Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Survey of Reactive Routing Protocols for MANETIOSR Journals
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator. Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Survey of Reactive Routing Protocols for MANETIOSR Journals
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator. Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Similar to Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET (20)
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Immunizing Image Classifiers Against Localized Adversary Attacks
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
DOI : 10.5121/ijcsea.2012.2105 45
Black-Hole and Wormhole Attack in Routing
Protocol AODV in MANET
Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre
Department of Computer Science and Engineering, SGB Amravati University,
JDIET, Yavatmal, India
Email:- amolabhosle@gmail.com
Department of Computer Science and Engineering, SGB Amravati University,
JDIET, Yavatmal, India
Email:- thosar_tushar@yahoo.com
Department of Computer Science and Engineering, SGB Amravati University,
JDIET, Yavatmal, India
Email:- snehal.mehatre@gmail.com
ABSTRACT
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless
links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management.
The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to
hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of
centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and
reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand
reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “Black
Hole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes
that conform to forward packet to destination. But they do not forward packet intentionally to the
destination node. The black hole nodes degrade the performance of network eventually by participating in
the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This
method first detects a black hole attack in the network and then provide a new route to this node. In this,
the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data
from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and
making them communicate through the wormhole link.
KEYWORDS
AODV, Black Hole, MANET, RREP, RREQ
1. INTRODUCTION
An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without
the assistance of any stand-alone infrastructure or centralized administration [3]. Mobile Ad-hoc
networks are self-organizing and self-configuring multi-hop wireless networks. Each node in
2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
46
mobile ad hoc networks is fit out with a wireless transmitter and receiver, which permits it to
communicate with other nodes in its radio communication range. Nodes usually share the similar
physical media; they transmit and get signals at the same frequency band, and follow the same
hopping sequence or spreading code. If the destination node is not within the transmission range
of the source node, the source node takes help of the intermediate nodes to communicate with
the destination node by relaying the messages hop by hop. Fig. illustrated the Mobile ad-hoc
network. In order for a node to transmit a packet to a node that is out of its radio range, the
cooperation of other nodes in the network is required; this is called as multi-hop communication.
Therefore, each node must act as both a host and router at the same time.
Mobile wireless networks are generally open to attack to information and physical security
threats than fixed wired networks. Securing wireless ad hoc networks is particularly difficult for
many reasons including vulnerability of channels and nodes, absence of infrastructure,
dynamically changing topology and etc. The wireless channel is available to both legitimate
network users and malicious attackers. The abstract of centralized management makes the
classical security solutions depends on certification authorities and on-line servers not
applicable. A malicious attacker can quickly become a router and break network operations by
intentionally not following the protocol specifications.
Fig: Mobile Ad-Hoc Network
The nodes can move randomly and freely in any direction and organize themselves arbitrarily.
They can unite or leave the network at any time. The network topology changes frequently,
rapidly and unpredictably which significantly changes the status of trust among nodes and adds
the complexity to routing among the mobile nodes. The self-centeredness of nodes in ad hoc
networks may tend to deny providing services for the advantage of other nodes in order to save
their own resources acquaint new security that are not addressed in the infrastructure-based
networks.
2. ROUTING PROTOCOL
The primary goal of routing protocols in ad-hoc network is to establish minimum path (min hops)
between source and destination with minimum overhead and minimum bandwidth use so that
packets are transmitted in a timely manner. A MANET protocol should function adequately over
a large range of networking context from small ad-hoc group to larger mobile multihop
networks[13]. As Fig shows, the categorization of these routing protocols.
3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
47
Fig: Hierarchy of Routing Protocol
Routing protocols can be categorized into proactive, reactive and hybrid protocols, depending on
the routing topology. Proactive protocols are typically table-driven. Examples of this type of
protocol are Destination Sequence Distance Vector (DSDV). Reactive or source-initiated on-
demand protocols, in opposite, do not regularly update the routing information. It is circulated to
the nodes only when necessary. Example of this type of protocol is Dynamic Source Routing
(DSR) and Ad Hoc On-Demand Distance Vector (AODV). Hybrid protocols make use of both
reactive and proactive approaches. Example of this type of protocol is Zone Routing Protocol
(ZRP).
2.1 Proactive Routing Protocol (Table Driven)
In a network utilizing a proactive routing protocol, every node keeps one or more tables
representing the complete topology of the network. These tables are updated constantly in order
to keep up-to-date routing information from each node to every other node. To maintain the up-
to-date routing information, topology information needs to be alternate between the nodes on a
regular basis, leading to comparatively high overhead on the network. On the other hand, routes
will be available on request. Many proactive protocols arise from conventional link state routing,
along with the Optimized Link State Routing protocol (OLSR)[13].
