This document summarizes various approaches for providing security in mobile ad hoc networks (MANETs). It discusses solutions that use cryptography and public/private keys to secure routing, as well as approaches based on trust, observation, and reputation. It also reviews methods for detecting node capture attacks and forged routing messages. The document surveys the strengths and limitations of different secure methods and their tradeoffs between security and efficiency.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for
network security.
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for
network security.
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
Security has become a primary concern in order to provide protected communication between
mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics
of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as
open peer-to-peer network architecture, shared wireless medium, stringent resource constraints,
and highly dynamic network topology. These challenges clearly make a case for building
multifence security solutions that achieve both broad protection and desirable network
performance. So,we focus on the fundamental security problem of protecting the multihop
network connectivity between mobile nodes in a MANET. We identify the security issues related
to this problem, discuss the challenges to security design, and review the state of-the-art security
proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
Millions of people all over the world are now connected to the Internet for doing business. Therefore, the demand for Internet and web-based services continues to grow. So, need to install required infrastructure to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need to be developed. The researchers are working in this direction to have the better solution for security. In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an extensive review has been made on the different security aspect, different types of attack and techniques to sustain and block the attack in the distributed environment.
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
Millions of people all over the world are now connected to the Internet for doing business. Therefore, the
demand for Internet and web-based services continues to grow. So, need to install required infrastructure
to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need
to be developed. The researchers are working in this direction to have the better solution for security.
In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an
extensive review has been made on the different security aspect, different types of attack and techniques to
sustain and block the attack in the distributed environment.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...IJNSA Journal
As a distributed technology, blockchain has been applied in many fields. Much research has been done on its inherent security issues. Among these security issues, double spending is one of the most pernicious. Current countermeasures are not systematic, they either focus on monitoring or detection with no effective strategy to prevent future double spending. These countermeasures also have serious drawbacks, such as high network traffic, high CPU utilization, and heavy management overhead. In this paper, we present a systematic approach to address double spending attack on smart grid. A reputable node is selected, which constantly compares all transactions in current time window with previously validated block and current block. Upon discovering conflicting transactions, a warning message with the conflicting transaction and two penalty transactions are broadcasted to the network to stop the current attack and to prevent future attacks. Our experiment has demonstrated our design is highly effective to detect double spending, with short detection time and low CPU utilizations.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Similar to Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
1. Comprehensive Study of Counter-acting Security Threats in Mobile
Ad Hoc Networks
Srinivasan Venkataramani
Easwari Engineering College, TamilNadu, India
Email: DrSrinivasanVenkataramani@gmail.com
Abstract
The security threats are critical in Mobile Ad Hoc Networks (MANETs), when deploying secure
applications especially considering the confidentiality of the data that can be compromised. In
usual communication networks, there is a need to establish ad hoc temporary connections in many
scenarios. Data transfer in this ad hoc wireless network is important and it is not easy to establish
the large infrastructure. When data is highly confidential, then it is a challenging task to provide
security particularly in the malicious environment. Many papers proposed various solutions as to
counter-act internal and external security attacks. However, most solutions have certain trade-offs.
There are some methods designed only to counter-act specific attacks. Others provide solutions
to counter-act general attacks but consider the factors such as delay, high resource utilization.
This paper surveys many security solutions that have been developed from in the past years. We
present the current approaches in the development of secured systems. These methods can be
used by simple approaches to enhance the security with small complexity. To the best of our
knowledge,there is no other surveys that discusses the new secured methods in the literature.
