This document compares the security of the ARAN and AODV routing protocols in mobile ad hoc networks (MANETs) through simulation. It provides an overview of AODV and ARAN, describing their route discovery, maintenance, and security features. It then analyzes two types of attacks - blackhole attacks and IP spoofing attacks - and whether each protocol is vulnerable. The document describes simulating the two protocols under these attack conditions in the GloMoSim simulator to evaluate metrics like packet delivery ratio, path length, delay, and throughput. It finds that ARAN is more secure against these attacks since it uses message authentication via digital signatures, while AODV is vulnerable due to lack of authentication.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Gsm or x10 based scada system for industrial automationeSAT Journals
Abstract Power systems are important and expensive components in the electric power system. The knowledge of the actual status of the system insulation behavior, load tap changer performance, temperature, and load condition is necessary in order to evaluate the service performance concerning reliability, availability and safety. Systems abnormalities, loading, switching and ambient condition normally contribute towards accelerated aging and sudden failure. The paper presents the causes which lead to the internal faults appearance in the power system. The production mechanisms of the faults and the on-line monitoring are also analyzed. A monitoring procedure is proposed for the diagnosis and forecasting strategy of the functioning state of the power system.
Keywords: GSM standard reference manual, Universal IC programmer
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure signature based cedar routing in mobile adhoc networkseSAT Journals
Abstract Mobile adhoc networks are emerging as the most predominant wireless networking, where nodes communicate with each other on adhoc basis. MANETS are self configuring system of mobile nodes and they do not have any centralized resource or any static infrastructure. The most important challenge to be met while designing an efficient and reliable mobile adhoc network is quality of service and security. Adhoc networks have constrained power supply and dynamic topology and hence quality of service and security of the network may be affected. Since adhoc networks carry highly sensitive information in case of defense and military applications, it must be designed in a way to restrict any unauthorized access to the data. Any attack in routing may interrupt, disorder or destroy the overall communication and the entire network may be disabled. Thus, security plays an important role for working of the whole network. Adhoc networks must satisfy quality of service requirement. Assuring high quality of service in ad hoc networks is more difficult than in most other type of networks, because the network topology changes and network state information is generally inaccurate. This requires considerable collaboration between the nodes to establish the route and to provide the QoS. In this paper, CEDAR routing with group signature technique is introduced to satisfy the demand of security and quality of service. CEDAR is a core extraction distributed adhoc routing algorithm for mobile adhoc networks environment. CEDAR is a robust routing method and it provides highly efficient quality of service. CEDAR works on basis of link state bandwidth. It routes the data from one node to another node satisfying the required bandwidth. Group Signatures are used to provide authentication, integration and non repudiation requirements. Signature based CEDAR is used to make sure that communication is secure and information exchanged is correct while maintaining high Qos. Keywords: Mobile adhoc network, CEDAR routing, Bandwidth, Group signature, Privacy
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
Abstract
Cloud Computing is a growing technology which enables on demand network access to resources . In mobile cloud computing
there is access to remote servers rather than local servers using portable devices and it is also shaping new environment for
computing where user is free to move while working and there is no need to work at a specific location . Installing compiler
manually is very crucial task because it consumes lot of space. In this paper mobile cloud based compiler is used to compile
and execute programs which is hosted on private cloud. We can use this compiler remotely through any network via smart
phone or any portable device which will help us to avoid installation of compilers on every machine.
Keywords: Mobile Cloud Computing, Cloud Serve ,Compiler, Private Cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Gsm or x10 based scada system for industrial automationeSAT Journals
Abstract Power systems are important and expensive components in the electric power system. The knowledge of the actual status of the system insulation behavior, load tap changer performance, temperature, and load condition is necessary in order to evaluate the service performance concerning reliability, availability and safety. Systems abnormalities, loading, switching and ambient condition normally contribute towards accelerated aging and sudden failure. The paper presents the causes which lead to the internal faults appearance in the power system. The production mechanisms of the faults and the on-line monitoring are also analyzed. A monitoring procedure is proposed for the diagnosis and forecasting strategy of the functioning state of the power system.