2.2 Reactive Routing Protocol (On-Demand Driven)
Reactive routing protocols[6] are on-demand protocols. These protocols do not try to keep correct
routing information on all nodes at all times. Routing information is collected only when it is
required, and route determination based on sending route queries throughout the network. The
primary benefit of reactive routing is that the wireless channel is not subject to the routing
overhead data for routes that may never be consumed. While reactive protocols do not have the
fixed overhead needed by keeping continuous routing tables, they may have considerable route
discovery delay. Reactive search procedures can also add a significant amount of control traffic to
the network because of query flooding. Because of these weaknesses, reactive routing is less
applicable for real-time traffic or in scenarios with a high volume of traffic between a large
numbers of nodes[13].
2.3 Hybrid Routing Protocol
Wireless hybrid routing is depends on the idea of organizing nodes in groups and then allowing
nodes different functionalities inside and outside a group [6]. Both routing table size and update
packet size are decreased by involving in them only part of the network (instead of the whole);
thus, control overhead is decreased. The most popular way of building hierarchy is to group nodes
geographically close to each other into definite clusters. Each cluster has a leading node (cluster
head) to communicate to other nodes on behalf of the cluster. The other way is to have implicit
hierarchy. In this way, each node has a local scope. Different routing strategies are used inside
4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
48
and outside the scope. Communications pass across overlapping scopes. More efficient overall
routing performance can be acquired through this flexibility. Since mobile nodes have only a
single unidirectional radio for wireless communications, this type of hierarchical organization
will be mentioned to as logical hierarchy to distinguish it from the physically hierarchical
network structure[13].
2.4 Security Criteria for Mobile Ad-Hoc Network
While the security requirements for ad hoc networks are the same the ones for fixed networks,
namely availability, integrity, confidentiality, authentication, and non-repudiation.
2.4.1 Availability:
The term Availability means that a node should maintain its ability to provide all the designed
services regardless of the security state of it [9]. This security standard is challenged mainly
during the denial-of-service attacks, in which all the nodes in the network can be the attack target
and thus some selfish nodes do some of the network services unavailable, such as the routing
protocol or the key management service [9][14].
2.4.2 Integrity:
Integrity guarantees the individuality of the messages when they are delivered. Integrity can be
adjusted mainly in two ways [9].
Malicious altering
Accidental altering
A message can be deleted, replayed or revised by an adversary with malicious goal, which is
admire as malicious altering; on the contrary, if the message is lost or its content is changed due
to some benign failures, which may be transmission errors in communication or hardware errors
such as hard disk failure, then it is classified as accidental altering.
2.4.3 Confidentiality
Confidentiality means that certain information is only use by those who have been authorized to
access it. In other words, in order to keep the confidentiality of some confidential information, we
require keeping them secret from all entities that do not have the privilege to access them.
2.4.4 Authenticity
Authenticity is basically assurance that participants in communication are genuine and not
impersonators [9]. It is necessary for the communication participants to prove their identities as
what they have claimed using some techniques so as to ensure the authenticity. If there is not such
an authentication mechanism, the adversary could impersonate a benign node and thus get access
to confidential resources, or even propagate some fake messages to disturb the normal network
operations[14].
2.4.5 Non Repudiation
Non Repudiation guarantees that the sender and the receiver of a message cannot disavow that
they have ever sent or received such a message. This is useful especially when we need to
discriminate if a node with some abnormal behavior is compromised or not: if a node recognizes
5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
49
that the message it has received is erroneous, it can then use the incorrect message as an evidence
to notify other nodes that the node sending out the improper message should have been
compromised.
3. AODV ROUTING PROTOCOL
Ad hoc On-Demand Distance Vector (AODV) [4] is a reactive routing protocol which creates a
path to destination when required. Routes are not built until certain nodes send route discovery
message as an intention to communicate or transmit data with each other. Routing information is
stored only in the source node, the destination node, and the intermediate nodes along the active
route which deals with data transmission. This scenario decreases the memory overhead,
minimize the use of network resources, and run well in high mobility situation. In AODV, the
communication involves main three procedures [4], i.e. path discovery, establishment and
maintenance of the routing paths. AODV uses 3 types of control messages to run the algorithm,
i.e. Request (RREQ), Route Reply (RREP) and Route Error (RERR) messages. The format of
RREQ and RREP packet are shown in Table I and Table II.
