This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
Routing is an important operation in ad hoc wireless networks that provides communication between wireless devices. This document discusses the challenges of routing in these networks due to their dynamic topology and lack of infrastructure. It describes several routing protocols for ad hoc wireless networks, including proactive protocols like DSDV, reactive protocols like AODV and DSR, and hybrid protocols like ZRP. Secure routing is challenging in ad hoc wireless networks due to their vulnerability to security attacks.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
Routing is an important operation in ad hoc wireless networks that provides communication between wireless devices. This document discusses the challenges of routing in these networks due to their dynamic topology and lack of infrastructure. It describes several routing protocols for ad hoc wireless networks, including proactive protocols like DSDV, reactive protocols like AODV and DSR, and hybrid protocols like ZRP. Secure routing is challenging in ad hoc wireless networks due to their vulnerability to security attacks.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
This document summarizes research on malicious nodes in wireless ad hoc networks and mechanisms to defend against them. It discusses how malicious nodes can disrupt network operations through various attacks. It then overviews several techniques that have been developed to identify and isolate malicious nodes, including watchdog-based intrusion detection, trust/reputation-based systems, and anomaly detection approaches. The document analyzes the advantages and limitations of these different defensive mechanisms.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
This document provides a brief overview of attractions in London including museums such as the British Museum, National Gallery and Tate Gallery. It also mentions parks like St. James Park, Hyde Park and Green Park as well as education and entertainment opportunities. The document conveys greetings and thanks the reader for their attention.
The document summarizes a research paper about protecting web applications from SQL injection attacks. It discusses how SQL injection is a common attack that allows hackers to steal or modify database information. The paper proposes applying a hybrid encryption method involving AES and Rabin cryptography to the login phase of a web application. This would encrypt username and password data before it is sent to the server to help prevent unauthorized access to the database in the case of an SQL injection attack. It also discusses related work on SQL injection prevention and provides an implementation example of the proposed hybrid encryption method using PHP and MySQL.
This document summarizes a research paper on the design of a ring-oscillator-based injection-locked frequency divider with improved locking range and low power consumption using the Vernier method. Key points:
1) The design presents a ring-oscillator frequency divider that uses single-phase injection rather than multi-phase injection to achieve a wide locking range in a simple way.
2) Simulation results show that the divide-by-3 design has a locking range of 1.9 GHz and consumes 0.25 mW of power, while the divide-by-5 design has a locking range of 1.4 GHz and consumes 0.93 mW of power, both at a 1V
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
This document summarizes research on malicious nodes in wireless ad hoc networks and mechanisms to defend against them. It discusses how malicious nodes can disrupt network operations through various attacks. It then overviews several techniques that have been developed to identify and isolate malicious nodes, including watchdog-based intrusion detection, trust/reputation-based systems, and anomaly detection approaches. The document analyzes the advantages and limitations of these different defensive mechanisms.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
This document provides a brief overview of attractions in London including museums such as the British Museum, National Gallery and Tate Gallery. It also mentions parks like St. James Park, Hyde Park and Green Park as well as education and entertainment opportunities. The document conveys greetings and thanks the reader for their attention.
The document summarizes a research paper about protecting web applications from SQL injection attacks. It discusses how SQL injection is a common attack that allows hackers to steal or modify database information. The paper proposes applying a hybrid encryption method involving AES and Rabin cryptography to the login phase of a web application. This would encrypt username and password data before it is sent to the server to help prevent unauthorized access to the database in the case of an SQL injection attack. It also discusses related work on SQL injection prevention and provides an implementation example of the proposed hybrid encryption method using PHP and MySQL.
This document summarizes a research paper on the design of a ring-oscillator-based injection-locked frequency divider with improved locking range and low power consumption using the Vernier method. Key points:
1) The design presents a ring-oscillator frequency divider that uses single-phase injection rather than multi-phase injection to achieve a wide locking range in a simple way.
2) Simulation results show that the divide-by-3 design has a locking range of 1.9 GHz and consumes 0.25 mW of power, while the divide-by-5 design has a locking range of 1.4 GHz and consumes 0.93 mW of power, both at a 1V
This document analyzes the dynamic behavior of sandwich composites with delaminations through analytical and finite element modeling. It presents:
1) An analytical formulation to model the free vibration of sandwich beams with single or multiple delaminations, representing the beam as segmented Euler beams joined at delamination boundaries.
2) Experimental validation showing delaminations reduce natural frequency and change mode shapes compared to intact beams.
3) Finite element analysis in ANSYS correlating with experiments.
4) Use of strain plots to identify delamination location and extent, improving on prior methods. The formulation is extended to multiple delaminations, providing insights into their complex effects on sandwich composite behavior.
A Novel Multi- Viewpoint based Similarity Measure for Document ClusteringIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Fitting Probability Distribution Functions To Discharge Variability Of Kaduna...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Abstract: Noise in an image is a serious problem In this
project, the various noise conditions are studied which are:
Additive white Gaussian noise (AWGN), Bipolar fixedvalued impulse noise, also called salt and pepper noise
(SPN), Random-valued impulse noise (RVIN), Mixed noise
(MN). Digital images are often corrupted by impulse noise
during the acquisition or transmission through
communication channels the developed filters are meant for
online and real-time applications. In this paper, the
following activities are taken up to draw the results: Study
of various impulse noise types and their effect on digital
images; Study and implementation of various efficient
nonlinear digital image filters available in the literature
and their relative performance comparison;
Improving Distribution Feeders for Photovoltaic Generation by Loop Power Cont...IJMER
1) The document discusses using a Loop Power Controller (LPC) to improve distribution feeder loading balance for systems with high photovoltaic (PV) generation. The LPC controls real and reactive power flows between feeders by adjusting voltage ratio and phase shift.