Keywords: GSM standard reference manual, Universal IC programmer
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure signature based cedar routing in mobile adhoc networkseSAT Journals
Abstract Mobile adhoc networks are emerging as the most predominant wireless networking, where nodes communicate with each other on adhoc basis. MANETS are self configuring system of mobile nodes and they do not have any centralized resource or any static infrastructure. The most important challenge to be met while designing an efficient and reliable mobile adhoc network is quality of service and security. Adhoc networks have constrained power supply and dynamic topology and hence quality of service and security of the network may be affected. Since adhoc networks carry highly sensitive information in case of defense and military applications, it must be designed in a way to restrict any unauthorized access to the data. Any attack in routing may interrupt, disorder or destroy the overall communication and the entire network may be disabled. Thus, security plays an important role for working of the whole network. Adhoc networks must satisfy quality of service requirement. Assuring high quality of service in ad hoc networks is more difficult than in most other type of networks, because the network topology changes and network state information is generally inaccurate. This requires considerable collaboration between the nodes to establish the route and to provide the QoS. In this paper, CEDAR routing with group signature technique is introduced to satisfy the demand of security and quality of service. CEDAR is a core extraction distributed adhoc routing algorithm for mobile adhoc networks environment. CEDAR is a robust routing method and it provides highly efficient quality of service. CEDAR works on basis of link state bandwidth. It routes the data from one node to another node satisfying the required bandwidth. Group Signatures are used to provide authentication, integration and non repudiation requirements. Signature based CEDAR is used to make sure that communication is secure and information exchanged is correct while maintaining high Qos. Keywords: Mobile adhoc network, CEDAR routing, Bandwidth, Group signature, Privacy
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
Abstract
Cloud Computing is a growing technology which enables on demand network access to resources . In mobile cloud computing
there is access to remote servers rather than local servers using portable devices and it is also shaping new environment for
computing where user is free to move while working and there is no need to work at a specific location . Installing compiler
manually is very crucial task because it consumes lot of space. In this paper mobile cloud based compiler is used to compile
and execute programs which is hosted on private cloud. We can use this compiler remotely through any network via smart
phone or any portable device which will help us to avoid installation of compilers on every machine.
Keywords: Mobile Cloud Computing, Cloud Serve ,Compiler, Private Cloud.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A unidirectional network (also referred to as a unidirectional security gateway or data diode) is a network
appliance or device allowing data to travel only in one direction, used in guaranteeing information security. They
are most commonly found in high security environments such as defense, where they serve as connections
between two or more networks of differing security classification –also known as a "cross domain solution." This
technology is also found at the industrial control level for such facilities as nuclear power plants, electric power
generation/distribution, oil and gas production, water/wastewater, airplanes (between flight control units and
in-flight entertainment systems), and manufacturing
Communication Protocols Augmentation in VLSI Design ApplicationsIJERA Editor
With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual) & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Modeling the wettability alteration tendencies of bioproducts during microbia...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A unidirectional network (also referred to as a unidirectional security gateway or data diode) is a network
appliance or device allowing data to travel only in one direction, used in guaranteeing information security. They
are most commonly found in high security environments such as defense, where they serve as connections
between two or more networks of differing security classification –also known as a "cross domain solution." This
technology is also found at the industrial control level for such facilities as nuclear power plants, electric power
generation/distribution, oil and gas production, water/wastewater, airplanes (between flight control units and
in-flight entertainment systems), and manufacturing
Communication Protocols Augmentation in VLSI Design ApplicationsIJERA Editor
With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual) & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Modeling the wettability alteration tendencies of bioproducts during microbia...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparative study of multipath extensions of aodveSAT Journals
Abstract A mobile ad hoc network (MANET) is a multi-hop wireless network with dynamically changing topology. With the development of MANET technology, various routing protocols have been proposed over the years with minimum control overhead and network resources. AODV is the most popular routing protocol among others. It is a single path, loop free, On-demand type routing protocol and its performance is better than other routing protocols in MANET environment. However, single path abstraction is considered one of the biggest drawbacks of AODV. Also, it has more routing overhead both at the time of route discovery and route repair. In the networks with light traffic and low mobility AODV scales flawlessly to the larger networks with low bandwidth and storage overhead. But in networks with heavy traffic, a big number of routes will break resulting in repeated route discoveries and error reports in the network, which is an overhead. The mobile nodes in MANET have limited resources such as battery power, limited bandwidth which the single path protocols cannot handle efficiently. Thus routing is a vital issue in the design of a MANET. Multipath routing allows the establishment of multiple paths between a single source and single destination node. Researchers have proposed many multipath extensions of AODV protocol to establish reliable communication and ensure better load balancing than the conventional protocol. This paper reviews some multipath extensions of AODV routing protocol and a comparative study is done. There is no frontrunner of the comparison, but there are important inferences for scholars who will design new routing protocols in future. Keywords: MANET, Multipath Extensions, Routing Protocols, AODV, AODV-BR, SMORT, AOMDV and AODVM