I. RREQ field
Source_
address
Source_
sequence
Broadcast_
Id
Destination_
address
Destination_
sequence
Hop_
Count
I. RREP field
When the source node wants to establish the communication with the destination node, it will
issue the route discovery procedure. The source node broadcasts route request packets (RREQ) to
all its accessible neighbors’. The intermediate node that receive request (RREQ) will check the
request. If the intermediate node is the destination, it will reply with a route reply message
(RREP). If it is not the destination node, the request from the source will be forwarded to other
neighbor nodes. Before forwarding the packet, each node will store the broadcast identifier and
the previous node number from which the request came. Timer will be used by the intermediate
nodes to delete the entry when no reply is received for the request. If there is a reply, intermediate
nodes will keep the broadcast identifier and the previous nodes from which the reply came from.
The broadcast identifier and the source ID are used to detect whether the node has received the
route request message previously. It prevents redundant request receive in same nodes. The
source node might get more than one reply, in which case it will determine later which message
will be selected based on the hop counts. When a link breaks down, for example due to the node
mobility, the node will invalidate the routing table. All destinations will become unreachable due
to the loss of the link. It then creates a route error (RERR) message which lists all of these lost
destinations. The node sends the RERR upstream towards the source node. Once the source
receives the RERR, it reinitiates route discovery if it still requires the route.
Source_
address
Destination_
Address
Destination_
sequence
Hop_
count
Lifetime
6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
50
4. BLACK-HOLE ATTACK
The black hole attack[5] is an active insider attack, it has two properties: first, the attacker
consumes the intercepted packets without any forwarding. Second, the node exploits the mobile
ad hoc routing protocol, to announce itself as having a accurate route to a destination node, even
though the route is counterfeit, with the intention of intercepting packets. In an ad-hoc network
that uses the AODV protocol, a black hole node pretends to have a fresh enough routes to all
destinations requested by all the nodes and absorbs the network traffic. When a source node
broadcasts the RREQ message for any destination, the black hole node instatly responds with an
RREP message that contains the highest sequence number and this message is received as if it is
coming from the destination or from a node which has a fresh enough route to the destination.
The source considers that the destination is behind the black hole and rejects the other RREP
packets coming from other nodes. The source then starts to transmit out its data packets to the
black hole believing that these packets will reach the destination. Vulnerabilities of ad-hoc
networks against black hole attacks have solution based on modification of the AODV protocol.
The solution has to examine the route through the next hop in the accepted path. This solution
means that next hop information shall be added to the standard AODV header. Similar approach
is followed in[7] where the nodes are asked to transmit their neighborhood sets once the route is
set up. In [8] two solutions are suggested for detecting the black hole attack in ad-hoc networks.
First solution involves transmitting a ping packet to the destination to check the set up route. If
the acknowledgement does not come from the destination, presence of a black hole is analyze.
The other approach proposed is depends on maintaining track of sequence numbers as black holes
usually temper with these transmitting packets with unusually high sequence numbers[1].
We assume node B to be a malicious node. Using routing protocol, B claims that it has the
routing to the destination node whenever it receives RREQ packets, and sends the response to
source node at once. The destination node may also give a reply. If the reply from a normal
destination node reaches the source node of the RREQ first, everything works well; but the reply
from B could reach the source node first, if B is nearer to the source node. Moreover, B does not
need to check its RT when sending a false message; its response is more likely to reach
(a) Propagation of RREQ message (b) Propagation of RREP message
Fig: Black Hole Attack
the source node firstly. This makes the source node thinks that the routing discovery process is
completed, ignores all other reply messages, and begins to send data packets. The forged routing
has been created. As a result, all the packets through B are simply consumed or lost. B could be
said to form a black hole in the network, and we call this the black hole Attack.
7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
51
5. PROPOSED WORK
To analyze the effects of black holes, we simulated the wireless ad-hoc network with and without
a black hole node present in the network. To be able to do that, we innovate a new protocol,
which we called “Modified AODV”. This new protocol, modified AODV is inherited from the
existing AODV routing protocol. In Watchdog mechanism, each node keeps two extra tables, one
is known as pending packet table and another one is knows as node rating table. There are four
fields in pending packet table, Packet ID, Next Hop, Expiry Time and Packet Destination[1].
I. Pending packet table
Packet ID Next Hop Expiry Time Packet Destination
• Packet ID: ID of packet sent.
• Next Hop: Address of next hop node
• Expiry Time: Time-to-live of packet
• Packet Destination: Address of destination node.
There are also four fields in node rating table, Node Address, Packet drops, Packet forwards
and Misbehave. This table updated corresponding to pending packet table.
I. Node rating table
Node Address Packet Drops Packet Forwards Misbehave
• Node Address: Address of next hop node.
• Packet Drops: Counter for counting the dropped packet.
