This document summarizes a proposed behavioral model to detect anomalous attacks in packet transmission in wireless networks. The model aims to identify packet droppers and modifiers by having nodes monitor their neighbors' forwarding behaviors over time. A tree-based routing structure is used, where each packet is marked as it travels toward the sink node. The marks provide information to help the sink node determine which nodes are misbehaving. The proposed scheme aims to gradually identify bad nodes through statistical analysis of their behaviors across different network topologies over time, with low false positives. It aims to catch both packet droppers and modifiers within a single detection module.
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
This document discusses techniques for detecting malicious packet dropping in wireless ad hoc networks. It begins with an introduction to wireless ad hoc networks and the security issues they face, such as packet dropping attacks. It then reviews existing literature on detecting such attacks using techniques like reputation systems. The document proposes a new detection mechanism that calculates the auto-correlation function of packet loss bitmaps to identify correlations between lost packets and determine if packet dropping is intentional. It describes the key phases of this approach, including key generation, auditing suspected nodes, and detecting malicious nodes. Finally, it discusses using randomized routing to mitigate the effects of detected packet dropping attacks.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
The document proposes a new broadcasting algorithm called Y-Hamiltonian Layers Broadcast (Y-HLB) for wormhole-routed 3D mesh networks. It divides the 3D mesh into layers that are modeled as Hamiltonian paths. The Y-HLB algorithm routes messages along these Hamiltonian paths in an efficient manner to broadcast to all nodes. Previous related work on broadcasting algorithms for wormhole-routed 3D meshes are also discussed, including how they divide the network and route messages. Simulation results show Y-HLB performs better than these previous algorithms in terms of reducing broadcast latency.
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
In Wireless Sensor Networks (WSNs), all the nodes selected for packet routing must be trustworthy, and at the same time energetic too. Smooth conservation of nodes energies and the trust levels, are an important issues in WSN because they directly affects the life span and reliability of the nodes as well as the entire network. The energy utilization at every node must be very smooth and at the same time, packets should be forwarded via trusted nodes only. In this paper, we propose an Energy Efficient Link State Routing Protocol (EELSRP) using the potential nodes selected by applying the fuzzy logic on the trust and residual energy levels. This routing protocol finds the best route by balancing the nodesresidual energies and trust levels, and protects the WSN against routing attacks by eliminating the untrusted nodes before the creation of route.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
This document discusses techniques for detecting malicious packet dropping in wireless ad hoc networks. It begins with an introduction to wireless ad hoc networks and the security issues they face, such as packet dropping attacks. It then reviews existing literature on detecting such attacks using techniques like reputation systems. The document proposes a new detection mechanism that calculates the auto-correlation function of packet loss bitmaps to identify correlations between lost packets and determine if packet dropping is intentional. It describes the key phases of this approach, including key generation, auditing suspected nodes, and detecting malicious nodes. Finally, it discusses using randomized routing to mitigate the effects of detected packet dropping attacks.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
The document proposes a new broadcasting algorithm called Y-Hamiltonian Layers Broadcast (Y-HLB) for wormhole-routed 3D mesh networks. It divides the 3D mesh into layers that are modeled as Hamiltonian paths. The Y-HLB algorithm routes messages along these Hamiltonian paths in an efficient manner to broadcast to all nodes. Previous related work on broadcasting algorithms for wormhole-routed 3D meshes are also discussed, including how they divide the network and route messages. Simulation results show Y-HLB performs better than these previous algorithms in terms of reducing broadcast latency.
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
In Wireless Sensor Networks (WSNs), all the nodes selected for packet routing must be trustworthy, and at the same time energetic too. Smooth conservation of nodes energies and the trust levels, are an important issues in WSN because they directly affects the life span and reliability of the nodes as well as the entire network. The energy utilization at every node must be very smooth and at the same time, packets should be forwarded via trusted nodes only. In this paper, we propose an Energy Efficient Link State Routing Protocol (EELSRP) using the potential nodes selected by applying the fuzzy logic on the trust and residual energy levels. This routing protocol finds the best route by balancing the nodesresidual energies and trust levels, and protects the WSN against routing attacks by eliminating the untrusted nodes before the creation of route.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
The document proposes a technique to detect flooding attacks in MANETs using a multi-agent system. It begins by introducing MANETs and some of their vulnerabilities like flooding attacks. It then discusses using a multi-agent approach to both detect flooding attacks and maintain network resilience by identifying malicious nodes and using alternative routes. The paper presents an algorithm to optimally determine the number of agents to launch, detect flooding in message buffers, and avoid attacks by blocking malicious nodes and removing affected routes. Simulation results show the approach improves throughput, packet delivery ratio, and reduces end-to-end delay and packet drops compared to AODV.
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
This document proposes a method called Statistical-based Detection of Blackhole and Greyhole attackers (SDBG) to detect misbehaving nodes in delay tolerant networks. SDBG can detect both individual misbehaving nodes as well as nodes that are colluding together. It works by having each node record encounter data with other nodes, including the number of messages sent and received. Individual nodes that drop many messages can be detected based on having a low message forwarding ratio. Colluding nodes can be detected because they will have sent many messages to each other to fake good behavior. The method aims to accurately detect misbehaving nodes while keeping false positives low. Extensive simulations showed it can work well across different network conditions.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
This document summarizes research on defending against flood attacks in distraction unbiased networks (DUNs). It proposes employing rate limiting, where each node has a limit on the number of packets and replicas it can generate within a time interval. It describes a distributed scheme using "claim-carry-and-check" to detect nodes that violate these rate limits. The scheme uses nodes counting packets/replicas themselves and making claims to other nodes, which then cross-check for inconsistencies. Analysis shows this approach can effectively detect attackers making inconsistent claims. Extensive simulations evaluate the effectiveness and efficiency of the proposed scheme at defending against flood attacks in DUNs.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
The document proposes iTrust, a probabilistic misbehavior detection scheme for secure routing in delay-tolerant networks (DTNs). iTrust introduces a periodically available Trusted Authority (TA) that judges nodes' behaviors based on collected routing evidence and probabilistically checks nodes. The TA models iTrust as an inspection game and sets an appropriate investigation probability to ensure security at reduced cost. Detection probability is correlated with node reputation, allowing a dynamic probability determined by user trust. Analysis and simulations show iTrust effectively and efficiently detects misbehavior.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
This document proposes a secure and distributed data discovery and dissemination protocol for wireless sensor networks called DiDrip. It addresses limitations of existing centralized protocols by allowing multiple authorized users and network owners to directly disseminate data items to sensor nodes. DiDrip provides authenticity and integrity of data items through digital signatures combined with efficient data structures. It aims to be scalable, resilient to node compromise and user collusion, and impose low overhead on resource-limited sensor nodes. The paper analyzes the security properties of DiDrip and implements it on an experimental sensor network to demonstrate its efficiency in practice.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
Comparative study of sympathetic cardiovascular parameters in overweight, nor...IOSR Journals
This study was undertaken to investigate and compare the sympathetic cardio vascular parameters in age matched overweight, underweight and normal weight school going boys in southern Odisha. 75 Boys between age group of 12-16 were subjected to study out of which 25 were overweight (BMI>25), next 25 were underweight(BMI<18.5),rest 25 were control group having normal BMI. Cold pressure test and hand grip dynamometer test were performed and blood pressure was measured during and after the tests as measures of cardiovascular parameter. Baseline SBP and MAP were significantly higher in overweight boys & lower in underweight boys. Maximum rise of SBP, DBP & MAP during hand grip dynamometer test were significantly higher in overweight boys & lower in underweight boys. Increase in SBP & MAP from their basal value during cold pressure test were significantly lower in overweight boys & higher in underweight boys. Thus it is concluded that both overweight & underweight boys have derangement of sympathetic cardiovascular function. SBP- Systolic blood pressure, DBP- Diastolic blood pressure , MAP- Mean arterial pressure
This document discusses the application of smart energy meters in the Indian energy context. It begins with an introduction to the increasing demand for electricity in India and issues like energy theft and inaccurate metering. It then discusses how smart meters can address these issues through automated meter reading and two-way communication. The key components and functioning of a smart metering system are explained, including the microcontroller program, real-time clock, communication port, and software. Finally, the document provides a case study where a smart meter is installed in a residential building to monitor parameters like voltage, current and power factor over a period of time.