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Journals
Abstract Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery Ratio. Keywords: Ad hoc, MANET, DSDV, AODV, Manhattan Grid, Throughput, Overhead
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
A survey heterogenity and mobility based routing protocol in wsneSAT Journals
Abstract The latest advancements in wireless communication are more emphasis on delivering sensitive info to destination node under several constraints such as latency ,energy, reliability, stability, and security. So there is rise of Wireless Sensor Network Technology[1] .Though it is possible to assimilate sensing and computing units along with transceiver(transmitter & receiver) and power supply to a single entity called as Sensor Node (SN). The combination of SNs constitute a type of network known as Wireless Sensor Networks (WSNs)[1]. Several researched proposals on WSNs have mainly emphasis on energy minimization of the Base Station (BS) for communication process. Although clustering is the most well-known technique for the enrichment of network lifetime by effective energy utilization of sensor node, but heterogeneity issue of sensor node is another interesting aspect which can be considered to save the energy consumption of sensor nodes in the network field. Mobility Issue is also one of the major aspect in determining performance of the network . In this paper considering all these issues, , we have tried our best to categorized different heterogeneous routing protocols for WSNs based upon some predefined parameters .Different performance evaluation metrics such as- network lifetime, Number of Heterogeneity Level, Cluster Head Selection(CH-Selection), Energy Efficiency, Stability and Mobility. The extensive categorization gives insights to various readers to select one of the protocols from various categories based upon its advantage over the others. Keywords: - Heterogeneity, Cluster Head Selection, Mobility, Heterogeneous Routing Protocol, Threshold Value.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
Abstract A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries. Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner (since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc networks. Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of zone routing protocol in maneteSAT Journals
Abstract MANET is combination of wireless mobile nodes that communicate with each other without any kind of centralized control or any device or established infrastructure. Therefore MANET routing is a critical task to perform in dynamic network. Without any fixed infrastructure, wireless mobile nodes dynamically establish the network. Routing Protocols helps to communicate a mobile node with the other nodes in the network by sending or receiving the packets. This research paper provides the overview of ZRP by presenting its functionality. The performance of ZRP (Zone Routing Protocol) is analyzed on the basis of parameters Throughput, Load, Data Dropped and Delay using simulator OPNET 14.0. Index Terms: MANET, Routing Protocols, ZRP
Design and development of load sharing multipath routing protcol for mobile a...eSAT Journals
Abstract Routing in Mobile Ad hoc Networks (MANETs) is a challenging task due to the dynamic nature of the network topology and resource constraints. Due to communication over wireless channel, participating nodes also experience interference and bandwidth constraints. Therefore it is essential to develop a robust and efficient routing protocol for MANETs. This research paper involves design and development of a multipath routing protocol for MANETs, called Load Sharing Multipath Routing (LS-MPR) uses dual polarized directional antenna to enhance network efficiency and provide load balancing. LS-MPR is an on-demand multipath routing protocol, which selects best possible multiple paths based on ascending order of hop count and availability of common polarization between neighboring mobile nodes. The performance of the LS-MPR is compared with that Ad-hoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The network performance is checked with and without node mobility, throughput, Packet Delivery Ratio (PDR), least jitter, low interference and low end-to-end delay. Directional antenna is a very efficient and low cost smart antenna technology. It can achieve better performance, higher throughput, and better resource utilization with omnidirectional antennas multi-path routing cannot be exploited very well since packets routed on one of the paths cause an interference zone that typically encompasses the other paths and thereby limits the number of packets routed on these paths. Keywords: Multipath Routing, Load Sharing Multipath Routing (LS-MPR) Ad-hoc On Demand Distance Vector (AODV) Dynamic Source Routing (DSR).
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Comparative review study of security of aran and aodv routing protocols in manets (20)
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Comparative review study of security of aran and aodv routing protocols in manets
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 192
COMPARATIVE REVIEW STUDY OF SECURITY OF ARAN AND
AODV ROUTING PROTOCOLS IN MANETS
Er. Ruby Goel1
, Er. Meenakshi Mittal2
1
Computer Science and Technology, Central University of Punjab, Punjab, India
2
Computer Science and Technology, Central University of Punjab, Punjab, India
Abstract
Mobile Ad-hoc networks are proposed because there are some areas where it is not possible to set up a network having fixed
infrastructure, like in areas of emergency services, military operations, personal area networks, etc. Ad hoc network allows
communication between wireless nodes with the help of their transmission ranges and routing protocols facilitate this
communication among the nodes. But on these routing protocols variety of attacks are possible like- Eavesdropping, IP-spoofing,
Blackhole, Denial of service attack, etc. By attacking the routing protocol attackers can access network traffic, can drop it or can
modify it. To prevent these attacks many secure routing protocols like- SEAD, ARAN, SAODV, SRP, etc have been developed. In
this paper security aspects of ARAN (Authenticated Routing for Adhoc Network routing protocol) has been analyzed with respect
to a commonly used routing protocol AODV (Adhoc On-Demand Distance Vector) i.e. how much these two protocols are resistant
to Blackhole and IP-Spoofing attack under GloMoSim-2.03 simulator.