• Packet Forwards: Counter for counting the forwarded packet.
• Misbehave: It has two values 0 and 1, 0 for well behaving node, 1 for misbehaving
node
Watchdog Mechanism: - In pending packet table, each node maintains track of the packets, it
sent. It contains a unique packet ID, the address of the next hop to which the packet was
forwarded, address of the destination node, and an expiry time after which a still-existing packet
in the buffer is considered not forwarder by the next hop.
In node rating table, each node maintains rating of nodes, which are next to it (means nodes are
within its communication range). This table includes the node address, a counter of dropped
packets noticed at this node and a counter of successfully forwarded packets by this node[1].
The fourth field of the above node rating table is calculated by the ratio of dropped packets and
successfully forwarded packets, if this ratio is greater than a given threshold value then this node
misbehave value will be 1(means it is interprited as a misbehaving node), otherwise it is
deliberated as a legitimate node. An expired packet in the pending packet table causes the packet
drops counter to increase for the next hop correlated with the pending packet table entry.
Each node listens to packets that are inside its communication range, and only to packets
8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
52
associated to its domain. Then, it checks each packet and prevent forged packet. If it notices a
data packet in its pending packet table, then it deletes this data packet from pending packet table
after authenticating the packet. If it notices a data packet that exits in its pending packet table with
source address different from the forwarding node address, then it increases the packet forwarding
value in node rating table[1].
For determining whether a node is misbehaving or act as a legitimate one, rest on the selection of
threshold value. For example if we assume a threshold value of 0.5. This means that as long as a
misbehaving node is transmitting twice packets as it drops it will not be distinguish. If we assume
a lower value of threshold then it will increase the percentages of false positives. After finding a
misbehaving node, a node will attempt to do local repair [2] for all routes passing through this
misbehaving node. If local repair process fails, then it will not transmit any RERR packet
upstream in the network. This process attempts to prevent a misbehaving node from dropping
packets, and also prevent blackmailing of legitimate nodes. To avoid constructing routes, which
traverse misbehaving nodes, nodes drop all RREP messages arriving from nodes currently
marked as misbehaving. To stop misbehaving node to act actively in a network, the all packet
starting from this node has been dropped as a form of punishment[1].
Introduced mechanism proposed an algorithm is as follows:
1. Data packet forwarded or sent.
2. Copy and keep the data packet in pending packet table until it is expired or forwarded
3. If (data packet forwarded)
{
Increment the corresponding forwarded packet in the node-rating table and remove the
data packet from pending packet table
}
4. If (data packet expires in the pending packet table)
{
Increment the corresponding dropped packet in the node-rating table and removes the
data packet from pending packet table.
If (dropped packet > threshold (th1)) then
{
If ((dropped packet / forwarded packet) > threshold (th1))
{
Node is misbehaving.
Promiscuous node locally tells all the node of its wireless range that particular
node is misbehaving node.
Discard RREP message coming from the misbehaving node
}
}
}
6. WORMHOLE ATTACKS
In this type of attacks, the attacker disrupts routing by short circuiting the usual flow of routing
packets. Wormhole attack can be done with one node also. But generally, two or more attackers
connect via a link called “wormhole link”. They capture packets at one end and replay them at the
other end using private high speed network. Wormhole attacks are relatively easy to deploy but
may cause great damage to the network. Wormhole attack is a kind of replay attack that is
particularly challenging in MANET to defend against. Even if, the routing information is
9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
53
confidential, encrypted or authenticated, it can be very effective and damaging. An attacker can
tunnel a request packet RREQ directly to the destination node without increasing the hop-count
value. Thus it prevents any other routes from being discovered. It may badly disrupt
communication as AODV would be unable to find routes longer than one or two hops. It is easy
for the attacker to make the tunneled packet arrive with better metric than a normal multi-hop
route for tunneled distances longer than the typical transmission range of a single hop. Malicious
nodes can retransmit eavesdropped messages again in a channel that is exclusively available to
attacker. The wormhole attack can be merged with the message dropping attack to prevent the
destination node from receiving packets.
