International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
The document proposes an enhanced anonymous position-based security aware routing protocol called E-APSAR for mobile ad hoc networks (MANETs). It aims to address security issues like black hole attacks in dynamic source routing (DSR) protocol. E-APSAR divides the network area into zones and implements encryption to securely transmit data between neighboring zones. Simulation results show that E-APSAR has lower routing overhead and higher throughput and packet delivery ratio compared to DSR, especially at certain mobility levels. The protocol performance is analyzed against different node densities and mobility to evaluate its effectiveness against black hole attacks in MANETs.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
The document proposes an enhanced anonymous position-based security aware routing protocol called E-APSAR for mobile ad hoc networks (MANETs). It aims to address security issues like black hole attacks in dynamic source routing (DSR) protocol. E-APSAR divides the network area into zones and implements encryption to securely transmit data between neighboring zones. Simulation results show that E-APSAR has lower routing overhead and higher throughput and packet delivery ratio compared to DSR, especially at certain mobility levels. The protocol performance is analyzed against different node densities and mobility to evaluate its effectiveness against black hole attacks in MANETs.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This document summarizes routing techniques for wireless sensor networks. It discusses traditional techniques like flooding and gossiping and current techniques including flat, hierarchical, and location-based routing. For hierarchical routing, it describes protocols like LEACH, PEGASIS and TEEN in detail. LEACH uses clustering to reduce energy consumption and extends network lifetime by randomly selecting cluster heads. It compares LEACH to other protocols like SPIN and directed diffusion, showing LEACH provides better performance. The document also discusses issues like uneven energy consumption in LEACH that new protocols try to address.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
The document summarizes a research paper that proposes a novel intrusion detection system to detect black-hole nodes in mobile ad hoc networks (MANETs). It first provides background on MANETs and the black-hole attack. It then describes how the Ad hoc On-Demand Distance Vector (AODV) routing protocol works and its vulnerabilities. Next, it discusses existing work on detecting black-hole attacks and outlines the proposed algorithm, which will detect black-hole nodes by implementing changes to the AODV routing protocol and simulating it using the NS-2 network simulator.
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
This document proposes algorithms to detect wormhole attacks in wireless network coding systems. It first discusses how wormhole attacks can severely impact network coding protocols by disrupting routing and introducing unfair workload distributions. It then presents a centralized algorithm that uses a central node to detect wormholes by measuring changes in expected transmission counts. For distributed systems without a central node, it proposes DAWN, a distributed algorithm that examines the order nodes receive innovative packets and their expected transmission counts to detect wormholes. The algorithms aim to detect wormholes using only local information available from regular network coding protocols to keep overhead low. Extensive testing validated the effectiveness and efficiency of the proposed approaches.
This document discusses the performance analysis and minimization of black hole attacks in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how they are vulnerable to black hole attacks. The document then describes the AODV routing protocol and how black hole attacks exploit vulnerabilities in the route discovery process. Existing detection and prevention techniques are outlined. The document proposes modifying the AODV protocol to implement an intrusion detection system (IDSAODV) that can detect and discard fraudulent route replies from black hole nodes, improving packet delivery. Simulation scenarios of varying node counts with and without black holes are used to analyze black hole behavior and evaluate the effectiveness of the IDSAODV approach.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
This document analyzes the performance of the AODV routing protocol under wormhole attacks in a mobile ad hoc network (MANET) simulation using NS2. It first provides background on MANETs, AODV, and wormhole attacks. It then describes the NS2 simulation setup of 16 nodes using the AODV protocol with and without two malicious nodes creating a wormhole. The results show that without a wormhole, packets are successfully delivered to the destination, but with the wormhole, zero throughput is achieved as the malicious nodes drop all packets, preventing delivery to the destination. Therefore, wormhole attacks significantly disrupt routing in AODV-based MANETs.