Keywords: Security Threats, Mobile Ad Hoc Networks
1 Introduction
There are many other immense challenges and security requirements which we need to contemplate
before deploying MANETs. Many researchers proposed their solutions [1], [2] which provide excellent
security but they require very complex computations and consume a lot of resources like memory,
bandwidth etc. They have reduced the effect of various attacks but still they are insufficient and
become compromised in some attacks [3], [4]. Other solutions [8], [24], [34], [35] are better in
terms of providing some extent of quality of services (low memory utilization, low bandwidth, low
power etc.) but they are also promising with certain type of attacks [24], [25]. This has become
a big tradeoff between choosing those secured methods that consume a huge amount of resources
(large memory, high bandwidth utilization and heavy processors for high computations), and those
methods that consume fewer resources but are susceptible to various attacks. In this paper, we have
explored different approaches of those secured methods which use a large number of resources and
computations (encryption/ decryption/ digital signatures etc.) and those which uses simple methods
(trust/ observation/ reputation etc.). Then we surveyed most common types of attacks and different
solutions proposed for their alleviation. Following we have summarized the secure methods, their
assertions, assumptions, metrics, positive and negative aspects. We have tried to extract out the
expedient information from the reviewed papers and then finally we have presented our outlooks on
the various research areas that can be defined and explored based on the problems we will discuss.
From this survey paper, researchers who are interested in the area of security aspects of MANETs
1
2. will have the distinct notion about security issues and different approaches which can be used for
providing better security. Further study can be initiated from a clear perspective of choosing which
methods are appropriate according to the area of interest.
2 Survey of Proposed Solutions
Frequently changing wireless links in MANETs makes it susceptible to attack. Thus, the first step
before sharing information is to discover the most secured routes which can be only accessed by the
authorized users. Many protocols proposed claim their approaches to be most secured. Security
routing protocols can be cryptographic based, trust based, observation based, reputation based
and others. In cryptographic based techniques [1], [5], [19], asymmetric and symmetric keys are
distributed among nodes to protect the messages from being tampering and losing their integrity.
But encryption/decryption schemes are not suitable for resource-constrained devices.
2.1 Trusted Certificate Server Approach
[19] proposed the use of a trusted certificate server to generate cryptographic certificates for each
node that wants to enter into the network and a public key which is known to all legal nodes. Keys
are created and exchanged through an existing relationship between server and each node. Before
arriving in to the network, each node must request a certificate from server. Each node obtains
exactly one certificate after securely verifying their identity to server. All nodes must retain fresh
certificates with the trusted server. Using this certification, source verifies that the intended target
was reached. In this process, when a node gets route discovery message, it sets up a reverse track
back to the source by recording the neighbor’s id from which it received the route discovery message.
The destination then uncast the route reply message through that reverse track back to the source.
Each node in the track checks the previous node’s signature, updates its routing table with the
address of the node that send it RDP packet, signs the original contents of the message, removes its
certificate and signature and attaches its own certificate and then forward the message. This is done
to prevent alterations in the route discovery packets in transit. Figure 1 shows its route discovery
mechanism.
2.2 Public/Private Key Approach
[1] proposed a protocol with each mobile node has a public/private key pair which is certified from
a certificate authority. Every pair of source/destination has a shared secret key. TESLA is used
as an authentication protocol. To use TESLA for authentication, each sender chooses a random
initial key and generates a one-way key chain by computing a oneway hash function again and again.
To authenticate any received value on the one-way chain, an equation is applied to verify if the
computed value matches an earlier known authentic key on the chain. Each sender predetermines a
time schedule at which it discloses each key of its one-way key chain, in the reverse order from their
creation. It is assumed that each node can obtain an authentic TESLA key from the distribution
center. Legitimate keys are bootstrapped between pairs of nodes. Route discovery process is initiated
by key distribution centre with a special reserved address as target. This address is not the address
of any real node. It then uses each returned path to send legitimate keys to each node in the network.
This process repeats when a node requests a shared key with any other node and also to KDC, in
route reply that node sends the list of nodes for which it requests keys. Before sending the packet,
the sender adds a message authentication code (MAC) computed using key. Since the receiver knows
the sender’s clock may be faster by 1, packet is discarded if the key has already been published or
2
3. unless it is received at least 1 before the scheduled key release time. When it is verified that the
packet’s key is not yet published, receiver buffers the packet and waits for the sender to publish key.