2) A control algorithm is developed for the LPC to minimize loading imbalance and power losses based on hourly PV generation and load profiles from a distribution automation system.
3) Simulation results on Taiwanese distribution feeders show the LPC improves loading balance and reduces losses compared to conventional reconfiguration methods affected by intermittent PV generation.
The document discusses Kosovo's energy strategy and its focus on increasing energy security, diversifying energy sources, and protecting the environment. It aims to stimulate efficient energy use and increase use of renewable resources. Currently, Kosovo's energy system relies heavily on thermal power generation from lignite, producing high emissions. The strategy proposes developing a new lignite power plant called "New Kosovo" to gradually replace aging facilities and meet future demand under two economic growth scenarios. It also discusses integrating Kosovo's energy sector with regional and European energy policies and markets.
This presentation was given to the master class Environment and Development (ENP 33306) under the Social Sciences Group at the Wageningen University (April 22,2015). The core of the topic is upgrading in the value chain. The elements in the vertical and horizontal dimensions of the value chain and the capabilities literature are the theoretical lens used to gain a deeper understanding of upgrading. The theory has been applied to the cases of Philippine tuna fishery.
Receiver Module of Smart power monitoring and metering distribution system u...IJMER
In the current situation all the communication is very much important and faster range but
the usage of the power should be less in order to reduce the power and the usage of the sources we are
going for this data transmission through the power lines which is common and much feasible since
power line is used at all homes. In this paper we have concentrated much in the receiver module where
the receiver receives the data through the power lines through which we can know the readings of
amount of usage of power at each homes and also the power theft if it occurs anywhere.by this way we
no need to generate any particular infrastructure for transmitting an d receiving instead we can use the
power line itself.This is the work done in NLC,TAMILNADU india which is very less explained in this
paper.
This document presents a method for speeding up fractal image compression using genetic algorithms. Fractal image compression explores self-similarity in images to compress them but the search for similar domain blocks is time-consuming. The proposed method uses genetic algorithms to more efficiently search for similar domain blocks. Experimental results on several test images show that the genetic algorithm approach can compress images faster than standard fractal compression with acceptable image quality and compression ratios. Key parameters like population size and error threshold that affect the genetic search are also analyzed.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
Methodology used for improving overall equipment effectiveness by Implementi...IJMER
The global marketplace is highly competitive and organizations who want to survive long-term, have to continuously improve, change and adapt in response to market demands. Improvements in
a company's performance should focus on cost cutting, increasing productivity levels, quality and
guaranteeing deliveries in order to satisfy customers. Total Productive Maintenance (TPM) is one
method, which can be used to achieve these goals. TPM is an approach to equipment management that
involves employees from both production and maintenance departments. Its purpose is to eliminate major
production losses by introducing a program of continuous and systematic improvements to production
equipment.
Associationship is an important component of data mining. In real world applications, the knowledge that is used for aiding decision-making is always time-varying. However, most of the existing data mining approaches rely on the assumption that discovered knowledge is valid indefinitely. For supporting better decision making, it is desirable to be able to actually identify the temporal features with the interesting patterns or rules. This paper presents a novel approach for mining Efficient Temporal Association Rule (ETAR). The basic idea of ETAR is to first partition the database into time periods of item set and then progressively accumulates the occurrence count of each item set based on the intrinsic partitioning characteristics. Explicitly, the execution time of ETAR is, in orders of magnitude, smaller than those required by schemes which are directly extended from existing methods because it scan the database only once.
This document discusses extremally β-disconnectedness in smooth fuzzy β-centered systems. It introduces the concept of maximal smooth fuzzy β-centered systems and defines the space (R) as the collection of all such systems belonging to a space R. Properties of maximal smooth fuzzy β-centered systems are proved. The space (R) is given a smooth fuzzy maximal structure and shown to be a smooth fuzzy β-compact space with a base of r-fuzzy β-open and β-closed neighborhoods. Finally, smooth fuzzy extremal β-disconnectedness is defined for a smooth fuzzy β-Hausdorff space R as the β-closure of any r-fuzzy β-open set
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmIJMER
- This paper deals with the Robotic arm controlled by arm and eye movements, where data
is acquired through the use of accelerometer and EOG amplifier. The hand movements are captured by
the Accelerometer and the eye movements are captured by EOG amplifier. The Robotic arm will pick
and place the object according to the movement of the hand and Robotic arm will move left and right
according to our eye movements. Signals are wirelessly transmitted through RF Encoder and Decoder.