Keywords: AODV, ARAN, Blackhole, IP-Spoofing, GloMoSim.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In Ad-hoc networks the wireless nodes communicate with
each other by forwarding packets over themselves. Mobile
Ad hoc NETwork (MANET) is a network of mobile nodes
that uses each other services to forward a packet to its
destination. MANETS have several advantages over
traditional wired networks as they are easy to deploy in a
short interval of time and are independent of fixed
infrastructure. Nodes in MANET can behave differently in
the network as at one time a node can behave as a sender;
other time as the receiver and can also help to route the
packets to another nodes functioning as the router [9].
Nodes communicate to each other with the help of their
transmission ranges and routing protocols defines the rules
for communication. As discussed in [7], [9] these protocols
come under different categories like-
Fig –1: Various types of Routing Protocols
Reactive or on-demand- here routes are only
generated when they are needed by any source
node to send the packets to another node.
Proactive or table driven- here routes to all
destinations are kept in tables which are regularly
updated with changes in topology.
Reactive protocols found to be more efficient than proactive
protocols because they use lower bandwidth for maintaining
routing tables, and they are more energy-efficient and have
effective route maintenance [9]. As discussed in [7]
MANETs are subject to various security challenges due to:
1. Vulnerabilities of topology which is changing
dynamically.
2. Absence of security infrastructures on wireless
links.
3. Selfish behavior of nodes which may not
participate in routing process genuinely.
Due to these reasons Reactive and Proactive protocols are
subject to various attacks like- IP Spoofing, Blackhole,
Eavesdropping, Traffic Analysis, Denial of service, etc.
Secure protocols- To provide security features
against above mentioned challenges secure
protocols have been developed which are effective
against various network attacks.
In [14], [15] AODV and ARAN performance had been
compared on the basis of various metrics. In this paper
ARAN performance has been checked against AODV under
Blackhole attack and IP Spoofing attack.
The organization of paper is done as follows: Section 2
describes the two routing protocols AODV and ARAN.
AODV,
DSR,
TORA,
SSR, BSR,
etc.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 193
Section 3 describes the Blackhole and IP-Spoofing attack.
Section 4 describes the simulation setup and various
simulations results. Finally, Section 5 concludes the paper.
2. ROUTING PROTOCOLS OVERVIEW
2.1 AODV (Adhoc on Demand Distance Vector)
Routing Protocol [20]
Zhou in [20] has described that AODV is a pure on-demand
routing protocol where routes are built only when nodes
want to communicate or transmit data to other nodes.
AODV functionality is described under two important
procedures:
2.1.1 Route Discovery Procedure
Route request (RREQ) and Route reply (RREP) packets in
AODV use various parameters like- s_seq (source sequence
number), d_seq (destination sequence number), hop_count
(number of nodes the message has passed), s_addr (source
address) and d_addr (destination address) to find out the
shortest route. AODV working is shown in Fig -2 where S
(source node) wants to send data to D (destination node). S
node broadcasts the RREQ packet to all neighboring nodes
which will further broadcasts the packet until the destination
is reached. After all the RREQ packets reach the destination
node D, it unicasts the RREP packet upon the path with
shortest hop count. So the RREP packet is sent through node
I3 and being the shortest route S-I3-D path is selected.
2.1.2 Route Maintenance Procedure
If some link is found to be broken, route error (RERR)
packet is sent to all the source nodes using that link. Thus
route maintenance is done through RERR packets. As
shown in Fig -3 node I1 sends Route error (RERR) message
to source node S for the broken link. It consists of D_addr,
D_seq and hop_count equal to infinity [17].
Fig -2: Route discovery process in AODV
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 194
Fig -3: Route maintenance process in AODV
2.2 ARAN (Authenticated Routing for Adhoc
Network) Routing Protocol [14], [15]
Sanzgiri, LaFlamme, Dahill, Levine, Shields, & Belding-
Royer in [14], [15] proposed a secure routing protocol
ARAN. ARAN provides security against third party attacks
by introducing authentication, message integrity and non-
repudiation. Every node in ARAN has a certificate from a
trusted server; so that no illegal node can participate in
routing process. ARAN protocol consist four steps:
Certificate application, route discovery, route establishment,
route maintenance. ARAN doesn’t record the entire route
information and also doesn’t consider the total number of
hops in the route discovery. Each legitimate node only
records the IP address of its precursor nodes and successor
nodes. This ensures the security of the network topology
that no unauthorized node can participate in routing process.