2.3 Node-capture Attack Detection
[34] provided two methods to detect the node capture: Simple Distributed Detection (SDD) which
uses local information on nodes and Cooperative Distribution Detection (CDD) which uses the local
nodes cooperation. These two methods are based on the simple observation that if a node (e.g. node
A) does not re-meet another node (e.g. node B) within a specific time then it is possible that node B
has been captured. This protocol uses random way-point mobility model [35] and specifically trusts
on the honest node re-meeting time to collect overall information about the presence of other nodes
in network. The SDD is an event based method. Each node set the corresponding meeting time
to the value of its internal clock and starts the corresponding time-out that expires after k seconds.
When two nodes meet, they execute the method, SDD-Meeting. If it is received before the Maximum
Interval Time (MIT), then the counter for node B is reset to 1 and if received after MIT, then the
counter is incremented by 1. It is to avoid false positive alarms. In CDD, nodes share information
only when cooperative nodes are present within the same range of communication. It uses the same
method trace used for SDD. If two nodes e.g. node A and node B are tracing the third node e.g.
node C, then the two nodes compare their meeting time with third node when they last met.
2.4 Forged Routing Messages Detection
[33] proposed Intrusion detection system based on OLSR (optimized link state routing) protocol.
This protocol tries to thwart attack which is made by legitimate nodes present in the network. It
also works where cryptographic based solution doesn’t work. It can be implemented on all nodes in
the network. Nodes continuously evaluate the semantics of routing message and then act accordingly.
When an intruder is spotted, alerts are signaled and they are banned. It checks before taking its
decision- is untrusted node an intruder or not? And accordingly implies a low false positive rate. It
focuses on detection of generation of fake topology control (TC) messages because they can create
confusions in the whole network if disseminated. When a node receives a TC message, according
to its local topology statistics, it checks if the initiator of this TC message is 1-hop distance from
the common announced MPR selector node or if the common announced MPR selector node had
actually nominated the TC originator node as MPR and then assigns one of the three statuses
(normal, suspected or intruder) to its originator. After updating its topology table, receiver then
forwards its TC message.
2.5 Misbehaving Watchdog
[8] explain that Watchdog recognizes misbehaving nodes and a Pathrater supports the routing pro-
tocols to avoid these nodes. It is supposed that all routing nodes do not misbehave. When a node
forwards the packet, Watchdog promiscuously listens in the network and confirms that the next
node in the path also forwards the packet. If the next node does not forward the packet, then it is
confirmed as misbehaving. By using this information, Pathrater selects which route is best to deliver
the packets. They have implemented the watchdog by maintaining a buffer of newly sent packets and
compare each listened packet with the packet stored in the buffer to see if there is a match. There is
certain failure threshold, if it is excesses, then the node is determined to be misbehaving and source
is notified about it. Pathrater calculates the negative value path metric to indicate the presence of
suspected nodes in the path. The nodes having negative ratings are suspended for some time until
3
4. their ratings are increased to nonnegative values. Pathrater uses Send extra Route Request (SRR)
to find a new routes if the well-known route holds only misbehaving nodes.
2.6 Route Request Packet Approach
[32] explain that security mechanism is made into the route request packets. Sender sends route
request packets with some metric based on its security and authenticity. On receiving this packet,
Intermediate nodes check this packet’s security level. If they find it authentic, they forward or reply
accordingly otherwise drop it. After discovering the secured route by testing the required security
metric on each intermediate node, route reply message is sent back by the receiver node. In this
protocol, packets are encrypted using a symmetric encryption/decryption key which is generated
with respect to different trust levels. Nodes can only read the route request packets or route reply
packets of their trust level. Moreover the floating packets of higher or lower trust level are supposed
to be dropped if they are interrupted by a malicious node because node filters packets that belong to
its trust level. So this mechanism of broadcasting the routing packets by confirming their trust levels
can help in the discovery of attacks by eavesdroppers. It also offers some cryptographic techniques
like digital signatures and encryption to check alteration. This protocol finds the assured secured
route between two nodes.