Robotic arm is based on Arduino Duemilanove controller for signal processing, and interfaced with the
Controller serially. This Embedded system will help disabled persons to do work by their own. The
Robotic arm can be used to pick and place hazardous objects.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
This document discusses secure routing in ad hoc networks and various attacks. It begins with an abstract that introduces the need for secure and efficient communication protocols in ad hoc wireless networks. It then discusses types of attacks like external vs internal and passive vs active attacks. It reviews various routing protocols for mobile ad hoc networks like proactive, reactive, and hybrid protocols. It also discusses security issues in ad hoc networks and security requirements like confidentiality, authentication, integrity, availability, and non-repudiation. Finally, it discusses security mechanisms needed to address these security requirements.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
This document discusses different prediction methods for route recovery in mobile ad hoc networks (MANETs). It begins with an abstract discussing multiple path routing infrastructures in various networks. The document then provides background on ad hoc networks and discusses features of MANETs such as dynamic topologies and variable capacity links. It also introduces the Ad Hoc On-Demand Distance Vector (AODV) routing protocol and discusses topics like route discovery, link availability, and distributed hash tables in MANETs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
The International Journal of Engineering and Science (The IJES)theijes
The document summarizes a study on the Enhanced Adaptive Acknowledge (EAACK) scheme for detecting misbehaving nodes in mobile ad hoc networks (MANETs). It discusses the limitations of existing acknowledgment-based intrusion detection systems like Watchdog, TWOACK, and AACK in handling receiver collisions. The key issues related to acknowledgment-based schemes for detecting misbehavior in MANETs are addressed. The focus is on analyzing the limitations of acknowledgment approaches like AACK and studying EAACK as an improved approach for addressing receiver collisions in MANETs.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Dr2645024509
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
Security Attacks on Routing Protocols in Ad Hoc Wireless Networks
Simanta Sarma1, Binita Devi2
1
(HOD & Asstt. Professor, Department of Computer Science, S.B.M.S College, Sualkuchi, Assam, India)
2
(Senior Faculty, Surojit Academy, Assam)
ABSTRACT: In this Research paper we describe mobile ad hoc networking and Security Attacks on Routing Protocols in
Ad Hoc Wireless Networks. Moreover we discuss Characteristics of differentiate ad hoc wireless networks and Problems
about the routing protocols. We decisions of report Solutions for Routing Protocols in Ad Hoc Wireless Networks. This
paper we discuss Security and protection of Aware Ad Hoc Routing. We discuss for another process of modification of Ad
Hoc Wireless Networks and the security criteria of the mobile ad hoc network and present the main attack types that exist in
it. Finally we survey the current security solutions for the mobile ad hoc network.
KEY WORDS: Mobile Ad Hoc Wireless Network, Security, routing protocols, SAR, Secure Routing, ARAN, CONFIDANT,
SEAD.
I. Introduction
Mobile Ad-hoc Networks are a collection of two or more devices equipped with wireless communications and
networking Capability. These devices can communication with other nodes that immediately within their radio range. The
nodes can be regarded as wireless mobile hosts with limited power and constrained bandwidth. For the later, the nodes
should deploy an intermediate node to be the router to route the packet from the source toward the destination. Ad hoc
networks are self-configurable and autonomous systems consisting of routers and hosts, which are able to support modality
and organize themselves arbitrarily. This means that the topology of the ad hoc network changes dynamically and
unpredictably. Moreover, the ad hoc network can be either constructed or destructed quickly and autonomously without any
administrative server or infrastructure.
1.1. Characteristics of differentiate ad hoc wireless networks:
An ad hoc network has many characteristics that contrast sharply with fixed networks or last-hop wireless networks.
First, there is no infrastructure support. All routers are mobile and can communicate with each other only when they are in
transmission range. Second, ad hoc wirelesses nodes are resource constrained, with limited processing and memory capacity,
and are usually powered with batteries. Finally, the communication medium in an ad hoc wireless network, i.e., radio waves,
infrared, etc., can be easily eavesdropped. Hostile environments like battlefields or commando rescue operations are some of
the important target application areas for ad-hoc wireless networks. We get the different types of characteristics of ad hoc
networks. i.e.
1.1.1. Dynamic Network Topology:
This is triggered by node mobility, nodes leaving or joining the network, node inoperability due to the lack of power
resources, etc. Nonetheless, the network connectivity should be maintained in order to allow applications and services to
operate undisrupted.
1.1.2. Fluctuating Link Capacity:
The effects of high bit error rate are more profound in wireless communication. More than one end-to-end path can
use a given link in ad hoc wireless networks, and if the link were to break, could disrupt several sessions during period of
high bit transmission rate.
1.1.3.Distributed Operations
The protocols and algorithms designed for an ad hoc wireless network should be distributed in order to
accommodate a dynamic topology and an infrastructure less architecture.
Wireless devices are battery powered, therefore there is a limited time they can operate without changing or
replenish their energy resources. Designing energy efficient mechanisms are thus an important feature in designing
algorithms and protocols.
II. Attacks on ad hoc wireless networks
In this paper we are concerned with security of routing protocols in ad hoc wireless networks. Routing is an important
operation, providing the communication protocol for data delivery between wireless devices. Providing a secure system can
be achieved by preventing attacks or by detecting them and providing a mechanism to recover for those attacks. Attacks on
ad hoc wireless networks can be classified as active and passive attacks, depending on whether the normal operation of the
network is disrupted or not.
www.ijmer.com 4502 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
1.2. Passive Attack
In passive attacks, an intruder the data exchanged without altering it. The attacker does not actively initiate
malicious actions to cheat other hosts. The goal of the attacker is to obtain information that is being transmitted, thus
violating the message confidentiality. Since the activity of the network is not disrupted, these attackers are difficult to detect.
1.3. Active Attack:
In active attacks, an attacker actively participates in disrupting the normal operation of the network services. A
malicious host can create an active attack by modifying packets or by introducing false information in the ad hoc network. It
confuses routing procedures and degrades network performance. Active attacks can be divided into internal and external
attacks.
1.3.1. External Attack
External Attacks are carried by nodes that are not legitimate part of the network. In external attacks, it is possible to
disrupt the communication of an organization from the parking lot in front of the company office.
1.3.2.Internal Attack
Internal Attacks are from compromised nodes that were once legitimate part of the network. In ad hoc wireless
network as authorized nodes, they are much more severe and difficult to detect when compared to external attacks.