ARAN functions by verifying the signatures of its
predecessor node before accepting the RREQ packet or the
RREP packet. As shown in Fig -4 node I1 verifies the
signature of node S; I2 of I1; I3 of I2 and D of I3 while
sending RREQ packet and I3 verifies D node signature; I2
of I3; I1 of I2 and S of I1 while receiving RREP packet.
Finally after all the verification a route is established
between S and D [14], [15].
Fig -4: Route discovery in ARAN
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 195
2.3 AODV vs. ARAN
Both the protocols can be compared on the security basis as
shown in Table –1.
Table –1: Attacks possible in AODV and ARAN [14]
Attacks AODV ARAN
YES
/NO
REASON YES
/NO
REASON
Blackhole YES Hop count
and
Sequence
number can
be easily
modified
NO Hop count and
Sequence
number does
not exist
Message
Modification
YES No check
on message
contents
NO Digital
signature by
the sender
prevents
modification
in message
content
IP- Spoofing YES Source
address is
not verified
NO Source address
is verified by
sender’s
digital
signature
False Route
Errors
YES Can be sent
by any
node by
using IP-
spoofing
YES Can be sent by
any node but
sending node
can be
detected by
digital
signature and
certificate
DOS or
DDOS
YES Congestion
can be
created by
using IP-
spoofing
YES Congestion
can be created
by legitimate
nodes
Table –I shows that though ARAN prevents many attacks
but denial-of-service attack can be conducted by nodes
having or may not having valid ARAN certificates [14],
[15]. If a packet is routed by a node which doesn’t have a
valid certificate then the packet will be dropped but in other
case nodes with valid certificates can conduct the attack, by
sending unnecessary route requests or large amount of data
packets that can create congestion in the network [9].
3. ATTACKS
MANETs have dynamic topologies, limited physical
security and limited resources (power, bandwidth, etc.) due
to which they are not secure. Attacks defined in Table -I, all
are aimed to adversely affect the availability, confidentiality,
integrity and authenticity services. Network attacks are
classified under:
Passive attacks- in these attacks there is no
modification of message content, rather they are
only aimed to learn contents or other information of
communication patterns like- Eavesdropping, etc
[7].
Active attacks- in these attacks message contents
are modified to launch different types of attacks
like- IP-spoofing, Blackhole, Denial of service
attack, etc [7].
3.1 Blackhole Attack
Blackhole attack has been described in [3], [13] and [17]
where a malicious intermediate node on receiving the route
request packet (RREQ) sends a fake route reply packet
(RREP) of having the shortest route. The malicious node
doesn’t check its routing table and sends an immediate reply
by setting hop count to a minimum value (usually 1) and
sequence number to a very large value. As the reply from
the malicious node is received very fast as compared from
the other nodes, the source node will start sending data from
the malicious node’s path. When such a route is established,
it’s up to the malicious node which can drop all the received
packets or it can forward packets to the unknown address so
that packets may not reach the destination node. As
discussed in [21] blackhole attack can be of two types:
Internal Blackhole attack- here the malicious
node makes itself the part of the routing route by
providing fake route replies and does not allow
packets to reach to its destination by simply
dropping the packets passing through it.
External Blackhole attack- here node stays
outside the network and have the control of some
internal malicious node of the network.
In ARAN, each node is provided with a certificate so only
authenticated nodes can participate in routing; no external
node can enter the network. So to compare AODV and
ARAN, we are dealing with only internal blackhole attack.
3.1.1 Blackhole in AODV
As discussed in [17], blackhole attack can be conducted by
modifying count and sequence number. As shown in Fig-5 a
single malicious node has been set, which on receiving the
RREQ packet sends a fake RREP packet of minimum hop
count and maximum sequence number. Finally the packets
which passed through this node would be dropped.
As shown in fig- 5, where node I1 acts as a blackhole node
which sends an immediate reply to source node S route
request with a RREP packet, where it sets hop_count = 1
and D_seq = 4294967295 [17]. Another genuine RREP
packet is sent by node I3 but source node will not accept the
RREP packet from node I3 as it has higher hop_count and
lower D_seq number as compared to the reply coming from
malicious node I1. After this the source node starts sending
packets to I1, being the malicious node I1 will drop all the
packets without making them to reach the destination node.
3.1.2 Blackhole in ARAN
In ARAN there are no such parameters like hop count or
sequence number, for route discovery process. Therefore in
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 196
ARAN Blackhole attack is not feasible unless selfish nodes
drop the packets [21].