This document summarizes and quotes several passages from the Bible that are critical of hypocrisy and outward displays of faith without inward truth or good works. It highlights passages from the books of James, Matthew, Luke, and Revelation that criticize those who only listen to God's word but do not act on it, who appear righteous outwardly but harbor unrighteousness inside, and whose faith is lukewarm rather than fervent. The document encourages self-examination to ensure one's faith is genuine rather than hollow or superficial.
The document encourages the reader to seize the present moment and make the most of current opportunities rather than dwelling on the past or worrying about the future. In just a few short words, it promotes mindfulness, spontaneity and living fully in the now.
The document is a series of dates with no other text or context. It simply lists the date "06/11/13" repeated multiple times, providing no meaningful information in its current form.
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This document summarizes routing techniques for wireless sensor networks. It discusses traditional techniques like flooding and gossiping and current techniques including flat, hierarchical, and location-based routing. For hierarchical routing, it describes protocols like LEACH, PEGASIS and TEEN in detail. LEACH uses clustering to reduce energy consumption and extends network lifetime by randomly selecting cluster heads. It compares LEACH to other protocols like SPIN and directed diffusion, showing LEACH provides better performance. The document also discusses issues like uneven energy consumption in LEACH that new protocols try to address.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
The document summarizes a research paper that proposes a novel intrusion detection system to detect black-hole nodes in mobile ad hoc networks (MANETs). It first provides background on MANETs and the black-hole attack. It then describes how the Ad hoc On-Demand Distance Vector (AODV) routing protocol works and its vulnerabilities. Next, it discusses existing work on detecting black-hole attacks and outlines the proposed algorithm, which will detect black-hole nodes by implementing changes to the AODV routing protocol and simulating it using the NS-2 network simulator.
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
This document proposes algorithms to detect wormhole attacks in wireless network coding systems. It first discusses how wormhole attacks can severely impact network coding protocols by disrupting routing and introducing unfair workload distributions. It then presents a centralized algorithm that uses a central node to detect wormholes by measuring changes in expected transmission counts. For distributed systems without a central node, it proposes DAWN, a distributed algorithm that examines the order nodes receive innovative packets and their expected transmission counts to detect wormholes. The algorithms aim to detect wormholes using only local information available from regular network coding protocols to keep overhead low. Extensive testing validated the effectiveness and efficiency of the proposed approaches.
This document discusses the performance analysis and minimization of black hole attacks in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how they are vulnerable to black hole attacks. The document then describes the AODV routing protocol and how black hole attacks exploit vulnerabilities in the route discovery process. Existing detection and prevention techniques are outlined. The document proposes modifying the AODV protocol to implement an intrusion detection system (IDSAODV) that can detect and discard fraudulent route replies from black hole nodes, improving packet delivery. Simulation scenarios of varying node counts with and without black holes are used to analyze black hole behavior and evaluate the effectiveness of the IDSAODV approach.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
This document analyzes the performance of the AODV routing protocol under wormhole attacks in a mobile ad hoc network (MANET) simulation using NS2. It first provides background on MANETs, AODV, and wormhole attacks. It then describes the NS2 simulation setup of 16 nodes using the AODV protocol with and without two malicious nodes creating a wormhole. The results show that without a wormhole, packets are successfully delivered to the destination, but with the wormhole, zero throughput is achieved as the malicious nodes drop all packets, preventing delivery to the destination. Therefore, wormhole attacks significantly disrupt routing in AODV-based MANETs.
This document summarizes and quotes several passages from the Bible that are critical of hypocrisy and outward displays of faith without inward truth or good works. It highlights passages from the books of James, Matthew, Luke, and Revelation that criticize those who only listen to God's word but do not act on it, who appear righteous outwardly but harbor unrighteousness inside, and whose faith is lukewarm rather than fervent. The document encourages self-examination to ensure one's faith is genuine rather than hollow or superficial.
The document encourages the reader to seize the present moment and make the most of current opportunities rather than dwelling on the past or worrying about the future. In just a few short words, it promotes mindfulness, spontaneity and living fully in the now.
The document is a series of dates with no other text or context. It simply lists the date "06/11/13" repeated multiple times, providing no meaningful information in its current form.