III. Problems about the routing protocols
In this paper, we examine there are different types of problems about the routing protocols. i.e.
First of all, consider the rapid passing pattern. We define the rapid passing pattern to be one node passing through the
whole network very quickly. Such a rapid passing node will generate the following affects to the whole network. First,
the topology of the network changed rapidly, which will lead to the lost of packets. Second, we have to modify every
node’s routing table that within the communication distance of the rapid-passing node, that will greatly improve the
consumption of the bandwidth and the overhead of the networks. Third, obviously there will be tremendous delay of the
data sending to the rapid-moving node.
Transmission between two hosts over a wireless network does not necessarily work equally well in both directions.
Thus, some routes determined by some routing protocols may not work in some environments.
Many routing protocols may create redundant routes, which will greatly increase the routing updates as well as increase
the whole networks overhead.
3.1. Energy Consumption of Wireless Ad-hoc Networks
Energy consumption is also one of the most important performance metrics for wireless ad hoc networks, it directly
relates to the operational lifetime of the networks. Energy consumption is also one of the most important performance
metrics because it directly relates to the operational lifetime of the network. Most research efforts are focused on
performance comparisons and trade-off studies between various low energy routing and self-organization protocols, while
keeping other system parameters fixed. As a result, very little has been revealed about the relationship between the aggregate
energy consumption and non-protocol parameters such as node density and network coverage area.
IV. Security in Wireless Ad-hoc Networks
Security is an important thing for all kinds of networks including the Wireless Ad Hoc Networks. It is obviously to
see that the security issues for Wireless Ad Hoc Networks are difficult than the ones for fixed networks. This is due to
system constraints in mobile devices as well as frequent topology changes in the Wireless networks. The system constraints
include low-power, small memory and bandwidth, and low battery power. Everybody knows that the core requirement for
military applications dealing with trust and security! That is to say, security is the most important issue for ad hoc networks,
especially for those security sensitive applications. The main Ad-hoc Networks applications of MANET are in military and
emergency, all these applications are security-sensitive. MENAT can not satisfy the security requirement of the applications
of the architecture of MANET. There are several factors of security that we should consider. In this process maintain and
develop of all military information secured in wireless ad-hoc networks.
4.1. Availability
First, Availability ensures the survivability of network services despite denial of service attacks. This security
criterion is challenged mainly during the denial-of-service attacks, in which all the nodes in the network can be the attack
target and thus some selfish nodes make some of the network services unavailable area.
4.2. Confidentiality
Confidentiality ensures that certain information is never disclosed to unauthorized entities. In other words, in order
to maintain the confidentiality of some confidential information, we need to keep them secret from all entities that do not
have the privilege to access them.
www.ijmer.com 4503 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
4.3. Integrity
Integrity guarantees that a message being transferred is never corrupted. A message can be removed, replayed or
revised by an adversary with malicious goal, which is regarded as malicious altering; on the contrary, if the message is lost
or its content is changed due to some benign failures, which may be transmission errors in communication or hardware errors
such as hard disk failure, then it is categorized as accidental altering.
4.4. Authentication
Authentication enables a node to ensure the identity of the peer node. If there is not such an authentication
mechanism, the adversary could impersonate a benign node and thus get access to confidential resources, or even propagate
some fake messages to disturb the normal network operations.
4.5. Non repudiation
Non repudiation ensures that the sender and the receiver of a message cannot disavow that they have ever sent or
received such a message. This is useful especially when we need to discriminate if a node with some abnormal behavior is
compromised or not: if a node recognizes that the message it has received is erroneous, it can then use the incorrect message
as an evidence to notify other nodes that the node sending out the improper message should have been compromised.
4.6. Authenticity
Authenticity is essentially assurance that participants in communication are genuine and not impersonators [4]. It is
necessary for the communication participants to prove their identities as what they have claimed using some techniques so as
to ensure the authenticity. If there is not such an authentication mechanism, the adversary could impersonate a benign node
and thus get access to confidential resources, or even propagate some fake messages to disturb the normal network
operations.
4.7. Anonymity
Anonymity means that all the information that can be used to identify the owner or the current user of the node
should default be kept private and not be distributed by the node itself or the system software. This criterion is closely related
to privacy preserving, in which we should try to protect the privacy of the nodes from arbitrary disclosure to any other
entities.
4.8. Ordering
Out-of-order updates can also affect the correctness of the routing protocols. These messages may not reflect the
true state of the network and may propagate false information. Ad hoc routing protocols have sequence numbers that are
unique within the routing domain to keep updates in order.
4.9. Timeliness
Routing updates need to be delivered in a timely fashion. Update messages that arrive late may not reflect the true
state of the links or routers on the network. They can cause incorrect forwarding or even propagate false information and
weaken the credibility of the update information. If a node that relays information between two large connected components
is advertised as "down" by malicious neighbors, large parts of the network become unreachable. Most ad hoc routing
protocols have timestamps and timeout mechanisms to guarantee the freshness of the routes they provide.
V. Security Aware Ad Hoc Routing (SAR)
We present a description of our protocol and its behavior and enumerate the metrics we deploy to measure the
quality of ad hoc routing security of an ad hoc route discovered by our protocol. Finally & originally, ad hoc routing
protocols were based on medications or augmentations to traditional routing protocols for wired networks [8]. These
protocols send updates and react to topology changes, using monitoring and other infrastructure support to maintain routing
tables. We study & developed the Current research focuses on pure on-demand [12, 17] routing protocols, and more recently,
on augmentations that exploit additional information available on the ad-hoc nodes [26, 20, 21] to improve the quality of
routes and reduce performance overheads. Most of the protocols that have been proposed so far focus on discovering the
shortest path between two nodes as fast as possible. Some protocols trade performance and simplified management to obtain
bounded sub-optimal paths to speed up the route discovery process [28, 16].