3.2 IP-Spoofing Attack
IP-Spoofing attack has been discussed in [18] where some
intruder node sends messages to a node by using the identity
of some other legitimate node. The intruder modifies the
packet headers such that it appears that the packets are
coming from a trusted node.
3.2.1 IP-Spoofing in AODV
AODV is vulnerable to spoofing attack where a node can
easily send packets in the network using some other node’s
identity. These nodes can create congestion in the network
by sending large amount of data leading to denial-of-service
(DOS) attack. Since the node is using some other node’s
identity it will be difficult to track the real attacker.
Fig -5: Blackhole attack in AODV
3.2.2 IP-Spoofing in ARAN
In ARAN protocol, spoofing is not possible because each
node checks the identity of its adjacent node from which it is
receiving some information. If any fault is detected in
verification process, all the packets are dropped without
reaching the destination.
4. SIMULATION APPROACH
The performance evaluation of ARAN and AODV protocols
has been done under identical mobility and traffic scenarios
in GloMoSim simulator. All simulations are done on an
Intel (core i3) machine using Linux Red Hat 9.0 installed on
VMWare Workstation 9.
Table –2: Simulation environment setup
Simulation parameter Value
Simulator GloMoSim-2.03
Simulation Time 100 seconds
Routing Protocols AODV and ARAN
Traffic CBR packets
Mobility Model Random Waypoint
Traffic Sessions 6
Number of nodes 10, 30, 50 and 70
Number of internal
Blackhole node
1
Node speed 0 and 15m/s
Terrain Area 500*500, 750*750,
1000*1000 and 1250*1250
Packet size 512 bytes
Performance Metrics Packet Delivery ratio, Path
length, Delay and Throughput
4.1 Traffic
Constant bit rate (CBR) packets are sent over the network.
4.2 Mobility Model
Random Waypoint Model is used to simulate MANETs
where the mobile nodes can move randomly in any direction
constrained with the speed specified in MOBILITY-WP-
MIN-SPEED and MOBILITY-WP-MAX-SPEED
parameters of GloMoSim. Also MOBILITY-WP-PAUSE
defines the pause time a node pauses before moving
randomly further [1], [11].
4.3 Traffic Sessions
To generate traffic 6 nodes are selected as source nodes and
6 nodes as the receiver nodes. All these sending nodes send
packets of 512 bytes at the rate of 10 packets per second.
Total 100 packets are sent from each node. All the
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 197
simulations for a particular number of nodes are carried out
for two different speeds- 0m/s (no mobility) and 15m/s.
4.4 Terrain Areas for Different Number of Nodes
Simulations are done for different number of nodes which
are randomly allocated in different terrain areas. For
simulation of 10 numbers of nodes the terrain area is given
as 500*500; similarly for 30 nodes it is 750*750; for 50
nodes it is 1000*1000 and for 70 nodes it is given as
1250*1250.
4.5 Performance Metrics
Various metrics are calculated as:
PDR (Packet Delivery ratio) - This metric indicates
the fraction of total data packets reached the
destination to the total number of packets sent by
the sender and is thus calculated as: Total Packets
Received/Total Packets sent [15].
Average Path length- This is the average length of
the paths discovered by the protocol. It is calculated
as: Total data packets/Total hops taken [15].
Average end-to-end Delay (in seconds) - This is the
average delay between the sending of the data
packets by the source and its receipt at the
corresponding receiver [9].
Throughput (bits/second) - This value represents
the ratio of the total bits of data packets that reach
their destination, to the total time it takes to reach
to the destination.
In the following simulations, performance of AODV
protocol under blackhole attack is compared with ARAN
protocol.
4.5.1 Experiment 1: Packet Delivery Ratio (PDR)
Fig -6 shows the effect of blackhole attack on packet
delivery ratio for AODV and ARAN.
It has been observed that the packet delivery ratio
decreases more under AODV as compared to
ARAN. The packet delivery ratio is 16-83% while
using AODV but ARAN provides nearly 83-100%
PDR in same scenarios.
The decrease in PDR in AODV is due to the
blackhole node which can cause maximum data
packets to pass through it by giving fake route reply
and finally drops the packets. But in ARAN selfish
node cannot send such a reply, so the packets
passing through the selfish node can be simply
dropped.
It can be said that AODV is highly vulnerable to blackhole
attack.
Fig -6: Packet Delivery Ratio of AODV and ARAN under
blackhole attack at different speeds and varying number of
nodes.
4.5.2 Experiment 2: Path Length
Fig -7 shows the effect of blackhole attack on path length
parameter for AODV and ARAN.
AODV has been observed of having a longer route
path in presence of malicious node (from 1 to 3).