The electronic band parameters calculated by the Triangular potential model f...IOSR Journals
This work reports on theoretical investigation of superlattices based on Cd1-xZnxS quantum dots
embedded in an insulating material. This system, assumed to a series of flattened cylindrical quantum dots with
a finite barrier at the boundary, is studied using the triangular potential. The electronic states and the effective
mass of 1 Γ miniband have been computed as a function of inter-quantum dot separation for different zinc
compositions. Calculations have been made for electrons, heavy holes and light holes. Results are discussed and
compared with those of the Kronig-Penney and sinusoidal potentials
This document analyzes the performance of the median filter for suppressing impulse noise from images. It applies median filtering to low, medium, and high detail images corrupted with varying densities of salt-and-pepper impulse noise from 1% to 60%. The median filter's performance is evaluated based on its edge-preserving capabilities through edge detection, subjective analysis via visual quality, and objective analysis using mean squared error, peak signal-to-noise ratio, and mean absolute error. The results show that median filtering effectively suppresses low-density impulse noise while preserving edges, though it can blur edges slightly due to uniform filtering and modify some uncorrupted pixels. Overall, the median filter performs better than linear filters for impulse noise removal from
This document presents a method for image upscaling using a fuzzy ARTMAP neural network. It begins with an introduction to image upscaling and interpolation techniques. It then provides background on ARTMAP neural networks and fuzzy logic. The proposed method uses a linear interpolation algorithm trained with an ARTMAP network. Results show the method performs better than nearest neighbor interpolation in terms of peak signal-to-noise ratio, mean squared error, and structural similarity, though not as high as bicubic interpolation. Overall, the fuzzy ARTMAP network provides an effective way to perform image upscaling with fewer artifacts than traditional methods.
This document presents a hybrid algorithm that combines Apriori Growth and FP-Split Tree algorithms for web usage mining. The algorithm has two phases: 1) It constructs an FP-Split Tree from web logs in a single pass, reducing complexity compared to FP-Tree which requires two passes. 2) It mines frequent patterns from the FP-Split Tree using an Apriori Growth approach instead of FP-Growth to avoid repeatedly recreating trees. The algorithm was tested on university website logs and showed better performance than traditional FP-Tree and Apriori methods, as it was faster at extracting frequent patterns for different support counts.
This document summarizes research on improving image classification results using neural networks. It compares common image classification methods like support vector machines (SVM) and K-nearest neighbors (KNN). It then evaluates the performance of multilayer perceptron (MLP) neural networks and radial basis function (RBF) neural networks on image classification. The document tests various configurations of MLP and RBF networks on a dataset containing 2310 images across 7 classes. It finds that a MLP network with two hidden layers of 10 neurons each achieves the best results, with an average accuracy of 98.84%. This is significantly higher than the 84.47% average accuracy of RBF networks and outperforms KNN classification as well. The research concludes that neural
The document discusses securing biometric templates when transmitted over non-secure channels by selecting partial fingerprint and iris data, encrypting it using AES with an iris hash as the key, and transmitting the encrypted data. It outlines the need to protect biometric data due to risks of identity theft if templates are compromised. Various attacks on biometric systems and methods of template protection including cryptography and cancelable biometrics are also reviewed.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
The document proposes a technique to detect flooding attacks in MANETs using a multi-agent system. It begins by introducing MANETs and some of their vulnerabilities like flooding attacks. It then discusses using a multi-agent approach to both detect flooding attacks and maintain network resilience by identifying malicious nodes and using alternative routes. The paper presents an algorithm to optimally determine the number of agents to launch, detect flooding in message buffers, and avoid attacks by blocking malicious nodes and removing affected routes. Simulation results show the approach improves throughput, packet delivery ratio, and reduces end-to-end delay and packet drops compared to AODV.
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
This document proposes a method called Statistical-based Detection of Blackhole and Greyhole attackers (SDBG) to detect misbehaving nodes in delay tolerant networks. SDBG can detect both individual misbehaving nodes as well as nodes that are colluding together. It works by having each node record encounter data with other nodes, including the number of messages sent and received. Individual nodes that drop many messages can be detected based on having a low message forwarding ratio. Colluding nodes can be detected because they will have sent many messages to each other to fake good behavior. The method aims to accurately detect misbehaving nodes while keeping false positives low. Extensive simulations showed it can work well across different network conditions.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
This document summarizes research on defending against flood attacks in distraction unbiased networks (DUNs). It proposes employing rate limiting, where each node has a limit on the number of packets and replicas it can generate within a time interval. It describes a distributed scheme using "claim-carry-and-check" to detect nodes that violate these rate limits. The scheme uses nodes counting packets/replicas themselves and making claims to other nodes, which then cross-check for inconsistencies. Analysis shows this approach can effectively detect attackers making inconsistent claims. Extensive simulations evaluate the effectiveness and efficiency of the proposed scheme at defending against flood attacks in DUNs.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
The document proposes iTrust, a probabilistic misbehavior detection scheme for secure routing in delay-tolerant networks (DTNs). iTrust introduces a periodically available Trusted Authority (TA) that judges nodes' behaviors based on collected routing evidence and probabilistically checks nodes. The TA models iTrust as an inspection game and sets an appropriate investigation probability to ensure security at reduced cost. Detection probability is correlated with node reputation, allowing a dynamic probability determined by user trust. Analysis and simulations show iTrust effectively and efficiently detects misbehavior.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
This document proposes a secure and distributed data discovery and dissemination protocol for wireless sensor networks called DiDrip. It addresses limitations of existing centralized protocols by allowing multiple authorized users and network owners to directly disseminate data items to sensor nodes. DiDrip provides authenticity and integrity of data items through digital signatures combined with efficient data structures. It aims to be scalable, resilient to node compromise and user collusion, and impose low overhead on resource-limited sensor nodes. The paper analyzes the security properties of DiDrip and implements it on an experimental sensor network to demonstrate its efficiency in practice.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
Comparative study of sympathetic cardiovascular parameters in overweight, nor...IOSR Journals
This study was undertaken to investigate and compare the sympathetic cardio vascular parameters in age matched overweight, underweight and normal weight school going boys in southern Odisha. 75 Boys between age group of 12-16 were subjected to study out of which 25 were overweight (BMI>25), next 25 were underweight(BMI<18.5),rest 25 were control group having normal BMI. Cold pressure test and hand grip dynamometer test were performed and blood pressure was measured during and after the tests as measures of cardiovascular parameter. Baseline SBP and MAP were significantly higher in overweight boys & lower in underweight boys. Maximum rise of SBP, DBP & MAP during hand grip dynamometer test were significantly higher in overweight boys & lower in underweight boys. Increase in SBP & MAP from their basal value during cold pressure test were significantly lower in overweight boys & higher in underweight boys. Thus it is concluded that both overweight & underweight boys have derangement of sympathetic cardiovascular function. SBP- Systolic blood pressure, DBP- Diastolic blood pressure , MAP- Mean arterial pressure
This document discusses the application of smart energy meters in the Indian energy context. It begins with an introduction to the increasing demand for electricity in India and issues like energy theft and inaccurate metering. It then discusses how smart meters can address these issues through automated meter reading and two-way communication. The key components and functioning of a smart metering system are explained, including the microcontroller program, real-time clock, communication port, and software. Finally, the document provides a case study where a smart meter is installed in a residential building to monitor parameters like voltage, current and power factor over a period of time.