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document analyzes the performance of the AODV routing protocol under wormhole attacks in a mobile ad hoc network (MANET) simulation using NS2. It first provides background on MANETs, AODV, and wormhole attacks. It then describes the NS2 simulation setup of 16 nodes using the AODV protocol with and without two malicious nodes creating a wormhole. The results show that without a wormhole, packets are successfully delivered to the destination, but with the wormhole, zero throughput is achieved as the malicious nodes drop all packets, preventing delivery to the destination. Therefore, wormhole attacks significantly disrupt routing in AODV-based MANETs.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
This document discusses a technique for detecting and removing multiple black hole attacks in mobile ad hoc networks (MANETs) using sequence number variation in the Ad hoc On-Demand Distance Vector (AODV) routing protocol. The technique modifies the AODV protocol to include a protected field in route request and route reply packets that is used to vary the sequence number, helping identify black hole and gray hole attacks. Simulations using the NS-2 network simulator show that the proposed technique improves performance metrics like packet delivery ratio, throughput, and latency compared to a previous method, enhancing network performance in the presence of attackers.
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
This document discusses migrating packet dropping in mobile ad-hoc networks using a modified ACK-based authentication scheme. It begins by introducing mobile ad-hoc networks and some of the security challenges they face, such as packet dropping attacks. It then discusses existing ACK-based authentication schemes and their limitations, such as generating a large overhead and having ambiguity when nodes refuse acknowledgments. The document proposes a modified ACK-based scheme that uses a secure channel to overcome these limitations and minimize packet dropping. It evaluates the proposed scheme through simulation experiments and finds it improves performance metrics like packet delivery ratio and throughput compared to not using a secure channel. In conclusion, the modified scheme is presented as a way to enhance node authentication and reduce packet dropping in mobile
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
In Mobile Ad Hoc Networks(MANETs), a set of interacting nodes should cooperatively
implement the routing functions to enable end-to-end communication along dynamic paths composed by
multi-hop wireless links. Several multi-hop routing protocols have been proposed for ad hoc networks,
and most popular ones include: Dynamic Source Routing (DSR), Optimized Link-State Routing (OLSR),
Ad Hoc On-Demand Distance Vector (AODV) and Destination- Sequenced Distance-Vector (DSDV).
Most of these protocols rely on the assumption of a trustworthy cooperation among all participating
nodes; unfortunately, this may not be a realistic assumption in real hosts. Malicious hosts could exploit
the weakness of MANET to launch various kinds of attacks. Node mobility on ad hoc network cannot be
restricted. As results, many Intrusion Detection System(IDS) solutions have been proposed for the wired
network, which they are defined on strategic points such as switches, gateways, and routers, can not be
implemented on the MANET. Thus, the wired network IDS characteristics must be modified prior to be
implemented in the ad hoc network. Thus an IDS should be added to enhance the security level of
MANETs. If MANET can detect the attackers as soon as they enter the network, we will be able to
completely eliminate the potential vulnerabilities caused by compromised nodes at the first time. IDSs
usually act as the second layer in MANETs. This paper presents an novel IDS for MANETs which is
based on acknowledgements.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
The International Journal of Engineering and Science (The IJES)theijes
The document summarizes a study on the Enhanced Adaptive Acknowledge (EAACK) scheme for detecting misbehaving nodes in mobile ad hoc networks (MANETs). It discusses the limitations of existing acknowledgment-based intrusion detection systems like Watchdog, TWOACK, and AACK in handling receiver collisions. The key issues related to acknowledgment-based schemes for detecting misbehavior in MANETs are addressed. The focus is on analyzing the limitations of acknowledgment approaches like AACK and studying EAACK as an improved approach for addressing receiver collisions in MANETs.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
1. R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
RESEARCH ARTICLE
www.ijera.com
OPEN ACCESS
Providing Authentication in Wireless Network to Prevent
Jamming Attacks
R.Akila1, T.J. Jeyaprapha1, Dr. G. Sumathi2
1
( Department of Electronics and Communication Engineering, R.Akila, M.E final year, Sri Venkateswara
College of Engineering, Sriperumbudur)
1
( Department of Electronics and Communication Engineering, T.J.Jeyaprabha, Assistant Professor, Sri
Venkateswara College of Engineering, Sriperumbudur)
2
( Department of Information and Technology, Dr.G.Sumathi, Head-IMS, Professor, Sri Venkateswara College
of Engineering, Sriperumbudur)
ABSTRACT
Wireless and mobile networks represent an increasingly important segment of networking research as a whole,
driven by the rapid growth of portable computing, communication and embedded devices connected to the
internet. Goal of the process is to bring privacy in any conversation between nodes in a network and to provide
security from the attackers. The need of bringing privacy is to defend ourselves from any of the attacks in
wireless network. AODV is a message of routing messages between mobile computers and it allows these
mobile computers or nodes to pass messages through their neighbors to nodes with which they cannot directly
communicate. Here, we propose RSA technique for providing authentication for data and control packets. By
using this technique we provide the authenticated data transmission and also to prevent the damage in the
network by the attackers.