5.1. Protocol
Protocol is a set of rules created for the process of communication with another computer or with an operating
system. In the original protocol, when a node wants to communicate with another node, it broadcasts a Route Request or
RREQ packet to its neighbors. The RREQ is propagated to neighbors of neighbors and so on, using controlled flooding. The
RREQ packets set up a reverse path to the source of the RREQ on intermediate routers that forward this packet. Moreover,
SAR, we embed our security metric into the RREQ packet itself, and change the forwarding behavior of the protocol with
respect to RREQs. Intermediate nodes receive an RREQ packet with a particular security metric or trust level. SAR ensures
that this node can only process the packet or forward it if the node itself can provide the required security or has the required
authorization or trust level. Protocol maintain in rule regulation of Wireless Network.
www.ijmer.com 4504 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
5.2. Matrices of Protocol
We enumerate different techniques to measure or specify the quality of security of a route discovered by our
generalized SAR protocol. The first technique is the explicit representation of trust levels using a simple hierarchy that
reflects organizational privileges. SAR provides applications the ability to incorporate explicit trust levels into the route
discovery process. Most organizations have an internal hierarchy of privileges. SRP defends against attacks that disrupt the
route discovery process and guarantees to identify the correct topological information. The basic idea of SRP is to set up a
security association (SA) between a source and a destination node without the need of cryptographic validation of the
communication data by the intermediate nodes. For example, in our battlefield scenario, the military ranks of the users of the
ad hoc nodes form an explicit partial-ordering of privilege levels. A simple way of incorporating trust levels into ad hoc
networks is to mirror the organizational hierarchy, and associate a number with each privilege level. These numbers
represent the security/importance/capability of the mobile nodes and also of the paths. Simple comparison operators can sort
these levels to reflect their position in the actual hierarchy. We develop our notion of the “level of protection" associated
with security of information in transit in routing protocol packets. Specifically, in SAR, the aim is to protect any information
or behavior that can update or cause a change to the routing on cooperating nodes involved in an ad hoc routing protocol.
5.3. ARAN
A Secure Routing Protocol for Ad Hoc Networks (ARAN) [12] is an on demand protocol designed to provide
secure communications in managed open environments. Nodes in a managed-open environment exchange initialization
parameters before the start of communication. Each node in ARAN receives a certificate after securely authenticating its
identity to a trusted certificate server R. Nodes use these certificates to authenticate themselves to other nodes during the
exchange of routing messages. The certificate contains the node’s IP address, its public key, as well as the time of issuing
and expiration. These fields are concatenated and signed by the server R. A node P receives a certificate as: R → P : certP
=[IPP, LP+, r, f] LR−. All the fields are concatenated and signed with source node I’s private key. A combination of the nonce
number (QI ) and timestamp (r) is used to obtain data freshness and timeliness property. Source node I broadcasts a Route
Discovery Packet (RDP) for a destination D as I → brdcst: [RDP, IPD, certI, QI , r]LI−. If G is the first node on the reverse
path, REP packet is sent as D → G: [REP, IPI, certD, QI, t] LD−. But nodes use an ERR message to report links in active
routes broken due to node movement.
5.4. Cooperation of Nodes Fairness in Dynamic Ad-hoc NeT-works (CONFIDANT)
Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks (CONFIDANT) [2] protocol is designed as an
extension to reactive source-routing protocol such as DSR. Each node in this protocol monitors their neighbors and updates
the reputation accordingly. If they detect any misbehaving or malicious node, they can inform other friend nodes by sending
an ALARM message. When a node receives such an ALARM either directly from another node or by listening to the ad hoc
network, it calculates how trustworthy the ALARM is based on the source of the ALARM and the total number of ALARM
messages about the misbehaving node.
5.5. Rushing attacks
Rushing attacks [9] are mostly directed against on demand routing protocols such as DSR. To counter such attacks,
a generic secure route discovery component called Rushing Attack Prevention (RAP) is used. RAP combines the following
mechanisms: Secure Neighbor Detection, Secure Route Delegation, and Randomized Route Request Forwarding.
5.6. Attacks using Impersonation
In impersonation attacks, an intruder assumes the identity and privileges of another node in order to consume its
resources or to disturb normal network operation. An attacker node achieves impersonation by misrepresenting its identity.
This can be done by changing its own IP or MAC address to that of some other legitimate node. Some strong authentication
procedures can be used to stop attacks by impersonation.
5.6.1. Man-in-the-Middle Attack
In this attack, a malicious node reads and possibly modifies the messages between two parties. The attacker can
impersonate the receiver with respect to the sender, and the sender with respect to the receiver, without having either of them
realize that they have been attacked.
5.6.2. Sybil Attack
In the Sybil attack [16], an attacker pretends to have multiple identities. A malicious node can behaves as if it were
a larger number of nodes either by impersonating other nodes or simply by claiming false identities. Sybil attacks are
classified into three categories: direct/indirect communication, fabricated/stolen identity, and simultaneity. In the direct
communication, Sybil nodes communicate directly with legitimate nodes, whereas in the indirect communication messages
sent to Sybil nodes are routed through malicious nodes.
VI. Attack on Ad-hoc network and Secured Attacks using Modification
This attack disrupts the routing function by having the attacker illegally modifying the content of the messages.