The electronic band parameters calculated by the Triangular potential model f...IOSR Journals
This work reports on theoretical investigation of superlattices based on Cd1-xZnxS quantum dots
embedded in an insulating material. This system, assumed to a series of flattened cylindrical quantum dots with
a finite barrier at the boundary, is studied using the triangular potential. The electronic states and the effective
mass of 1 Γ miniband have been computed as a function of inter-quantum dot separation for different zinc
compositions. Calculations have been made for electrons, heavy holes and light holes. Results are discussed and
compared with those of the Kronig-Penney and sinusoidal potentials
This document analyzes the performance of the median filter for suppressing impulse noise from images. It applies median filtering to low, medium, and high detail images corrupted with varying densities of salt-and-pepper impulse noise from 1% to 60%. The median filter's performance is evaluated based on its edge-preserving capabilities through edge detection, subjective analysis via visual quality, and objective analysis using mean squared error, peak signal-to-noise ratio, and mean absolute error. The results show that median filtering effectively suppresses low-density impulse noise while preserving edges, though it can blur edges slightly due to uniform filtering and modify some uncorrupted pixels. Overall, the median filter performs better than linear filters for impulse noise removal from
This document presents a method for image upscaling using a fuzzy ARTMAP neural network. It begins with an introduction to image upscaling and interpolation techniques. It then provides background on ARTMAP neural networks and fuzzy logic. The proposed method uses a linear interpolation algorithm trained with an ARTMAP network. Results show the method performs better than nearest neighbor interpolation in terms of peak signal-to-noise ratio, mean squared error, and structural similarity, though not as high as bicubic interpolation. Overall, the fuzzy ARTMAP network provides an effective way to perform image upscaling with fewer artifacts than traditional methods.
This document presents a hybrid algorithm that combines Apriori Growth and FP-Split Tree algorithms for web usage mining. The algorithm has two phases: 1) It constructs an FP-Split Tree from web logs in a single pass, reducing complexity compared to FP-Tree which requires two passes. 2) It mines frequent patterns from the FP-Split Tree using an Apriori Growth approach instead of FP-Growth to avoid repeatedly recreating trees. The algorithm was tested on university website logs and showed better performance than traditional FP-Tree and Apriori methods, as it was faster at extracting frequent patterns for different support counts.
This document summarizes research on improving image classification results using neural networks. It compares common image classification methods like support vector machines (SVM) and K-nearest neighbors (KNN). It then evaluates the performance of multilayer perceptron (MLP) neural networks and radial basis function (RBF) neural networks on image classification. The document tests various configurations of MLP and RBF networks on a dataset containing 2310 images across 7 classes. It finds that a MLP network with two hidden layers of 10 neurons each achieves the best results, with an average accuracy of 98.84%. This is significantly higher than the 84.47% average accuracy of RBF networks and outperforms KNN classification as well. The research concludes that neural
The document discusses securing biometric templates when transmitted over non-secure channels by selecting partial fingerprint and iris data, encrypting it using AES with an iris hash as the key, and transmitting the encrypted data. It outlines the need to protect biometric data due to risks of identity theft if templates are compromised. Various attacks on biometric systems and methods of template protection including cryptography and cancelable biometrics are also reviewed.
This document summarizes a survey on multiple patient data semantic conflicts and methods of electronically exchanging data. It discusses how heterogeneous healthcare systems can have different data formats, terminology, and semantics, leading to conflicts. It reviews literature on standardizing data using controlled terminologies and archetypes. Methods for resolving semantic conflicts include ontology mapping and mediation between standards like HL7 Version 2 and 3. Semantic conflicts can occur at the data or schema level and involve issues like naming inconsistencies or representing the same concept differently.
The document discusses vulnerabilities in the Border Gateway Protocol (BGP) and proposes solutions to secure BGP. It begins by providing an overview of BGP, describing how it exchanges routing information but lacks security mechanisms. This makes it vulnerable to attacks like prefix hijacking. The document then proposes using X.509 certificates to authenticate BGP speakers and their address spaces. It also suggests applying IPsec to secure communications. The proposed solution authenticates BGP speakers by verifying certificates before establishing sessions, aiming to overcome BGP vulnerabilities with low computational cost.
This document discusses power transformer differential relay inrush restraint setting applications. It describes how differential relays use harmonic restraint to block tripping during transformer energization due to magnetizing inrush currents, which contain high levels of second harmonic current. The document outlines criteria for setting transformer differential relays, including using 15% of the second harmonic and 35% of the fifth harmonic for the inrush restraint current setting. It also describes simulating a power transformer system using software to examine harmonic levels and achieve suitable inrush restraint settings. The settings provide fast fault clearing while properly restraining for inrush events.
This document describes a virtual mouse system that uses computer vision and color tracking to replace a conventional mouse. The system tracks colored objects like a red or blue object held in the user's hand to map hand movements to mouse movements and clicks. It analyzes image frames from a webcam to detect pixel colors and scale the detected positions to match screen coordinates. This allows for freer motion than a physical mouse and reduces costs compared to alternatives like touchscreens. The system is implemented using OpenCV for image processing and runs entirely in software on the user's computer.
This document describes a simulation model developed to calculate Overall Equipment Effectiveness (OEE) for a generic production line. The model takes input data from XML files generated by an optimization model that minimizes costs based on factors like work in progress inventory and machine idle time. Both crisp and fuzzy models are implemented to calculate availability, performance, quality, and overall OEE. The fuzzy model uses Mamdani inference with triangular membership functions. Simulation results in VB and Excel are presented and compared to world class standards. Goal seek and scenario manager tools are used to determine input parameter changes needed to meet standards. The model provides a way to evaluate a production line's efficiency and identify areas for improvement.
This document summarizes an experimental study that used the Taguchi method to optimize the parameters of a single cylinder diesel engine operating on blends of jatropha biodiesel and diesel fuel. The parameters investigated were load, compression ratio, and blend proportion. The goal was to minimize brake specific fuel consumption (BSFC). The results of the Taguchi experiment identified that a 0% biodiesel blend, 18 compression ratio, and 10kg load produced the lowest BSFC. Engine load had the greatest influence on performance, while blend proportion had the least influence. A confirmation experiment using the optimal settings showed results close to predicted values.