Keywords – AODV (Ad hoc On-demand Distance Vector), RSA (Ron Rivest, Adi Shamir and Leonard
Adleman.
Wireless connections are by nature significantly less
stable than wired connections.
I. INTRODUCTION
When a malicious node D„intercepts the data
The most common wireless technologies
traffic from the source node S to the destination node
use radio. With radio waves distances can be short,
D, a black hole attack takes place. D‟ may misbehave
such as a few meters for television or as far as
by agreeing to forward packets but fail to do so,
thousands or even millions of kilometers for deepbecause it is overloaded, selfish, malicious, or
space radio communications. It encompasses various
broken. This kind of black hole attack can be
types of fixed, mobile, and portable applications,
detected by setting the promise mode of each node.
including two, cellular telephones, personal digital
In this system they proposed a novel approach,
assistants (PDAs), and wireless networking.
Topology
Graph-Based
Anomaly
Detection
Overall, it is clear that mobile, wireless and
(TOGBAD), for detecting routing attacks in tactical
sensor devices will certainly outnumber wired endMANETs [1].A selfish behaviour threatens the entire
user terminals on the Internet in the near future,
community. This paper proposes a selfishness
strongly motivating consideration of fundamentally
prevention protocol for open MANETs. The
new network architectures and services to meet.
drawback of this is it works only on early stages of
More than 90% of all oral cavity cancers are
development and lacks theoretical and experimental
Oral Squamous Cell Carcinoma (OSCC),
validation [2]. The watchdog method, detects
Changing needs. Over the next 10-15 years,
misbehaving nodes acting alone by maintaining a
it is anticipated that significant qualitative changes to
buffer that contains recently sent packets. When a
the Internet will be driven by the rapid proliferation
node forwards a packet, the node‟s watchdog ensures
of mobile and wireless devices, which may be
that the next node in the path also forwards the
expected to outnumber wired PC‟s as early as 2010.
packet; the watchdog does this by listening to the
The potential impact of the future wireless Internet is
next node promiscuously. If the next node does not
very significant because the network combines the
forward the packet then it is termed as misbehaving.
power of computation, search engines and databases
In this scheme, every packet that is overheard by the
in the background with the immediacy of information
watchdog is compared with the packet in the buffer to
from mobile users and sensors in the foreground.