2.7 Redundant Routing Message Approach
[30] proposed protocol that uses redundant copies of routing messages to spot internal attacks. Pair
wise secret keys are used between source and destination and intermediate nodes along the established
path to protect route discovery messages. Also based on the observations, the node builds the trust
on its neighboring nodes by creating a local Certificate Repository. It is assumed that each node
in the network is initialized with a unique address and pair of public/private keys embedded into
it. Also they can form a self-organized Public Key Infrastructure by relating the current CR and
present maintenance methods for public key management. When a node starts a route discovery
process, it chooses a random number, signs it with its private key and uses key hash function to
protect the route discovery message. Finally, the signature and key hash value is appended to the
route discovery message which is sent to its neighbors hop by hop until it gets reached to target. To
choose a more optimal path, if two nodes show same level of trust, then hop counts are measured,
if hop counts are also same then their performance is checked. When receiver (intermediate) gets
route request message, it computes the trustworthiness quality index (TQI) and appends it to the
route request message along with QoS information before forwarding to next hop.
2.8 Reputation Approach
[43] proposed protocol that uses reputation based scheme. The protocol observes the behavior of
other nodes and rates each node accordingly. Rating is first set to zero, which increments by +1
on every positive action and decrements by -2 on every negative action. Negative threshold is set
to -40 below which the node is added to a list of faulty nodes. The source node forwards the data
packets to the highest reputation node. Intermediate nodes also forward the data packet to the
highest reputation hop till it reaches to the destination node. The destination node acknowledges a
signed DACK (data Acknowledgment packet) to the source that modifies its reputation values table
by recommending +1 to the first hop of reverse route. Subsequently all the intermediate nodes in
the route recommends +1 to their corresponding next hop in the route. Each node stores a Route
Ranker Table to store the reputation values of each node based on its direct observations on that
node. If two next-hop nodes have the same reputation values then randomly anyone is chosen by
4
5. the source node and that information is also stored in sent-table. If DACK is not received by source
node in specified time set by source’s timer, it recommends -2 to the first hop of that route and
removes its entry from the sent-table after the time-out expires. Intermediate nodes also recommend
-2 to their next hop in the route up to that selfish node who dropped the packet and removes the
corresponding entries from their tables on time-out expire. If the reputation value of the next hop
falls below -40 (threshold value) then it is temporally suspended from the node’s routing table and
an error message is sent to the upcoming nodes in its path. Later this suspended node can re-join
the network with the reputation value initialized to zero. This process aims to prevent selfish nodes
from dropping packets because source nodes only choose the nodes with higher reputation values to
forward their data packets and selfish nodes need to maintain their reputation constant in order to
receive the packets.
2.9 Firewalls
[39] focus on attack which tries to drain the battery of nodes in the network. This scheme is
based on ROFL (Routing as the Firewall Layer) mechanism [40] and sets some constraints on the
network nodes and the services provided to these nodes. When a service is advertisement to some
particular network, only nodes of that particular network can access that service. They cannot access
services which are not advertised for them. Before passing any service announcement to a node, the
node is first been checked that whether it is authorized to access or not. To stop the advertised
service, the routing metric M is set to infinity, and then this infinity route is advertised. Destination
address provides services to only those nodes that come under the list of approved source prefixes.