This document describes a software called SSLCASoft that was developed to assess the environmental impact indicators of engineering products at the design stage using life cycle assessment (LCA). The software can handle both single entity and multi-entity engineering products. It calculates impact indicators for 13 impact categories and presents the results graphically. The software has four modules: data input, life cycle inventory, inventory filtration, and impact assessment. It allows users to input product data, materials, processes, and performs inventory processing, characterization, and impact evaluation to assess a product's environmental impacts. The document provides an overview of the software's structure and capabilities.
The document discusses the concept and working of a six-stroke internal combustion engine. A six-stroke engine generates power twice per cycle by adding two additional strokes to the traditional four-stroke cycle. This results in higher efficiency and lower fuel consumption compared to four-stroke engines. The six-stroke cycle includes intake, compression, power, exhaust, and two additional strokes where heated air is used to generate a second power stroke. Major inventors who developed six-stroke engines include Malcolm Beare, Bruce Crower, and Velozeta. The advantages are increased efficiency and reduced emissions, but disadvantages include increased complexity and cost.
In-vivo anthelmintic evaluation of a processed herbal drug from Entada leptos...IOSR Journals
The document describes an in vivo study that evaluated the anthelmintic activity of a processed herbal drug from Entada leptostachya and Prosopis juliflora against gastrointestinal nematodes in sheep. The herbal drug showed maximum egg count reduction of 80.95% at a dose of 250 mg/kg body weight on day 11 post-treatment. Phytochemical analysis revealed the presence of compounds including alkaloids, steroids, phenolic compounds, tannins and flavonoids that may contribute to the anthelmintic effects. The study suggests the herbal drug has comparable anthelmintic activity to the conventional drug levamisole and could be used as an alternative de
“Recurrent Lower Abdomen Pain, An Introspection.”IOSR Journals
Abstract: Introduction: Recurrent Pain Lower Abdomen, („RLAP‟), With/Without Previous Appendecectomy & Or Other Surgeries, Comprise Large No. Of Patients Being Treated Indiscriminately For Years, Without Proper Diagnosis. Aims/Objctive: The Several Variable Aetio-Pathogenesis Factors & Management Modalities, In Different Age, Sex,Occupational,Socio-Economic,Geographical Group Patients, „RLAP‟Studied Under Broad Categorization Of,Post- Appendecectomy Cases(Or Other Surgery);Group „A‟ & Without Prior Appendecectomy(Surgery); Group „B‟. Methods: The Comparative Statistical Analysis Of More Than 2500 Cases Of „RLAP-A &B‟, By Meticulous Methodological Discrete Cauasative Factor Diagnosis & Needed Specific Management. Beside Routine Causes Included Obscured But Definitely Causative Clinical Entities:Ileo-Caecal Lesions; Angulations Acute, Obstuse Etc, Caused By Appendicular Stump ? Invagination Leading To Anatomico-Functional Changes, ,Stump Appendicitis, Appedicular Lump Formation Stages, Especially „Catarrhal Appendicitis‟ Maeckel‟s & Other Diverticular Disease Variants, Invaginated Diverticulum Etc, Mobile Caecum,Recurrent Sigmoid Volulus, Adhesions, N. Root Radiculopathy Symptoms & Others. Results: The Discrete Causative Lesion Dx & AppropriateTreatment Plan (Curetive & Or Maximally Palliative), With Secured Sincere Compliance,Formed The Basic Fundamentals For Overall Better Result Outcomes. Conclusion: The Study, Is An Attempt Towards Overall Management Guide-Lines Plan For A Very Common Clinical Dilemma, To Secure Overall Disease Symptom Free Life.
Bryophyllum Pinnatum: A Potential Attenuator of Cadmium-Induced Oxidative Str...IOSR Journals
Cadmium has been famously implicated in the stimulation of free radical production in biosystems resulting in oxidative deterioration of lipids, proteins and DNA, and initiating various pathological conditions in humans and animals. This study therefore, examined the antidotal and ameliorative capacity of crude ethanolic extract of Bryophyllum pinnatum on cadmium-induced oxidative stress using rabbit models. A total of fifteen rabbits (1.30±0.05kg) were used for the study. After two weeks of acclimatization, the rabbits were randomly rifted into three experimental groups- (N, CD & CB) with five animals per group. The control group (N) was injected normal saline intraperitoneally (3mg/kg body weight) and the test groups (CD & CB) were administered cadmium once daily by subcutaneous injection (3mg/kg body weight). The ethanolic extract of the plant was orally administered once daily at a dose of 100mg/kg body weight. The oxidative and antioxidative stress parameters were assessed in tissues. The results showed significant difference (p˂ 0.05)in treated groups relative to the control group with the exception of glutathione peroxidase activity in leg muscles. Therefore, the results obtained in this study confirmed the potency of the plant to annihilate cadmium toxicity in animals
Soil-transmitted helminth infections in relation to the knowledge and practic...IOSR Journals
The relationship between soil-transmitted helminth infections and the knowledge and practice of preventive measures among school children in rural communities in Igbo-Eze South Local Government Area of Enugu State, South-Eastern Nigeria, was investigated. Stool samples were obtained from 1,296 school children (ages 4 – 15 years) from six schools randomly selected from the study area. Structured epidemiological questionnaires were administered to the children. Out of 1,296 school children examined, 106 (8.1 %) of the children were infected by soil-transmitted infections thus: 64 (4.9 %) with Ascarislumbricoides, 33 (2.5 %) with hookworm, and 9 (0.7 %) with Trichuristrichiura. There were significant differences in the prevalence of these infections (P < 0.05). Soil-transmitted helminth infections showed statistically significant (P < 0.05) relationships with knowledge and practice of preventive measures among school children in the study area. The study revealed that soil-transmitted helminth infections were abundant among school children of the study area, indicating the necessity of implementing control measures such as chemotherapy, provision of adequate sanitary facilities and safe drinking water.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
This summary provides the key details about the document in 3 sentences:
The document presents a technique to detect nodes that selectively drop or modify packets in wireless sensor networks. It proposes using a triple key distribution method where any three consecutive nodes on a routing path secure communications with each other. Simulation results showed that the proposed triple key method efficiently detects malicious nodes and identifies attacks earlier than some recently proposed approaches.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
This summarizes an academic paper that proposes an efficient and active data delivery method for highly dynamic mobile ad hoc networks. It introduces the Fish Eye State Routing protocol to overcome limitations of existing position-based opportunistic routing protocols. FSR uses a fisheye technique to reduce routing overhead by maintaining more accurate information about nearby nodes. It also proposes a virtual destination-based void handling scheme to address communication breaks. The paper analyzes FSR's performance and ability to deliver data reliably and securely in large, high-mobility networks.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
This document discusses evaluating trust and reputation using uncertain reasoning in mobile ad hoc networks (MANETs). It first defines trust, reputation, and uncertain reasoning. It then discusses different routing protocols used in MANETs like AODV, OLSR, and DSR. It also discusses security attacks in MANETs and how trust and reputation models can be used to address these issues. Finally, it discusses probabilistic reasoning and Dempster-Shafer theory as ways to handle uncertainty in evaluating trust and reputation.