Examples of such attacks include redirection by changing the route sequence number and redirection with modified hop
count that can trigger the black hole attack. Some other modification based attacks are presented next.
www.ijmer.com 4505 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
6.1. Misrouting Attack
In the misrouting attack, a non-legitimate node sends data packet to the wrong destination. This type of attack is
carried out by modifying the final destination address of the data packet or by forwarding a data packet to the wrong next
hop in the route to the destination.
6.2. Detour Attack
In this type of attack, the attacker adds a number of virtual nodes in to a route during the route discovery phase. As
a consequence, the traffic is diverted to other routes that appear to be shorter and might contain malicious nodes which could
create other attacks.
6.3. Blackmail Attack
Blackmail attack causes false identification of a good node as malicious node. In ad hoc wireless networks, nodes
usually keep information of perceived malicious nodes in a blacklist. An attacker may blackmail a good node and tell other
nodes in the network to add that node to their blacklists as well, thus avoiding the victim node in future routes.
6.4. Resource Consumption Attack
In Fabrication attack part of resource consumption attack is a malicious node deliberately tries to consume the resources (e.g.
battery power, bandwidth, etc.) of other nodes in the network. The attack can be in the form of unnecessary route requests,
route discovery, control messages, or by sending stale information. For example, in routing table overflow attack, a
malicious node advertises routes to non-existent nodes, thus causing routing table overflow. By using packet replication
attack, an adversary consumes bandwidth and battery power of other nodes.
6.5. Routing Table Poisoning
In Fabrication attack part of routing table poisoning is a malicious node sends false routing updates, resulting in
sub-optimal routing, network congestion, or network partition.
6.6. Rushing Attack
In Fabrication attack part of rushing attack is malicious node in rushing attack attempts to tamper Route Request
packets, modifying the node list, and hurrying its packet to the next node.
6.7. Black Hole
In Fabrication attack part of black hole is a malicious node advertise itself as having the shortest path to all nodes in
the network (e.g. the attacker claims that it is a level one node). The attacker can cause DoS by dropping all the received
packets.
6.8. Masquerading
During the neighbor acquisition process, a outside intruder could masquerade an nonexistent or existing IS by
attaching itself to communication link and illegally joining in the routing protocol domain by compromising authentication
system. The threat of masquerading is almost the same as that of a compromised IS.
6.9. Replay
An attacker that performs a replay attack injects into the network routing traffic that has been captured previously.
This attack usually targets the freshness of routes, but can also be used to undermine poorly designed security solutions.
6.10. Wormhole Attack
In the wormhole attack, two compromised nodes can communicate with each other by a private network
connection. The attacker can create a vertex cut of nodes in the network by recording a packet at one location in network,
tunneling the packet to another location, and replaying it there. The wormhole can drop packets or it can selectively forward
packets to avoid detection. It is particularly dangerous against different network routing protocols in which the nodes
consider themselves neighbor after hearing a packet transmission directly from some node.
6.11. Tunneling Attack
In a tunneling attack, two or more nodes collaborate and exchange en-capsulated messages along existing data
routes. For example, if a Route Request packet is encapsulated and sent between two attackers, the packet will not contain
the path traveled between the two attackers. This would falsely make the receiver conclude that the path containing the
attackers is the shortest path available.
VII. Security at the physical and data link layers and Solutions for Routing Protocols in Ad Hoc
Wireless Networks
In this paper, we survey the security solutions in the mobile ad hoc networks. First we analyze the main security
criteria for the mobile ad hoc networks, which should be regarded as a guideline for us to find the solutions to the security
www.ijmer.com 4506 | Page
6. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
issues in the mobile ad hoc networks. We then point out various attack types that mainly threaten the mobile ad hoc
networks. The Wireless Ad hoc Networks are a flawed architecture for the following solution technical reasons:
The most important thing for the networks is security. It is even important for Wireless Ad hoc Networks because its
applications are in military. The MANET cannot appropriately solve the problem of the security.
Routing is also a big problem. All the routing protocols for Wireless Ad hoc Networks are need patches.
In security at physical and data link layers are two types of faults that may occur in a routing algorithm: (i) faults whose
effect is stochastically indistinguishable from ordinary link failures caused by the mobility of the system, radio
interference, power failure etc, and (ii) faults whose effect can be distinguished from ordinary failures. Malicious faults
tend to be of the second type, although the first type should not be excluded.
In this process of Message encryption and digital signatures are two important mechanisms for data integrity and
user authentication. There are two types of data encryption mechanisms, symmetric and asymmetric (or public key)
mechanisms. Symmetric cryptosystems use the same key (the secret key) for encryption and decryption of a message, and
asymmetric cryptosystems use one key (the public key) to encrypt a message and another key (the private key) to decrypt it.
Public and private keys are related in such a way that only the public key can be used to encrypt messages and only the
corresponding private key can be used for decryption purpose. Even if attacker comprises a public key, it is virtually
impossible to deduce the private key. Any change to the message will produce a different hash result even when the same
hash function is used. A MAC, which is a cryptographic checksum, is computed by the message initiator as a function of the
secret key and the message being transmitted and it is appended to the message. The recipient re-computes the MAC in the
similar fashion upon receiving the message.
7.1 Secure Efficient Ad hoc Distance Vector (SEAD)
Secure Efficient Ad hoc Distance Vector (SEAD) [7] is a proactive routing protocol, based on the design of DSDV
[19]. Besides the fields common with DSDV, such as destination, metric, next hop and sequence number, SEAD routing
tables maintain a hash value for each entry. We collect all the nodes are creating, maintaining all the part of control ad-hoc
secure process routing protocols update packets. This paper is concerned with protecting routing updates, both periodic and
triggered, by preventing an attacker to forge better metrics or sequence numbers in such update packets.