As the node is moving randomly so depending on
its current position to the destination, path length
may increase or decrease. In ARAN the packets
reach the destination by optimal path (from 1 to
1.1).
In AODV malicious node can set a longer route
path for the packets passing by it. ARAN provides
authenticity due to which malicious nodes can’t
modify contents of the routing packets. Secure
routes are selected and there is no adverse effect on
the Path length.
Fig -7: Comparison of Path Length of AODV and ARAN
under blackhole attack at different speeds and varying
number of nodes.
4.5.3 Experiment 3: Average end-to-end Delay
Fig -8 shows the effect of blackhole attack on delay
parameter for AODV and ARAN.
It has been observed that there is an increase in
average end-to-end delay in AODV under the
Blackhole attack as compared to that of the ARAN.
0
0.2
0.4
0.6
0.8
1
1.2
10 30 50 70
PacketDeliveryRatio
Number of nodes
AODV(BH), 0
m/s
ARAN(BH), 0
m/s
AODV(BH), 1
5m/s
ARAN(BH), 1
5m/s
0
0.5
1
1.5
2
2.5
3
3.5
10 30 50 70
PathLength
Number of nodes
AODV(BH), 0m
/s
ARAN(BH), 0m
/s
AODV(BH), 15
m/s
ARAN(BH), 15
m/s
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 198
In case of 10 nodes where delay of AODV is less
although there is an increase of path length as
shown above in Fig- 7, this can be due to very less
packet delivery ratio of AODV while using 10
nodes (as shown in Fig- 6) due to which average
end-to-end delay decreases. Similarly in case of 50
nodes there is high increase in delay of AODV at
15m/s as compared to AODV at no mobility
because packet delivery ratio is high.
Average end-to-end delay depends upon Packet
Delivery ratio as well as on Path length. So, it is
delay is more in AODV as compared to ARAN.
Fig -8: Comparison of Delay of AODV and ARAN under
blackhole attack at different speeds and varying number of
nodes.
4.5.4 Experiment 4: Throughput
Fig -9 shows the effect of blackhole attack on throughput for
AODV and ARAN.
The throughput of AODV is less as compared to
that of ARAN.
This effect is because of the decrease in Packet
Delivery Ratio, as there is a decrease in total
number of data bits received so throughput
decreases in AODV.
Fig -9: Comparison of Throughput of AODV and ARAN
under blackhole attack at different speeds and varying
number of nodes.
4.5.5 Experiment 5: Packet Delivery Ratio (PDR)
during IP-Spoofing Attack
Results show that nearly 99.9% of spoofed packets reach the
destination while using AODV but 0% while using ARAN.
Fig -10 shows the effect of IP-spoofing (IPS) attack on
packet delivery ratio for AODV and ARAN.
Fig -10: Comparison of Packet delivery ratio of AODV and
ARAN in IP-Spoofing Attack.
5. CONCLUSIONS
Apart from the various advantages of adhoc networks over
the wired networks, they are vulnerable to variety of attacks,
like modification of routing messages, impersonation of
other nodes, dropping of packets without making them reach
the destination and many more. To overcome this problem
many secure routing protocols have been proposed and one
of them is ARAN protocol. To analyze its secure
functionalities ARAN has been checked against a commonly
used reactive routing protocol AODV for Blackhole attack
and IP-spoofing. Blackhole attack can be conducted in
ARAN protocol only by the selfish nodes which do not
forward packets to other nodes. After carrying out various
simulations in GloMoSim-2.03 simulator and analyzing
various performance metrics it has been observed that
ARAN provides higher Packet delivery ratio and
Throughput against AODV; also AODV shows more Delay
and Path Length than ARAN under blackhole attack. So
ARAN provides secure routing as compared to AODV
against blackhole attack. Simulation results for IP-Spoofing
attacks shows that the spoofed packets reach the destination
while using AODV but in ARAN all the spoofed packets are
dropped i.e. no packet reached the destination. Thus ARAN
is safe against spoofing attack also.
REFERENCES
[1]. L. Bajaj, M. Takai, R. Ahuja, K. Tang, R. Bagrodia, and
M. Gerla, "Glomosim: A scalable network simulation
environment," UCLA Computer Science Department
Technical Report, vol. 990027, p. 213, 1999
[2]. D. Benetti, M. Merro, and L. Vigano, "Model checking
ad hoc network routing protocols: Aran vs. endaira," in
Software Engineering and Formal Methods (SEFM), 2010
8th IEEE International Conference on, 2010, pp. 191-202.