Immediately, the packet is dropped if it is forwarded from a source address which is not listed in the
source prefix filtering (SPF) constraints of a corresponding route. This packet filtering is applied by
layering it on top of routing. Underlying routing protocol provides the pattern (i.e. unicast, multicast
or broadcast) for distributing routing information. Once a path between source and destination node
is created by underlying routing protocol, each node in that path refers to its local routing table to
match the routing announcement and if the same matched announcement is found, then its source
prefix constraint is extracted i.e. data packet’s header contents (source, destination address and
destination port number) and checked before the receiver takes its forwarding decision. If it is
forwarded from an authorized node, then it is passed to upper layer otherwise it is discarded. To
implement this scheme in AODV, only route reply packet’s information of AODV is replaced with
service specific announcement (SPF constraints, destination port address, service port address etc.).
And then this route announcement is distributed into the network on getting route request and in
case of OLSR, these announcements are distributed by flooding Topology Control (TC) messages
into the network.
2.10 Double-layer Transport Layer
[42] used double-layer scheme that detects attacks at the transport layer but responds to them at
the network layer. It implements four modules. First is watch nodes (LS) module that monitors and
detect misbehavior nodes, second is node isolation algorithm (NIA) that isolates the infected nodes
from the honest node’s list. Third is congestion window surveillance (CWS) module that verifies if
the node has fault or compromised because CW size may be increased due to congestion in network.
Last is alternate route finder (ARF) module. If CWS sees any abnormalities, it calls ARF to find or
build a new path. LS module builds a list that contains each node’s first-hop neighbors and neighbors
of each first hop’s neighbor in the end of neighbor discovery process. This is created to first monitor
the presence of any malicious nodes and later isolate them from the network using NIA. This process
is assumed to be secure and it is done only once in the whole life span of a node. There is no
5
6. exchange of packets between the nodes which are not neighbors. The node maintains information
of its second-hop neighbor to verify if a received packet forwarded from its one hop neighbor has
actually forwarded from its second hop neighbor or not. A watch buffer and a malicious counter are
maintained in the each node to monitor the packets exchanged between its neighbors. Each entry in
the buffer is time stamped and has a time threshold. Malicious counter monitors the length of sliding
window and it increments for the node which is detected as malicious by the watch node. These
increments depend upon the type i.e. either the packet is fabricated or dropped by the malicious
node. To avoid failures (intentionally or by fault) caused by a legitimate node, a node is declared as
a misbehavior node and revoked from its neighbor’s list, if its malicious counter exceeds threshold.
It is done by announcing an authenticated alert message to each of its neighbors using shared keys
to prevent from false announcements.
3 Future Research Directions
The flexibility of MANETs are very attractive for military and disaster recovery applications. More-
over mobile devices are getting smaller, cheaper, more powerful and more mobile every day. In the
future MANETs will likely be a part of our lives. There has been much research on this promising
new networking. Security is one of the hot topics in the area due to new security threats MANETs
have introduced. The threats to MANETs have been examined in many research papers. However
more research needs to be done on identifying new security threats. We believe that with the increase
in the use of MANETs, new intrusions are going to emerge continuously.
MANETs are prone to attacks from the intruders. Different security mechanisms have been
proposed in the past to provide security in MANETs. In this paper we have tried to compare the
advantages and drawbacks of several approaches. The purpose of doing so is to provide a guideline
towards development of a secure routing protocol and the conditions that make the environment so
prone to attacks. So in future maintaining rate of node’s mobility and topologies in the network
is required. Also distributing use of batteries and other power resources and eliminating tradeoffs
between rate of battery consumption and updating nodes due to frequent topological changes is also
required. Some other factors also should be taken into account like distribution and use of available
bandwidth, providing physical safety to the network bodies, increasing size of network, signal fading
and jittering due to large number of multi hops and setting up of minimum and maximum rate
of transmission power, eliminating tradeoffs between packet delivery and time delay, eliminating
tradeoffs between bandwidth capacity and congestion and distributing authorized access to every
node in the network.