The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
Trust Providence in Delay Tolerant Networkstheijes
The network consists of several nodes, some nodes represents malicious and selfish behavior. This gives the heavy threat for the routing in Delay Tolerant networks(DTNs). The DTNs have unique characteristic so designing a misbehavior detection scheme is very difficult. The probabilistic misbehavior detection scheme that is iTrust, is established for secure routing in DTN. The iTrust introduces a Trusted Authority (TA) for detecting the node’s behavior. By collecting the routing evidences from the nodes the TA checks the node about its behavior then performs the appropriate actions for the behavior of nodes. TA gives the security of DTN routing at lower cost. The detection probability is correlated with a node’s reputation, this gives the dynamic detection probability based on the trust of users. The simulation results show that the proposed scheme is efficient for establishing trust with the DTNs.
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
A novel defence scheme against selfish Node attack in manetijcsa
This document proposes a new intrusion detection system (IDS) algorithm to defend against selfish node attacks in mobile ad hoc networks (MANETs). Selfish nodes flood the network with false information and drop packets from other nodes. The proposed IDS identifies selfish node behavior and blocks their activities. Simulation results show the IDS enhances network performance from negligible to 92% and prevents infection from attacks. The IDS is integrated with the AODV routing protocol to detect and eliminate selfish nodes within its transmission range.
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
The document describes a proposed wireless intrusion detection system and new attack model. It begins by outlining vulnerabilities in mobile wireless networks like susceptibility to eavesdropping and interfering attacks. It then discusses the need for intrusion detection as prevention measures alone are insufficient. The proposed system uses a matching algorithm to compare observed network behaviors and detect anomalies indicative of intrusions. It analyzes evidence from multiple nodes to identify intruders, multicasts intruder addresses to neighbors, and routes data along paths free of detected intruders.
Similar to Behavioral Model to Detect Anomalous Attacks in Packet Transmission (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. 1 (Jan - Feb. 2015), PP 05-14
www.iosrjournals.org
DOI: 10.9790/2834-10110514 www.iosrjournals.org 5 | Page
Behavioral Model to Detect Anomalous Attacks in Packet
Transmission
Suhasini Sodagudi, Prof. Rajasekhara Rao Kurra,
Associate Prof, Dept of IT, VRSiddharthaEngg College, Vijayawada-07, A.P
Email :ssuhasini09@gmail.com
Dean, Sri Prakash college of Engg, Tuni, Sri Prakash College of Tech., Rajahmandry, AP-533401,
Email :krr@sriprakash.org
Krr_it@yahoo.co.in
Abstract: Inside a network environment, packets is the most important in carrying data to perform
communication. Such a circumstance is easy to be attacked by an intruder and perform eavesdropping which
leads to data loss/duplication/redundancy. Comprehend speaking, packet dropping and modification are the two
common attacks that can be easily launched by an adversary to disrupt communication in multi hop networks,
specifically mobile ad hoc networks. Hence a remedial approach is proposed to compensate such attacks. A tree
based approach is designed to designate the attack in order to identify packet droppers and modifiers. In this
direction, it has been assumed that the mobile nodes continuously monitor the behaviors of the forwarding
mobile nodes which may be neighbors to determine if their neighbors are misbehaving. To address this problem,
a hierarchical method is proposed and detects malicious mobile nodes that drop or modify packets. Extensive
analysis and simulations have been conducted to study the performance of attacks with respect to efficiency of
the scheme.
Keywords: attack, intruder, behavior, packet dropping, modification
I. Introduction
In a wireless ad hoc mobile network, mobile nodes play all the characteristics which include monitor
the environment, detect events of interest, produce data, and collaborate in forwarding the data toward a sink,
which could be a gateway, base station, storage node, or querying user. Because of the ease of deployment, a
mobile ad hoc network is often deployed in a hostile environment to perform the monitoring and data collection
tasks. In such an environment, it certainly lacks physical protection and is subject to node compromise. Due to
this compromising behavior by one or multiple nodes, it is possible for an adversary to launch various attacks to
disrupt communication [1]. Among these attacks, packet dropping and modifying are the common attacks that
highly affect the communication process disruption. It is assumed that the compromised nodes perform drop or
modify operation over the packets that they are supposed to forward.
To deal with packet droppers, a widely adopted counter-measure is multipath forwarding in which
packets is forwarded along multiple redundant paths and hence packet dropping in some but not all of these
paths can be tolerated[2]. To deal with packet modifiers, most of existing countermeasures aim to filter modified
messages en-route within a certain number of hops [3]. These countermeasures can tolerate or mitigate the
packet dropping and modification attacks, but the intruders are still there and can continue attacking the network
without being caught. Packet dropping and modification attacks are tolerable by using these existing methods,
but the attackersare still there and can continue attacking the network without being caught.It has been
considered that mobile nodes continuously monitor the forwarding behaviors of their neighboring nodes to
determine their neighboring nodes behavior. In order to identify packet droppers and packet modifiers, the
existing approaches can be extended by using the reputation-based IDS mechanisms.While data is in transit,
these mechanisms helps and emphasize to detect each forwarding node is trustable or not worthy in terms of
behavior. Recently, Ye et al. proposed a probabilistic nested marking (PNM) scheme [5] with the reputation
based system. But the modified packets were not being filtered out and routed because they should be used as
evidence to infer packet modifiers; hence, it cannot be used together with existing packet filtering schemes.
In our proposal, it has been designed an effective scheme to catch both packet droppers and modifiers
within a single module. In this scheme, a routing tree rooted at the sink is first established. When data are being
transmitted along the tree structure toward the sink, each packet sender or forwarder adds a small number of
extra bits, which is called packet marks, to the packet. The format of the small packet marks is deliberately
designed such that the sink can obtain very useful information from the marks. The main advantage of this
scheme is to produce misbehavior bad nodes in a network system. A node categorization algorithmis stated to
identify nodes that are droppers/modifiers for sure or are suspicious droppers/modifiers. As the tree structure
dynamically changes every time interval, behaviors of nodes is observed in a large variety of scenarios. As the
2. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 6 | Page
information of node behaviors has been accumulated, heuristic ranking algorithm to identify most likely bad
nodes from suspiciously bad nodes. This way, most of the bad nodes can be gradually identified with small false
positive.
In a typical ad hoc network, it is clear that a large number of mobile nodes are randomly distributed in
a two dimensional area. Each node generates data periodically and all these nodes collaborate to forward packets
containing the data toward a sink. The sink is located within the network itself. Assumed that all nodes and the
sink are loosely time synchronized, this is implemented in many of the applications [6]. Attack-resilient time
synchronization schemes, which have been widely investigated in wireless networks, are employed. The sink is
aware of the network topology, which can be achieved by requiring nodes to report their neighboring nodes
right after preparation [7].
It is observed that the network sink is trustworthy and free of compromise. Therefore, the adversary
cannot successfully compromise regular nodes during the short topology establishment phase once the network
is positioned. This assumption has been widely used in existing work [8]. After then, the regular nodes can be
made as compromised. Compromised nodes may or may not collude with each other. A compromised node can
launch the following two attacks.