SEAD provides a robust protocol against attackers trying to create incorrect routing state in other node by
modifying the sequence number or the routing metric. SEAD does not provide a way to prevent an attacker from tampering
next hop or destination field in a routing update. Also, it cannot prevent an attacker to use the same metric and sequence
number learned from some recent update message, for sending a new routing update to a different destination.
7.2 ARIADNE
ARIADNE, an efficient on-demand secure routing protocol, provides security against arbitrary active attackers and
relies only on efficient symmetric cryptography. It prevents attackers from tampering uncompromised routes consisting of
uncompromised nodes. ARIADNE ensures point-to-point authentication of a routing message by combining a shared key
between the two parties and MAC. DSR, it consists of two basic operations, route discovery and route maintenance.
ARIADNE makes use of efficient combination of one way hash function and shared keys. Pre-hop hashing mechanism, a
one-way hash function that verifies that no hop is omitted, is also used in Ariadne. In the case of any dead link, a Route Error
message is sent back to the initiator. Errors are generated just as regular data packets and intermediate nodes remove routes
that use dead links in the selected path.
7.3. TIARA
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) mechanisms protect ad hoc networks
against denial-of-service (DoS) attacks launched by malicious intruders. TIARA addresses two types of attacks on data
traffic which are flow disruption and resource depletion.
7.4. Secure Routing Protocol (SRP)
Secure Routing Protocol (SRP) [17], is another protocol extension that can be applied to many of the on demand
routing protocols used today. SRP defends against attacks that disrupt the route discovery process and guarantees to identify
the correct topological information. The basic idea of SRP is to set up a security association (SA) between a source and a
destination node without the need of cryptographic validation of the communication data by the intermediate nodes. SRP
assumes that this SA can be achieved through a shared key KST between the source S and target T. The source S initiates the
route discovery by sending a route request packet to the destination T. The SRP uses an additional header called SRP header
to the underlying routing protocol (e.g. AODV) packet. Otherwise it calculates the keyed hash of the request fields and if the
output matches SRP MAC then authenticity of the sender and integrity of the request are verified. In case of a match, it
compares reply IP source-route with the exact reverse of the route carried in reply packet. If the two routes match then S
calculates the MAC by using the replied route, the SRP header fields, and the secure key between source and destination.
SRP suffers from the lack of validation mechanism for route maintenance messages as it does not stop a malicious node from
harming routes to which that node already belongs to. SRP is immune to IP spoofing because it secures the binding of the
MAC and IP address of the nodes but it is prone to wormhole attacks and invisible node attacks.
www.ijmer.com 4507 | Page
7. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
7.5. Defense Mechanisms against Wormhole Attacks
In order to prevent the wormhole attacks, the packet leashes mechanism [33] proposes to add additional information
(referred as leashes) to the packets in order to restrict packet’s maximum allowed transmission distance. Geographical leash
and temporal leash can be used to detect and stop wormhole attacks. Geographical leash insures that the recipient of the
packet is within a certain distance from the sender while temporal leash is used to enforce an upper bound on the packet’s
life time, thus restricting packet’s maximum travel distance. Temporal leash uses packet’s expiration time to detect a
wormhole. The expiration time is computed based on the allowed maximum transmission distance and the speed of light. A
node will not accept any packet if this expiration time has passed.
7.6. BISS
Building Secure Routing out of an Incomplete Set of Security Associations (BISS) [48], the sender and the receiver
can establish a secure route, even if, prior to the route discovery, only the receiver has security associations established with
all the nodes on the chosen route. Thus, the receiver will authenticate route nodes directly through security associations. The
sender, however, will authenticate directly the nodes on the route with which it has security associations, and indirectly (by
exchange of certificates) the node with which it does not have security associations. The operation of BISS ROUTE
REQUEST relies on mechanisms similar to direct route authentication protocols. When an initiator sends a ROUTE
REQUEST, it signs the request with its private key and includes its public key PQR in the request along with a certificate sl
signed by the central authority binding its id with PQR .
VIII. Related Work
We develop our notion of the “level of protection" associated with security of information in transit in routing
protocol packets. Specifically, in SAR, the aim is to protect any information or behavior that can update or cause a change to
the routing tables on cooperating nodes involved in an ad hoc routing protocol. Attacks on the trust hierarchy can be broadly
classified as Outsider Attacks and Insider Attacks, based on the trust value associated with the identity or the source of the
attack. SAR modifies the behavior of route discovery, tying in protocol behavior with the trust level of a user. What is also
needed is a binding between the identities of the user with the associated trust level. Routes discovered by SAR come with
“quality of protection" guarantees. The techniques enabled by SAR can be easily incorporated into generic ad hoc routing
protocols as illustrated by our implementation example - SAODV. In this chapter we discuss security services and challenges
in an ad hoc wireless network environment. We research examine and classify major routing attacks and present a
comprehensive survey on the state-of-the-art mechanisms and solutions designed to defeat such attacks. All routing protocol
develops and executed from secured in this related process.
