. [20] M. N. Krohn, M. J. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content distribution,”in Proc. IEEE Symp. Security Privacy, 2004. [21] C. Gkantsidis and P. Rodriguez, “Cooperative security for network coding file distribution,” in Proc. IEEE INFOCOM, Barcelona, Spain, 2006. [22] E. Kehdi and B. Li, “Null keys: Limiting malicious attacks via null space properties of network coding,” in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009. [23] Z. Yu, Y.Wei, B. Ramkumar, and Y. Guan, “An efficient scheme for securing xor network coding against pollution attacks,” in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009. [24] T. Ho et al., “Byzantine modification detection in multicast networks with random network coding,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2798–2803, Jun. 2008.