Packet dropping: A compromised node drops all or some of the packets that is supposed to forward. It may
also drop the data generated by itself for some malicious purpose such as framing innocent nodes.
Packet modification: A compromised node modifies all or some of the packets that is supposed to forward.
It may also modify the data it generates to protect itself from being identified or to accuse other nodes.
II. Literature Survey
Two techniques exist to improve throughputin any network system that agreeto forward packets in
between the nodes in the presence of bad nodes. Such problems are proposed with categorization techniques
based upon the nodes dynamically measured behavior [3]. The existing system implemented like a watchdogto
identify misbehaving nodes including a path raterthat helps routing protocols in avoiding such nodes. Through
simulation the watchdog evaluations are done. The path rater is implemented using packet throughput,
percentageof overhead (routing) transmissions, and the accuracy ofmisbehaving node detection [2]. When used
together in a networkwith moderate mobility, the two techniques increasethroughput by 17% in the presence of
40% misbehavingnodes, while increasing the percentage of overhead transmissionsfrom the standard routing
protocol's 9% to 17%. Duringextreme mobility, watchdog and path rater can increasenetwork throughput by
27%, while increasing the overheadtransmissions from the standard routing protocol's 12% to24% [4].
Local monitoring has been demonstrated as a powerfultechnique for mitigating security attacks in
multi-hop networks. In this system, nodes overhear partial neighborhoodcommunication to detect misbehavior
such as packet drop or delay.However, local monitoring as presented in the literature isvulnerable to a class of
attacks that we introduce here calledstealthy packet dropping. Stealthy packet dropping disrupts thepacket from
reaching the destination by malicious behavior at anintermediate node [3]. However, the malicious node gives
theimpression to its neighbors that it performed the legitimateforwarding action. Moreover, a legitimate node
comes under suspicion. Four ways are used to achieve stealthy packetdropping, none of which is currently
detectable. A protocol called MISPAR based on local monitoring is used to remedy eachattack. It presents two
techniques – having the neighbors maintainadditional information about the routing path, and adding
somechecking responsibility to each neighbor.
False data injection is a severe attack that compromised nodes moles can launch. These moles inject
large amount of bogus traffic that can lead to application failures and exhausted network resources. Existing
network security proposals only passively mitigate the damage by filtering injected packets; they do not provide
active means for fight back. Here specify that how to locate such moles within the framework of packet
marking, when forwarding moles collude with source moles to manipulate the marks. Existing Internet trace
back mechanisms do not assume compromised forwarding nodes and are easily defeated by manipulated marks
[3]. It is proposed with a Probabilistic Nested Marking (PNM) scheme that is secure against such colluding
attacks. No matter how colluding moles manipulate the marks, PNM can always locate them one by one. Nested
marking is proved both sufficiently and necessarily to resist colluding attacks [5]. PNM also has fast-trace back
within about 50 packets; it can track down a mole up to 20 hops away from the sink. This virtually prevents any
effective data injection attack: moles will be caught before they have injected any meaningful amount of bogus
traffic.
Selective forwarding attacks may corrupt some missioncriticalapplications such as military surveillance
and forestfire monitoring. In these attacks, malicious nodes behavelike normal nodes in most time but
selectively dropsensitive packets, such as a packet reporting the movementof the opposing forces. Such selective
dropping is hard to detect [6]. It has been proposed that a lightweight securityscheme for detecting selective
forwarding attacks. Thedetection scheme uses a multi-hop acknowledgement techniqueto launch alarms by
obtaining responses from intermediatenodes. This scheme is efficient and reliable in thesense that an
3. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 7 | Page
intermediate node will report any abnormalpacket loss and suspect nodes to both the base station andthe source
node. To the best of knowledge, here presents a detailed scheme for detectingselective forwarding attacks in the
environment of networks. The simulation results show that even when thechannel error rate is 15%, simulating
very harsh radio conditions,the detection accuracy of the proposed scheme isover 95%.
In a large-scale network individual nodes are subject to security compromises [7]. A compromised
node caninject into the network large quantities of bogus sensing reportswhich, if undetected, would be
forwarded to the data collectionpoint (i.e. the sink). Such attacks by compromised nodes cancause not only false
alarms but also the depletion of the finiteamount of energy in a battery powered network [7]. In this paper
wepresent a Statistical En-route Filtering (SEF) mechanism that candetect and drop such false reports. SEF
requires that each sensingreport be validated by multiple keyed message authenticationcodes (MACs), each
generated by a node that detects the sameevent. As the report is forwarded, each node along the wayverifies the
correctness of the MACs probabilistically and dropsthose with invalid MACs at earliest points. The sink further
filtersout remaining false reports that escape the en-route filtering. SEFexploits the network scale to determine
the truthfulness of eachreport through collective decision-making by multiple detectingnodes and collective
false-report-detection by multiple forwardingnodes [5]. Our analysis and simulations show that, with an
overheadof 14 bytes per report, SEF is able to drop 80-90% injected falsereports by a compromised node within
10 forwarding hops, andreduce energy consumption by 50% or more in many cases [6].
III. Proposed Approach
The related work in developing the implementation standards included My Eclipse which incorporates
today's most innovative open-standard technologies (of course including the Eclipse platform) to provide a
development environment for J2EE WEB, XML, UML and databases and a wide array of application server
connectors to streamline development, preparation, testing and portability. My Eclipse is a commercial available
Java EE and Ajax IDE created and maintained by the company Genuitec, a founding member of the Eclipse
Foundation. Behavior based anomaly detection model is proposed to identify the packet droppers, modifiers
attack in a MANET. This model reflects in designing a system that consists of a network whose lifetime is
divided into rounds with virtualized nodes. Each node sends and forwards data via a routing tree which is
implicitly agreed with the sink within each round. The routing tree changes in each round. After the sink has
received the packet lists from all nodes, it sends out a message to announce the start of the first round, and the
message is forwarded hop by hop to all nodes in the network. An effective scheme called ―PFMDA (Packet
Forwarding, Modifier and Droppers Attack)‖as is a part of our proposed system to catch both packet droppers
4. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 8 | Page
Figure 1. Flow diagram of PFDA system
and modifiers. In this scheme, a routing tree rooted at the sink is first established. When data are transmitted
along the tree structure toward the sink, each packet sender or forwarder adds a small number of extra bits,
which is called packet marks, to the packet. The sink can figure out the dropping ratio associated with every
node, and then runs Node categorization algorithm to identify nodes that are droppers/modifiers for sure or are
suspicious droppers/modifiers. Specifically, based on the packet marks, the sink can figure out the dropping
ratio associated with every node, and then runs node categorization algorithm to identify nodes that are
droppers/modifiers for sure or are suspicious droppers/modifiers. As the information of node behaviors has been
accumulated, the sink periodically runs Heuristic ranking algorithm to identify most likely bad nodes from
suspiciously bad nodes. This way, most of the bad nodes can be gradually identified with small false positive
[3]. In PFDA (Packet Forwarding, Modifier and Droppers Attack)‖ scheme a routing tree rooted at the sink is first
established. When data are transmitted along the tree structure toward the sink, each packet sender or forwarder adds a
small number of extra bits, which is called packet marks, to the packet.