Wormhole attack [10] commonly associates two remote malicious nodes shown as X and Y in
Figure-4. X and Y both are attached via a wormhole link and they target to attack the source node
S. During path finding process, S broadcasts RREQ to a destination node D. Thus, A and C,
neighbors of S, accept RREQ and transmit RREQ to their neighbors. Now the malicious node X
that receives RREQ forwarded by A. It records and tunnels the RREQ via the high-speed
wormhole link to its partner Y. Malicious node Y forwards RREQ to its neighbor B. Finally, B
forwards it to destination D. Thus, RREQ is forwarded via S-A-X-Y-B-D. On the other hand,
other RREQ packet is also forwarded through the path S-C-D-E-F-G-D. However, as X and Y are
connected via a high speed bus, RREQ from S-A-X-Y-B-D reaches fist to D. Therefore,
destination D ignores the RREQ that reaches later and chooses D-B-A-S to unicast an RREP
packet to the source node S. As a result, S chooses S-A-B-D route to send data that
RREQ RREP Wireless Link
RREQ through wormhole Wormhole link
Fig: Wormhole Attack
indeed passes through X and Y malicious nodes that are very well placed compared to other
nodes in the network. Thus, a wormhole attack is not that difficult to set up, but still can be
immensely harmful for a MANET. Moreover, finding better techniques for detection of wormhole
attacks and securing AODV against them still remains a big challenge in Mobile Ad-hoc
Networks.
7. COUNTERMEASURES AGAINST WORMHOLE ATTACKS
For detection and prevention of wormhole attacks, “Packet Leash” mechanism is suggested in
which all nodes in the MANET can obtain authenticated symmetric key of every other node. The
receiver can authenticate information like time and location from the received packet.
“Time of Flight” is a technique used for prevention of wormhole attacks. It calculates the round-
trip journey time of a message; the acknowledgement estimate the distance between the nodes
based on this time, and conclude whether the calculated distance is within the maximum possible
communication range. If there is a wormhole attacker involved, packets end up travelling further,
and thus cannot be returned within the short time.
10. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.1, February 2012
54
8. CONCLUSION
MANET requires a reliable, efficient, and scalable and most importantly a secure protocol as they
are highly insecure, self-organizing, rapidly deployed and they use dynamic routing. Mobile Ad
Hoc network is likely to be attacked by the black hole attack and wormhole attack. To solve this
problem, here present a watchdog mechanism and time of flight to detect and overcome black
hole attack and wormhole attack and improve the data security in mobile ad-hoc network.
REFERENCES
[1] Kanika Lakhani, Himani Bathla, and Rajesh Yadav, “A Simulation Model to Secure the Routing
Protocol AODV against the Black-Hole Attack in MANET”, IJCSNS International Journal of
Computer Science and Network Security, VOL.10 No.5, May 2010
[2] C. E. Perkins, S. R. Das, and E. Royer, “Ad-hoc Demand Distance Vector (AODV)”,
http:/www.ietf.org/internet-draft/draft-ietf-manet- aodv-05.txt, Mobile Ad Hoc Networking Group,
IETF
[3] David B.Johnson and Dravid A. Maltz, “Dynamic Source routing in ad hoc wireless networks”,
Technical report, Carneigie Mellon University, 1996
[4] Harris Simaremare and Riri Fitri Sari, “Performance Evaluation of AODV variants on DDOS,
Blackhole and Malicious Attacks”, International Journal of Computer Science and Network Security,
VOL-11, June 2011, Page Number-6.
[5] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks”,
University of Cincinnati, IEEE Communication magazine, October 2002.
[6] Imrich Chlamtac, Marco Conti, Jennifer J. - N. Liu “ Mobile ad hoc networking: imperatives and
challenges ”, School of Engineering, University of Texas at Dallas, Dallas, TX, USA, 2003.
[7] Lidong Zhou, Zygmunt J. Hass, “Securing Ad Hoc Networks”, IEEE Special Issue on Network
Security, Vol-13, Nov-Dec 1999, Page Number - 24-30L.
[8] P. Ning and K. Sum, “How to misuse AODV: A case study of insider attack against mobile ad
hoc routing protocol”, Tech Rep, TR- 2003-07, CS Department, NC University, April 2003
[9] Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks”, Department of
Computer Science and Electrical Engineering, University of Maryland.
[10] Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks
in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, Volume-2
Issue-3, pp. 18-29
[11] Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, “MANET Routing Protocols and
Wormhole Attack against AODV” , IJCSNS International Journal of Computer Science and Network
Security, VOL.10 No.4, April 2010
[12] Dongbin Wang, Mingzeng Hu and Hui Zhi, “A survey of secure routing in ad hoc networks”,
Research Center of Computer Network and Information Security Technology, Harbin Institute of
Technology, PRC
[13] K. Lakshmi, S.Manju Priya, A.Jeevarathinam, K.Rama and K. Thilagam, “Modified AODV Protocol
against Black hole Attacks in MANET”, International Journal of Engineering and Technology Vol.2
(6), 2010
[14] Dr. M.S.Aswal, Paramjeet Rawat and Tarun Kumar “Threats and Vulnerabilities in Wireless Mesh
Networks”, International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009