see if there is a match. A match confirms that the
www.ijera.com
36 | P a g e
2. R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
packet has been successfully delivered and it is
removed from the buffer. If a packet has remained in
the buffer beyond the timeout period then a failure
tally for the node responsible for forwarding the
packet is incremented. If this tally exceeds a
predetermined threshold then the node is termed as
malicious and the network is informed accordingly
[3]. Two conceptual models for charging for the
packet forwarding service. In the first one, called
Packet Purse Model, the source of the packet is
charged, whereas in the second one, called Packet
Trade Model, the destination is charged. The two
models can also be combined to provide a hybrid
solution. We believe that introducing a kind of virtual
currency can serve several other purposes in mobile
ad hoc networks. First, it can be used to remunerate
not only communication services, as described in this
paper, but also information services. Second, it can
be used as a way to pay for the usage of backbones or
satellite links, when a node has to communicate with
a very distant party. In this case, the virtual currency
will have to be converted in some way into “hard"
currency [4].several algorithms are proposed to detect
the black hole attack like DSR, AODV, TORA,
DSDV, STAR etc. Proposed two solutions first,
isolate the misbehaving nodes from the actual routing
protocol for the network. But it adds complexity to
protocol. Second, it detects only if the receiver‟s
network interface is accepting packets, but they
otherwise assume that routing nodes do not
misbehave. Although trusting all nodes to be well
behaved increases the number of nodes available of
routing, it also admits misbehaving nodes to the
network [5]. In this paper, the former are intended to
enforce the cooperation by first detecting the selfish
nodes, avoiding routing through them, and then
punishing them via spreading their bad reputations
and thus isolating them. This paper proposed a
Secure Incentive Protocol (SIP) to motivate packet
forwarding in totally self organizing MANETs
without relying on any centralized infrastructure
[6].Malicious nodes can intentionally alter routing
messages and cause Denial-of-Service attacks, or can
cause packet flooding to power down the network by
successive broadcasting of Route Requests, or send
periodic wake up calls or false alarms to neighboring
nodes. This paper proposed a framework to eliminate
colluding black hole attacks in the Ad hoc Ondemand Distance Vector (AODV) routing protocol
[7].
II. PROPOSED SYSTEM
Ad hoc On-demand Distance Vector
(AODV) is a method of routing messages between
nodes. It allows these mobile computers, or nodes, to
pass messages through their neighbors to nodes with
which they cannot directly communicate. AODV
www.ijera.com
www.ijera.com
does this by discovering the routes along which
messages can be passed. AODV makes sure these
routes do not contain loops and tries to find the
shortest route possible. AODV is also able to handle
changes in routes and can create new routes if there is
an error. Here we used the distance based process and
it is for the non centralized process.
Here we propose RSA Technique for
providing authentication for data and control packets.
By using this technique we provide the authenticated
data transmission and to avoid the damage in the
network by the attackers. We use the Ad hoc Ondemand Distance Vector (AODV) protocol for
routing. High speed of encryption and Private Key is
used. The authentication is a key barrier in the
network information system security field. RSA is a
open network environment technology, using public
key cryptography system theory has implemented
and supplied a universal security infrastructure for
security services; it has two main applications,
include encryption and digital signature.
III. Ad hoc On-demand Distance Vector
(AODV)
The Ad hoc On-demand Distance Vector
(AODV) routing protocol is intended for use by
mobile nodes in an ad hoc network. It offers quick
adaptation to dynamic link conditions, low
processing and memory overhead, low network
utilization, and determines unicast routes to
destinations within the ad hoc network. It uses
destination sequence numbers to ensure loop freedom
at all times (even in the face of anomalous delivery of
routing control messages), avoiding problems (such
as "counting to infinity") associated with classical
distance vector protocols.
Fig.1. AODV Route discovery
One distinguishing feature of AODV is its
use of a destination sequence number for each route
entry. The destination sequence number is created
by the destination to be included along with any route
information it sends to requesting nodes. Using
destination sequence numbers ensures loop freedom
37 | P a g e
3. R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
and is simple to program. Given the choice between
two routes to a destination, a requesting node is
required to select the one with the greatest sequence
number.
IV. RSA
RSA is a cryptosystem, which is known as
one of the first practicable public-key cryptosystems
and is widely used for secure data transmission. In
such a cryptosystem, the encryption key is public and
differs from the decryption key which is kept secret.