Step 1. Take the input information from the sink node
Step 2. Implement ―Node Categorization Algorithm‖ to identify the suspicious nodes
Step3. Implement ―Heuristic ranking method‖ to confirm the node as either ―Good/Bad‖.
Step 4.Use counter measures to confirm that the packets are modified or dropped
Figure2. Algorithm steps in proposed PFDA scheme
5. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 9 | Page
The proposed scheme consists of a system initialization phase and several equal-duration rounds of
intruder identification phases.A routing tree rooted at the sink is first established. When data are transmitted
along the tree structure toward the sink, each packet sender or forwarder adds a small number of extra bits,
which is called packet marks, to the packet. The sink can figure out the dropping ratio associated with every
node, and then identify nodes t are droppers/modifiers for sure or are suspicious droppers/modifiers. Now it is
possible for the sink to have estimation on the dropping ratio. This behavior information is accumulated by the
sink periodically to identify most likely bad nodes from suspiciously bad nodes. [2]This way, most of the bad
nodes can be gradually identified with small false positive.. The system designed consists of a process with the
lifetime of the network divided into rounds with nodes. Once the sink receives the packet lists from all the
nodes, it sends out a message indicating the start of the round, is forwarded hop by hop to all nodes in the
network.
Node Categorization Algorithm - Link Configuration
In this configuration nodes are configured based on number of nodes in group. Create the network group by
connecting nodes to sink. Link configuration means connecting the nodes and intermediate nodes to the sink.
Sender Nodefunctionsinclude :
Packet Splitting- In this packet splitting sender selects the file which is to be sent. And then it split into the
number of packets based on the size for adding some bits in it.
Send Packets to Intermediate- Encrypts all the spitted packets. And then sender adds some bits to each
encrypted packets before sending that. Bit Addition for each packet is identification for sender. After
adding of bits to each packet, it sends the packets to the nearest node or intermediate node.
Intermediate Node functionsinclude :
Send Packets to Sink-At this intermediate node, the intermediate node receives Packets from the sender.
After receiving all packets from sender, it encrypts all packets again for authentication. Before sending to
sink, intermediate add some bits to each packet for node identification. After adding some bits from
intermediate, it sends all packets to the sink.
Modify or Drop-Before sending all packets to the sink, packets dropping or packets modifying may be
occur at the intermediate node.
In each round, data is transferred through the routing tree to the sink. Each packet sender adds a small
number of extra bits to the packet and also encrypts the packet. When one round finishes, based on the extra bits
carried in the received packets, the sink runs a node categorization algorithm to identify nodes that are bad &
suspiciously bad. The sink determines the dropping ratio associated with every node, and then runs Node
categorization algorithm to identify nodes that are droppers/modifiers for sure or are suspicious
droppers/modifiers.
[1]Likewise the information of node behaviors is cumulated. Now these nodes are called as ―bad
nodes‖ only by a suspicion.
Figure 3.Detailed steps in Node configuration module of PFDA scheme
Hence there is a need to prove these suspicious bad nodes as really bad nodes. From figure 2, it is clear
that the sink has collected information about node behaviors in different routing topologies. This information is
passed to heuristic method, second part in the proposed system. The algorithm shown in figure identifies bad
nodes keeping in view of the changing topologies in the MANET. For this to prove, Heuristic ranking algorithm
Step 1 : Link Configuration - nodes are configured based on the input.
Step 2 : Create the network by connecting nodes to sink.
Step 3 : Select the text file to import into the network
Step 4 : Split the file into packets and append bits in it.
Step 5 : Perform encryption for all the spitted packets.
Step 6 : Append unique packet marks to each encrypted packets before sending.
Step7: Transmit the packets to the neighboring/nearest/intermediate node.
Step 8 : Once the intermediate node receives Packets from the sender, it encrypts all packets again for
authentication.
Step 9 : Append packet marks to each packet for the purpose of node identification
Step 10: Transmit all packets to sink
6. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 10 | Page
is designed to identify most likely bad nodes from suspiciously bad nodes.[5] The algorithm depicted in figure 2
is executed by the sink since the assumption taken is that sink can never be bad node. In this manner, most of
the bad nodes are identified with small false positive.
Figure 3. Heuristic Ranking Algorithm of PFMDA
The nodes behavior is monitored to identify the anomalous activity in the network. The anomalous
behavior is found to be a point based rather than collective or contextual. Modern technology implementation using
My Eclipse is adopted. Hence, a single approach is proposed and was successful to detect three attackers within a
single structure.
The routing tree is reshaped every round. As a certain number of rounds have passed, the sink will have
collected information about node behaviors in different routing topologies. The information includes which
nodes are bad for sure, which nodes are suspiciously bad, and the nodes‘ topological relationship, the sink runs
heuristic ranking algorithms.
Step 1. Input is taken as tree T with each node ‗a‘ marked by positive or negative (depending on the number of
packets)
Step 2. Each leaf node ‗a‘ in tree does perform the following functions:
a‘s parent is denoted as b.Since the leaf node u cannot be the sink then mark the leaf node ‗a‘ as positive and its
parent node ‗b‘ as negative.Repeat the process until the node ‗b‘ is a parent node.
Step 3. Mark the parent node ‗b‘ as positive and this node is considered to be as sink.
Step 4. Since ‗b‘ becomes sink node, assume ‗a‘ as bad node & set a = bad node.
Step 5. Apply ―PFDA (Packet Forwarding, Modifier and Droppers Attack)‖method to designate the nodes a and
b suspiciously either bad /good
Figure 4. PFDA Step By Step Implementation Steps
Sink Node Functions
Verify - Sink receives all packets from the sender node, and it verifies all packets which are dropped or not.
And it also verifies the packets which are modified or not and it can identify the modifiers in the process
based on the bit identification.
Merge Packets- After receiving all packets in sink, it decrypts all packets. After the decryption if there is no
modified or dropped packets, it merge all packets. After merging, Sink can receive the original file.
Categorization and Ranking- In this Categorization and Ranking will be performed based on the node
behavior. If there is any modification or drop of packets in node it assumes negative value for modifier or
dropper.
Heuristic Ranking Algorithm is based on the number of times a node is identified as suspiciously bad
then that node is considered as a most likely bad node. [3]Thus to study the behavior of a node, it is assumed
that nodes continuously monitor the forwarding behaviors of their neighboring nodes to determine if their
behavior is anomalous.
IV. Results & Discussion
Network configuration is done with n number of nodes where n is assumed. Figure.13. shows the
output of network configuration as implemented in Java. In this network configuration, creation of network is
achieved by connecting n number of nodes. By using frames concept in java, the nodes are created. The network
group is categorized in various levels that depend on number of nodes. Here three levels are implemented.
Figure 6 and 7 shows the node configuration at levels 0 and 1 . In level 1, the network group is created by
connecting node 1 at level 0 to sink node at level 1. Socket programming concept is implemented for connection
of the two nodes. Similarly nodes are configured in further levels. Frames concept is embedded in this node
configuration. Now the hierarchical tree is plotted. Next step is to consider an input file and send it across the
root node which becomes the source of transmission which is shown in figure 8.
Step1 : Sink after receiving the packets from the sender, verifies them whether are dropped or modified or not.
Step 2 : Identify the modifiers in the process based on the bit identification.