The methodology or the protocol which is to be developed should also take care of the other
aspects of the network which are very important as far as providing security or avoiding threats are
concerned. These are provision of security in all seven layers of OSI, detecting number of malicious
nodes and formulating malicious activities in the network, Maintaining traffic rate of control/data
packets according to the type of traffic (Constant Bit Rate or Varying) and setting up the minimum-
maximum rate, routing load balancing, Medium Access Control methods for channel contention,
reducing tradeoffs between application aspects and security aspects, focusing maximum route avail-
abilities and finding shortest route from them and maintaining periodic routing table information
proactively and reactively.
References
[1] Y.C. HU, A. Perrig, and D. B. Johnson, “ARIADNE: a secure on-demand routing protocol for
ad hoc networks,” in Proc. MOBICOM, 2002, pp. 12-23.
6
7. [2] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in Proc. CNDS,
2002.
[3] Y.-C. HU, A. Perrig, and D.B. Johnson, “PACKET LEASHES: a defense against wormhole
attacks in wireless networks,” in Proc. INFOCOM, 2003, pp.1976-1986.
[4] Y.-C. HU, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network
routing protocols,” in Proc. WISE, 2003, pp. 30-40.
[5] D. Liu and P. Ning, “Efficient distribution of key chain commitments for broadcast authentication
in distributed sensor networks,” in Proc. NDSS, 2003, pp. 263-276.
[6] B. Awerbuch, D. Holser, C. Nita-rotaru, and H. Rubens, “An On demand secure routing protocol
resilient to byzantine failures,” in Proc. WISE, 2002, pp. 21-30.
[7] S. Buchegger and J.Y. Le boudec, “Nodes bearing grudges: towards routing security, fairness,
and robustness in mobile ad hoc networks,” in Proc. PDP, 2002, pp. 403-410.
[8] S. Marti, T. Giuli, k. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc
networks,” in Proc. MOBICOM, 2000, pp. 255-265.
[9] W. Yu, Y. Sun, and K. J. R. Liu, “Hadof: defense against routing disruptions in mobile ad hoc
networks,” in Proc. INFOCOM, 2005, pp. 1252-1261.
[10] Pradip M. Jawandhiya, Mangesh Ghonge, M.S. Ali and J.S. Deshpande, “A Survey of Mobile
Ad Hoc Network Attacks“, IJEST, 2010, pp. 4063-4071.
[11] L.Tamilselvan, V.Sankaranarayanan, “Prevention of Black hole Attack in MANET,” Proc.
AusWireless, 2007, pp. 21- 26.
[12] S.Lee, B.Han, and M.Shin, “Robust Routing in Wireless Ad Hoc Networks,” ICPP Workshop,
2002, pp. 73-78.
[13] M.A.Shurman, S.M.Yoo, and S.Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM
SE, 2004, pp. 96-97.
[14] S.Kurosawa, H.Nakayama, N.Kato, A.Jamalipour, and Y.Nemoto, “Detecting Black hole Attack
on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” IJNS, 2007, pp. 338-
346.
[15] Y.C.Hu, A.Perrig, and D.Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC,
2006, pp. 370-380.
[16] L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc
Networks Through Statistical Analysis of Multi-path,” IEEE WCNC, 2005, pp.2106-2111.
[17] X.Su, R.V.Boppana, “On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks,”
Proc. ICC, 2007, pp. 1136-1141.
[18] M.A.Gorlatova, P.C.Mason, M.Wang, L.Lamont, R. Liscano, “Detecting Wormhole Attacks
in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis,” Proc.
MILCOM, 2006, pp. 1-7.
[19] K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields and E. M. Belding-Royer, “A
Secure Routing Protocol for Ad Hoc Networks,” in Proc. ICNP , 2002, pp. 78-87.
7
8. [20] W. Yu, Y. Sun, and K. J. R. Liu, “Hadof: defense against routing disruptions in mobile ad hoc
networks,” in Proc. INFOCOM, 2005, pp. 1252-1261.
[21] Joshua Wright, GCIH, CCNA, 2003, Detecting wireless LAN MAC addresses spoofing, technical
document.