IX. Conclusions
We briefly introduce in this paper, the basic characteristics of the mobile ad hoc network. Because of the emergence
of the concept pervasive computing, there is an increasing need for the network users to get connection with the world
anytime at anywhere, which inspires the emergence of the mobile ad hoc network. SAR enables the discovery of secure
routes in a mobile ad hoc environment. Its integrated security metrics allow applications to explicitly capture and enforce
explicit cooperative trust relationships. In addition, SAR also provides customizable security to the flow of routing protocol
messages themselves. In this paper, we examine security services and challenges in an ad hoc wireless network
environment. We examine and classify major routing attacks and present a comprehensive survey on the state-of-the-art
mechanisms and solutions designed to defeat such attacks. Finally we prove the current security solutions for the mobile ad
hoc networks. In the end, we examine several security techniques that can help protect the mobile ad hoc networks from
external and internal security threats. Even if parallel model checking approaches were used, our conclusion is that it is at
this point not feasible to provide a proof for topologies of any significant size by modeling the protocol directly secured in
ad-hoc wireless network.
X. Acknowledgements
The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble
presentation. The authors would like to thank Gauhati University, Assam (Teaching Staff of Department of Computer
Science); S.B.M.S College, Sualkuchi, Assam; CMJ University for providing necessary facilities to carry out this work.
References
[1] J. Broch and D. B. Johnson. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.IETF Internet Draft, October
1999.
[2] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, ACM CCS
2003, Oct. 2003, pp. 42-51.
[3] R. Kravets, S. Yi, and P. Naldurg, A Security-Aware Routing Protocol for Wireless Ad Hoc Networks, In ACM Symp. On Mobile
Ad Hoc Networking and Computing, 2001.
[4] Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
[5] P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks
and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002.
[6] Y. -C. Hu, D. B. Johnson, and A. Perrig, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, WiSe 2003,
2003.
www.ijmer.com 4508 | Page
8. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645
[7] S.Chessa, P.Santi, “Comparison Based System-Level Fault Diagnosis in Ad-Hoc Networks”, Proc. IEEE 20th Symp. on Reliable
Distributed Systems (SRDS), New Orleans, pp. 257-266, October 2001.
[8] B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol.
3, no. 6, pp. 34–43, December 1996.
[9] A Distributed Light-Weight Authentication Model for Ad-hoc Networks.
[10] T. H. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation Through
Experiments and Simulation, Proc. of IEEE Symp. On Wireless Personal Mobile Communications 2001, Sep. 2001.
[11] L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, November 1999.
[12] F. Wang, Brian Vetter, and Shyhtsun Felix Wu. Secure routing protocols: Theory and practice. Technical Report, North Carolina
State University.
[13] B. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing the Border Gateway Routing Protocols. In Global internet '96, London,
UK, November 1996.
[14] C. E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In The Second IEEE Workshop on Mobile
Computing Systems and Applications, New Orleans, LA, USA, February 1999.
[15] Jim Parker, Discussion Record for the 1st MANET Reading Group Meeting
[16] http://logos.cs.umbc.edu/wiki/eb/index.php/February_10%2C_2006 (Authorization required).
[17] Jiejun Kong, Xiaoyan Hong, Yunjung Yi, JoonSang Park, Jun Liu and Mario Gerlay, A Secure Ad-hoc Routing Approach Using
Localized Self-healing Communities, in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and
Computing, pages 254–265, Urbana–Champaign, Illinois, 2005.
[18] Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-hoc Networks, in Proceedings of the 6th International Conference on
Mobile Computing and Networking (MobiCom 2000), pages 275–283, Boston, Massachusetts, August 2000.
[19] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks, in
Proceedings of ICNP’02, 2002.
[20] Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N., “Privacy vulnerabilities in encrypted HTTP streams” In Proc. Privacy
Enhancing Technologies Workshop (PET 2005).
[21] J. Nam, S. Cho, S. Kim, and D. Won, “Simple and Efficient Group Key Agreement Based on Factoring” Proc. Int’l Conf.
Computational Science and Its Applications (ICCSA ’04), pp. 645-654, 2004.
[22] Panagiotis Papadimitratos , Zygmunt J. Haas, “Secure message transmission in mobile ad hoc networks, Ad Hoc Networks” IEEE
2003, 193–209 .
[23] Thomas S. Messerges, ohnas Cukier, Tom A.M. Kevenaar, Larry Puhl, Rene truik, Ed Callaway, “A Security Design for a General
Purpose, Self-Organizing, Multihop Ad Hoc Wireless Network” 1st ACM Workshop Security of Ad Hoc and Sensor Networks
Fairfax, Virginia 2003.
[24] Yih-chun hu, adrian perrig, “A Survey of Secure Wireless ad hoc routing” IEEE security & privacy May-June 2004.
[25] Ljubica Blazevic, Levente Buttyan, Srdan Capkun, Silvia Giordano, Jean-Pierre, Hubaux and Jean-Yves Le Boudec, “Self-
Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes”.
[26] J. A. Freebersyser and B. Leinerr, “A DoD perspective on mobile ad hoc networks,” in Ad Hoc Networking, C. E. Perkin, Ed.
Addison-Wesley, 2001, pp. 29–51.
[27] B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol.
3, no. 6, pp. 34–43, December 1996.
[28] Perkins, C., Belding-Royer, E., Das, S.: Request for Comments: Ad hoc on-demand distance vector (AODV) routing.
http://www.ietf.org/rfc/rfc3561.txt (2003).
[29] Johnson, D.B., Maltz, D.A., Hu, Y.C.: Internet draft: The dynamic source routing protocol for mobile ad hoc networks (DSR).
http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt (2003).
[30] S. Buchegger and J. L. Boudec, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes Fairness In Dynamic
Ad-hoc NeTworks, In Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2002.
www.ijmer.com 4509 | Page