Step 3 : Sink decrypts all packets
Step 4 : If no modified / dropped packets found then merge all packets. Else if there is any modification or drop of packets
in node it assumes negative value for modifier or dropper.
Step 5 : Sink receives the original file.
7. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 11 | Page
Figure 5. Node configuration at level 1
Figure6. Node level 0
Figure 7. Sender Node Sending The Input To Sink
8. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 12 | Page
Figure 9. Sender Node Splitting Into Packets & Then Apply Encryption
Figure 9 shows sending packets from intermediate node that is node A to sink node.Bits are added to
the packets after splitting and encrypting the data for source node identification. It means to identify that from
which node, the data is forwarded. Now the the packets are forwarded to intermediate nodewithout being
dropped. Therefore this task is completed after adding bits to the packets at intermediate node.
Figure 10.Receiver node receiving the packets at sink node
Figure 10 show that receiving packets at sink node from intermediate node after adding bits for source
identification.
Figure 11.Packet Merging at sink node
Figure 11 shows after sending packets from intermediate node A to sink node then all the packets are
merged to receive the original input text file. At this point the status of packet sent and received must be
recorded to identify the point of packet dropping or modification.
Figure 12.Packet Transmission Status
9. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 13 | Page
At every node, the status of packets sent vs dropped can be identified. It is observed that in figure 12,
one packet is dropped from four sent packets at node A. Hence node A is identified as misbehaving node.
There should be a mechanism to conclude that node A is bad. For this heuristic ranking method is applied to check
whether node A is suspiciously bad or completely bad. In this context, it is assumed that if all the packets received
at a given node without any dropping or modification then the node is assigned as ―good‖ otherwise it is said to be
―bad‖.
For instance, consider a case where a packet is being modified. This modification attack can be
concluded such that if there is any deviation in the packet content before sent and while received, then such
packets are difficult to receive the original content because bits added differs. Hence such packets are not easy
in decryption process. Hence, which ever packets are under such analogy, then it is said that packet modify
attack has taken place. Figure 13 shows that the packets are modified at node A. This is identified and node A is
thus again concluded as misbehaving node.UsingQiMacros tool, the traffic simulation is plotted from a manet
with appropriate ratio of packets sent & dropped.
This graph depicts the sent packets and the percentage of dropped packets. It conveys that when 74
packets are sent, 24 packets are found as dropped (32%). Similarly, when 112 packets are sent, 84 packets were
dropped (75%).
The proposed model is checked with existing system. The average accuracy values for proposed
system, Multi Hop Ack, PNM and watchdog are 25%,9%,7%,5% and 3% respectively. Thus the motive of
providing a better technique to catch dropped packets is achieved.
V. Conclusion
An effective scheme called as ―PFDA (packet forwarding, modifier and droppers attack)‖ is used to
detect three types of attackers, as packet forwarders, modifiers & packet droppers. It is implemented with a
hierarchical structure by establishing a routing tree. The scheme is focused towards behavioral study of the
10. Behavioral Model to Detect Anomalous Attacks in Packet Transmission
DOI: 10.9790/2834-10110514 www.iosrjournals.org 14 | Page
nodes in the network which are a part of the tree. The nodes behavior is monitored to identify the anomalous
activity in the network. The anomalous behavior is found to be a point based rather than collective or contextual.
Modern technology implementation using My Eclipse is adopted. Hence, a single approach is proposed
and was successful to detect three attackers within a single structure. The detection was found to happen at a
single point, at the time of packets in transit. Packets were encrypted before transmission and still it is observed
that the attackers are happened to be inside the network exploited their privileges in performing various
unknown attacks. It is concluded that when packets sent is increased, the ratio of dropped packets is also
increased. In this regard, the future work can be extended to study & make necessary precautions by including
some prevention methods that can deal to reduce the ratio of dropped packets & increase the ratio of sent
packets with adequate measures.
References
[1]. H. Chan and A. Perrig, ―Security and Privacy in SensorNetworks,‖ Computer, vol.36, no. 10, Oct. 2003.
[2]. C. Karlof and D. Wagner, ―Secure Routing in Wireless SensorNetworks: Attacks andcountermeasures,‖ Proc. IEEE First
Int‘lWorkshop Sensor Network Protocolsapplications03Applications, 2003.
[3]. V. Bhuse, A. Gupta, and L. Lilien, ―DPDSN: Detection of Packet-Dropping Attacksforwireless Sensor Networks,‖ Proc.
FourthTrusted Internet Workshop, 2005.
[4]. M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, ―Misbehavior Resilient Multi Path Data Transmission in MobileAd-
Hoc Networks,‖ Proc. Fourth ACM Workshop sec urity of Ad Hoc and Sensor Networks 2006.
[5]. R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, ―Secmr—ASecure MultipathRouting Protocol for Ad Hoc Networks,‖ Ad
HocNetworks, vol. 5, no. 1, pp. 87-99,2007.
[6]. F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical En-Route Filteringof Injected FalseData inSensor Networks,‖ Proc. IEEE
INFOCOM,2004.
[7]. S. Zhu, S. Setia, S. Jajodia, and P. Ning, ―An Interleaved Hop-by-Hop Authentication schemScheme for Filtering False Data in
SensorNetworks,‖ Proc. IEEE Symp. Security 2004.
[8]. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, ―TowardResilient Security inWireless se-nsor Networks,‖ Proc. Sixth
ACMInt‘lSymp. Mobile Ad Hoc Networking 2005.
[9]. S. Lee and Y. Choi, ―A Resilient Packet-Forwarding Scheme Against MaliciouslyPacket-Dropping Nodes in Sensor Net-works,‖
Proc. Fourth ACM Workshop onSecurity of Ad Hoc and Sensor Networks (SASN ‘06), 2006.
[10]. I. Khalil and S. Bagchi, ―MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc
Networks,‖ Proc. Fourth Int‘l Conf.Security and Privacy in Comm. Netowrks (SecureComm ‘08), 2008.
[11]. I. Krontiris, T. Giannetsos, and T. Dimitriou, ―LIDeA: A Distributed LightweightIntrusion Detection Architecture for Sensor
Networks,‖ Proc. Fourth Int‘l Conf.Security and Privacy in Comm. Netowrks (SecureComm ‘08), 2008.
[12]. S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, ―Reputation-Based Framework for High Integrity Sensor Networks,‖ ACM
Trans. Sensor Networks, vol. 4, no. 3, pp. 1-37, 2008.
[13]. W. Li, A. Joshi, and T. Finin, ―Coping with Node Misbehaviors in Ad HocNetworks: A Multi-Dimensional Trust Management
Approach,‖ Proc. 11th Int‘l Conf. Mobile Data Management (MDM ‘10), 2010. P. Michiardi and R. Molva, ―Core: A Collaborative
Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,‖ Proc. IFIP TC6/TC11 Sixth Joint Working
Conf. Comm. and Multimedia Security: Advanced Comm. and Multimedia Security,
[14]. S. Buchegger and J. Le Boudec, ―Performance Analysis of the Confidant Protocol,‖Proc. ACM MobiHoc, 2002.
[15]. F. Ye, H. Yang, and Z. Liu, ―Catching Moles in Sensor Networks,‖Proc. 27th Int‘l Conf. Distributed Computing Systems (ICDCS
‘07),2007.