In RSA, this asymmetry is based on the practical
difficulty of factoring the product of two large prime
numbers, the factoring problem. RSA stands for Ron
Rivest, Adi Shamir and Leonard Adleman, who first
publicly described the algorithm. A user of RSA
creates and then publishes the product of two
large prime numbers, along with an auxiliary value,
as their public key. The prime factors must be kept
secret. Anyone can use the public key to encrypt a
message, but with currently published methods, if the
public key is large enough, only someone with
knowledge of the prime factors can feasibly decode
the message. Breaking RSA encryption is known as
the RSA problem. It is an open question whether it is
as hard as the factoring problem.
The
RSA
algorithm
involves
three
steps: key generation,
encryption
and
decryption.RSA involve public key and a private
key. The public key can be known by everyone and is
used for encrypting messages. Messages encrypted
with the public key can only be decrypted in a
reasonable amount of time using the private key. The
keys for the RSA algorithm are generated the
following way:
1. Choose two distinct prime numbers p and q.
For
security
purposes,
the
integer‟s p and q should be chosen at random,
and should be of similar bit-length. Prime
integers can be efficiently found using
a primality test.
2. Compute n = pq.
n is used as the modulus for both the public
and private keys. Its length, usually expressed
in bits, is the key length.
3. Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1), where
φ is Euler's totient function.
4. Choose
an
integer e such that 1
<e<
φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are co
prime.
e is released as the public key exponent.
e having a short bit-length and small Hamming
weight results in more efficient encryption –
most commonly 216 + 1 = 65,537. However,
much smaller values of e (such as 3) have been
shown to be less secure in some settings.
www.ijera.com
www.ijera.com
Determine d as d−1 ≡ e (mod φ(n)), i.e., d is
the multiplicative inverse of e (modulo φ(n)).
This is more clearly stated as: solve
for d given d⋅e ≡ 1 (mod φ(n))
This is often computed using the extended
Euclidean algorithm. Using the pseudo code in
the Modular
integers section,
inputs a and n correspond
to e and t,
respectively.
d is kept as the private key exponent.
The public key consists of the modulus n and
the public (or encryption) exponent e. The private
key consists of the modulus n and the private (or
decryption) exponent d, which must be kept
secret. p, q, and φ(n) must also be kept secret because
they can be used to calculate d.
5.
ENCRYPTION
Alice transmits her public key (n, e) to Bob
and keeps the private key secret. Bob then wishes to
send message M to Alice. He first turns M into an
integer m, such that 0 ≤ m < n by using an agreedupon reversible protocol known as a padding scheme.
He then computes the cipher text c. This can be done
quickly using the method of exponentiation by
squaring. Bob then transmits c to Alice. Note that at
least nine values of m will yield a cipher text c equal
to m,[note 1] but this is very unlikely to occur in
practice.
DECRYPTION
Alice can recover m from c by using her
private key exponent d via computing
Given m, she can recover the original message M by
reversing the padding scheme.
SIGNING MESSAGES
Suppose Alice uses Bob's public key to send
him an encrypted message. In the message, she can
claim to be Alice but Bob has no way of verifying
that the message was actually from Alice since
anyone can use Bob's public key to send him
encrypted messages. In order to verify the origin of a
message, RSA can also be used to sign a message.
Suppose Alice wishes to send a signed
message to Bob. She can use her own private key to
do so. She produces a hash value of the message,
raises it to the power of d (modulo n) (as she does
when decrypting a message), and attaches it as a
"signature" to the message. When Bob receives the
signed message, he uses the same hash algorithm in
conjunction with Alice's public key. He raises the
signature to the power of e (modulo n) (as he does
when encrypting a message), and compares the
resulting hash value with the message's actual hash
value. If the two agree, he knows that the author of
38 | P a g e
4. R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
the message was in possession of Alice's private key,
and that the message has not been tampered with
since.
In the basic communication scenario, there
are two parties, Alice and Bob, who want to
communicate with each other. A third party, Eve, is a
potential eavesdropper. RSA encryption, supplies
unique and stability technology advantages, presents
an authentication system.
www.ijera.com
transformation of information‟s is done here. 3.
Algorithm Implementation: the algorithm known as
AODV is implemented for the route discovery.