0
5
10
15
20
25
30
35
10 30 50 70
Delay(inmilliseconds)
Number of nodes
AODV(BH), 0m
/s
ARAN(BH), 0m
/s
AODV(BH), 15
m/s
ARAN(BH), 15
m/s
0
10000
20000
30000
40000
50000
10 30 50 70
Throughput(inbits/second)
Number of nodes
AODV(BH), 0m
/s
ARAN(BH), 0m
/s
AODV(BH), 15
m/s
ARAN(BH), 15
m/s
0
0.2
0.4
0.6
0.8
1
1.2
10 30 50 70
PDR
Number of nodes
AODV (IP-
Spoofed)
ARAN (IP-
Spoofed)
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06| Jun-2014, Available @ http://www.ijret.org 199
[3]. S. Dokurer, Simulation of Black hole attack in wireless
Ad-hoc networks: Atılım University, 2006.
[4]. L. Ertaul and D. Ibrahim, "Evaluation of Secure Routing
Protocols in Mobile Ad Hoc Networks (MANETs)," in
Security and Management, 2009, pp. 363-369.Paper
presented at the Security and Management.
[5]. A. Garg and V. Beniwal, "A Review on Security Issues
of Routing Protocols in Mobile Ad-Hoc Networks,"
International Journal, vol. 2, 2012.
[6]. C. Gong, S. Wu, and Y. Jing, "ARAN protocol analysis
and improvement," in System Science, Engineering Design
and Manufacturing Informatization (ICSEM), 2012 3rd
International Conference on, 2012, pp. 347-350.3rd
International Conference on.
[7]. S. R. Gowda and P. Hiremath, "Review of Security
Approaches in Routing Protocol in Mobile Adhoc
Network," International Journal of Computer Science Issues
(IJCSI), vol. 10, 2013.
[8]. M. Kumar and K. Gupta, "Secure routing protocols in
ad hoc networks: A review," in Special Issue of IJCCT,
2010 for International Conference (ICCT 2010), December,
pp. 3-5.
[9]. A. Mahmoud, A. Sameh, and S. El-Kassas, "Reputed
authenticated routing for ad hoc networks protocol (reputed-
ARAN)," in Mobile Adhoc and Sensor Systems Conference,
2005. IEEE International Conference on, 2005, pp. 8 pp.-
794.
[10]. S. Mehla, B. Gupta, and P. Nagrath, "Analyzing
security of Authenticated Routing Protocol (ARAN),"
International Journal on Computer Science & Engineering,
vol. 2, 2010.
[11]. T. Nilsson, "A Tutorial on GloMosim," Department of
Computing Science. University of Umea, 2002.
[12]. P. Ning and K. Sun, "How to misuse AODV: a case
study of insider attacks against mobile ad-hoc routing
protocols," Ad Hoc Networks, vol. 3, pp. 795-819, 2005.
[13]. J.-C. Ruiz, J. Friginal, D. Andres, and P. Gil, "Black
Hole Attack Injection in Ad hoc Networks," in DSN2008,
International Conference on Dependable Systems and
Networks. Anchorage, Alaska, 2008, pp. G34-G35.
[14]. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E.
M. Belding-Royer, "A secure routing protocol for ad hoc
networks," in Network Protocols, 2002. Proceedings. 10th
IEEE International Conference on, 2002, pp. 78-87.
[15]. K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C.
Shields, and E. M. Belding-Royer, "Authenticated routing
for ad hoc networks," Selected Areas in Communications,
IEEE Journal on, vol. 23, pp. 598-610, 2005.
[16]. H. Shahnawaz, S. Gupta, and C. Mukesh, "Denial of
Service attack in AODV & friend features extraction to
design detection engine for intrusion detection system in
Mobile Adhoc Network," in Computer and Communication
Technology (ICCCT), 2011 2nd International Conference
on, 2011, pp. 292-297.
[17]. I. Ullah and S. U. Rehman, "Analysis of Black Hole
attack on MANETs Using different MANET routing
protocols," School of Computing Blekinge Institute of
Technology, Sweden, 2010.
[18]. M. Tanase, "IP spoofing: an introduction," Security
Focus, vol. 11, 2003.
[19]. G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-
Royer, and R. A. Kemmerer, "An intrusion detection tool
for AODV-based ad hoc wireless networks," in Computer
Security Applications Conference, 2004. 20th Annual, 2004,
pp. 16-27.
[20]. Z. Zhou, "Security enhancement over ad-hoc AODV
routing protocol," Tsinghua University, Beijing, zhou-
zw02@ mails. tsinghua. edu. cn, 2007.
[21]. P.Kamra, T. P. Singh, and Dr. R. K. Singh,
"Preventing Black hole Attacks in Mobile adhocNetworks:
A Review," in Proc. of the Intl. Conf. on Recent Trends In
Computing and Communication Engineering – RTCCE,
2013.