[22] Gayathri Chandrasekaran, John-Austen Deymious,Vinod Ganapathy, Marco Gruteser, Wade
Trappe, “Detecting Identity Spoofs in 802.11e Wireless Networks“, In Proc. GLOBECOM, 2009,
pp.4244-4147.
[23] S. Murphy, “Routing Protocol Threat Analysis,” Internet Draft, draft-murphy-threat-00.txt,
2002.
[24] J. F. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” in
Proc. Wksp. Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000, pp. 7-26.
[25] J. Hubaux and E. W. Knightly, “Denial of service resilience in ad hoc networks,” in Proc.
MOBICOM, 2004, pp. 202-215.
[26] Lin, R.Lu, H.Zhu, P.H.Ho, X.Shen and Z.Cao, “ASRPAKE: An Anonymous Secure Routing
Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks,” in Proc. ICC, 2007,
pp. 1247 - 1253.
[27] Kejun Liu, Jing Deng, Member, Pramod K. Varshney and Kashyap Balakrishnan,”An
Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs“, IEEE
TMC, 2007.
[28] C. Kaufman, R. Perlman, and M. Speciner, “Network Security Private Communication in a
Public World“, Prentice Hall PTR, A division of Pearson Education, Inc., 2002.
[29] Ming Yu , Mengchu Zhou and Wei Su , “A Secure Routing Protocol Against Byzantine Attacks
for MANETs in Adversarial Environments“,in Proc. IEEE Vehicular Technology Society, 2009
pp. 449 - 460.
[30] S. Albert Rabara and S.Vijayalakshmi, “Rushing attack mitigation in multicast manet
(RAM3)“, in Proc, IJRRCS, 2010, pp. 131-138.
[31] Xu Su, Dissertation, “Integrated prevention and detection of Byzantine attacks in mobile ad
hoc networks“, University of Texas at San Antonio, 2009.
[32] S. Yi, P. Naldurg, and R. Kravets, “A Security-Aware Routing Protocol for Wireless Ad hoc
Networks“, in Proc. MOBIHOC, 2002 pp. 286-292.
[33] A. Fourati; K. Al Agha, “Detecting forged routing messages in Adhoc networks“, Springer
published on nov, 2008, pp.205 - 214.
[34] M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, “Emergent properties: Detection of the
node-capture attack in mobile wireless sensor networks“, ACM WiSec, 2008 pages 214-219.
[35] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. “A performance comparison
of multi-hop wireless ad hoc network routing protocols“ in Proc. MOBICOM, 1998, pages 85-97.
[36] S. Ganeriwal, S. Capkun, C. C. Han and M. B. Srivastava. Secure time synchronization service
for sensor networks. In WiSe, 2005, pages 97-106.
8
9. [37] K. Sun, P. Ning, and C. Wang, “Fault-tolerant cluster-wise clock synchronization for wireless
sensor networks“ TDSC, 2005, pg.177-189.
[38] S. Bansal and M.Baker,” Observation-based Cooperation Enforcement in ad hoc network“, July
2003.
[39] H. Zhao and S. M. Bellovin, “High Performance Firewalls in MANETs“ Proc. MSN, 2010 pages
154-160.
[40] H. Zhao, C.-K. Chau, and S. M. Bellovin, “ROFL: Routing as the firewall layer,” in New Security
Paradigms Workshop, September 2008.
[41] T. Eissa; S. A. Razak; R. H. Khokhar; N. Samian, “Trust-Based Routing Mechanism in MANET:
Design and Implementation“, Springer, Mobile Networks and Applications June 2011.
[42] H. N. Saha, D. Bhattacharyya, A. K. Bandhyopadhyay and P. K. Banerjee, “Two-Level Secure
Re-routing (TSR) in Mobile Ad Hoc Networks“ Proc. MNCAPPS, 2012 Pages 119-122.
9