FIG.4. BLOCK DIAGRAM
FIG. 2. RSA ENCRYPTION AND DECRYPTION
With a public key (PKA) or asymmetric key
algorithm, a pair of keys is used. One of the keys, the
private key, is kept secret and not shared with
anyone. The other key, the public key, is not secret
and can be shared with anyone. When data is
encrypted by one of the keys, it can only be
decrypted and recovered by using the other key.
Fig.3. Public key cryptosystem: Secrecy and
Authentication
4. Route Maintenance: RSA technique is introduced
for providing the security between the sender and
receiver for communication.
5. Analysis: Finally the performance like delay,
throughput and packet delivery ratio is analyzed.
Let us focus on the performance of this routing
protocol. We evaluated the performance of AODV as
a routing protocol and RSA as algorithm for
authentication using
NS2. By implementing the
another routing protocol and algorithm for
authentication, the performance comparison will be
done by comparing the end to end delay, overall
delay, throughput, packet delivery ratio.
FIG.6. Sender and receiver node in a network with
the attacker node
V. RESULTS
The simulation work has been done with the
Network Simulator ns-2, Version 2.29. In the
simulation 100 nodes are randomly distributed within
the network field of size 1000m * 1000m. Then vary
the node speed from 5m/s to 30m/s.
MODULES LIST
The block diagram of this project has built
by using five modules and they are 1.Network
formation: the wireless network is formed with the
multiple nodes. 2. Route Discovery: the identification
of path between the source and the destination for the
www.ijera.com
FIG.9. Packet size Vs communication cost
39 | P a g e
5. R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
www.ijera.com
REFERENCES
[1]
[2]
FIG.10. Fault Vs delay
[3]
[4]
[5]
FIG.11. Fault Vs recovery time
[6]
VI. CONCLUSION
In this paper, we proposed RSA Technique
for providing authentication for data and control
packets. By using this technique we provide the
authenticated data transmission and to avoid the
damage in the network by the attackers. We use the
Ad hoc On-demand Distance Vector (AODV)
protocol for routing. In future work thus with the
OLSR routing protocol based on the identification of
poor link stability we adjusting the route discovery
process for improving the route finding method. Also
EDH will be used as a cryptographic technique.
Finally the results like throughput, delay, packet loss
can be compared to find the best technique.
www.ijera.com
[7]
Elmar Gerhards-Padilla, Nils Aschenbruck,
Peter Martini, Marko Jahnke, Jens T¨olle ,“
Detecting Black Hole Attacks In Tactical
Manets Using Topology Graphs”, IEEE
conference on local computer Networks,1518 Oct.2007.
Hugo Miranda Lu´ıs Rodrigues ,
“Preventing Selfishness In Open Mobile Ad
Hoc Networks”, In the proceedings of
Distributed Computing systems, pages- 440
– 445, 19-22 May 2002.
Animesh Patcha and Amitabh Mishra ,
“Collaborative Security Architecture For
Black Hole Attack Prevention In Mobile Ad
Hoc Networks”, In the proceedings of Radio
and Wireless Conference, pages- 75 – 78,
10-13 Aug. 2003.
Levente Butty_an and Jean-Pierre Hubaux,
“Nuglets: A Virtual Currency To Stimulate
Cooperation In Self-Organized Mobile Ad
Hoc Networks”, 2001.
Sergio marti, T.J.Giuli, Kevin lai, and Mary
Baker, “Mitigating Routing Misbehavior In
Mobile Ad Hoc Network”, 2000.
Yanchao Zhang, Wenjing Lou, Yuguang
Fang,”
A
SECURE
INCENTIVE
PROTOCOL FOR MOBILE AD HOC
NETWORKS”, 2004.
Ramaswami, S.S, Upadhyaya, S,”SMART
HANDLING OF COLLUDING BLACK
HOLE ATTACKS IN MANETs AND
WIRELESS
SENSOR
NETWORKS
USING MULTIPATH ROUTING”, pages253 – 260,21-23 June 2006.
40 | P a g e