IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORKAM Publications
Wireless Sensor Network consists of nodes which communicate with each other with wireless
channel. A general conception of wireless sensor network (WSN) nodes is static and it remains fixed in their
position. It has been deployed in dominant manner for a long period of time. Many researches mostly focus on
energy consumption in WSN sensor nodes. In WSN The security in wireless sensor networks (WSNs) is a critical
issue due to the inherent limitations of computational capacity and power usage The Black hole attacks is
one of the attack that challenges the security of WSN. Black hole attacks occur when an adversary cap-tures
and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of
forwarding them towards the base station. As a result any information that enters the black hole region is
captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by
partitioning the network, such that important event information do not reach the base stations. Several
techniques based on secret sharing and multi-path routing have been proposed in the literature to overcome
black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate, they
may even end up making black hole attacks more effective. Propose an efficient technique that uses multiple base
stations deployed in the network to counter the impact of black holes on data transmission, using java simulator
and performance compare with multiple base station and without multiple base station to prevent black hole
attacks. It implemented using Net bean IDE Java network simulator .
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORKAM Publications
Wireless Sensor Network consists of nodes which communicate with each other with wireless
channel. A general conception of wireless sensor network (WSN) nodes is static and it remains fixed in their
position. It has been deployed in dominant manner for a long period of time. Many researches mostly focus on
energy consumption in WSN sensor nodes. In WSN The security in wireless sensor networks (WSNs) is a critical
issue due to the inherent limitations of computational capacity and power usage The Black hole attacks is
one of the attack that challenges the security of WSN. Black hole attacks occur when an adversary cap-tures
and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of
forwarding them towards the base station. As a result any information that enters the black hole region is
captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by
partitioning the network, such that important event information do not reach the base stations. Several
techniques based on secret sharing and multi-path routing have been proposed in the literature to overcome
black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate, they
may even end up making black hole attacks more effective. Propose an efficient technique that uses multiple base
stations deployed in the network to counter the impact of black holes on data transmission, using java simulator
and performance compare with multiple base station and without multiple base station to prevent black hole
attacks. It implemented using Net bean IDE Java network simulator .
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
Wireless Sensor Networks (WSNs) are often deployed in unfavourable situations where an assailant can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. This replication node is also called as Clone node. The clone node or replicated node behave as a genuine node. It can damage the network. In node replication attack detecting the clone node important issue in Wireless Sensor Networks. A few distributed solutions have been recently proposed, but they are not satisfactory. First, they are intensity and memory demanding: A serious drawback for any protocol to be used in the WSN- resource constrained environment. In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies, and detection ranges. Further, they are vulnerable to the specific assailant models introduced in this paper. In this scenario, a particularly dangerous attack is the replica attack, in which the assailant takes the secret keying materials from a compromised node, generates a large number of assailant-controlled replicas that share the node’s keying materials and ID, and then spreads these replicas throughout the network. With a single captured node, the assailant can create as many replica nodes as he has the hardware to generate.. The replica nodes are controlled by the assailant, but have keying materials that allow them to seem like authorized participants in the network. Our implementation specifies, user will specify its ID, which means client id, secret key will be create, and then include the port number. The witness node will verify the internally bounded user Id and secret key. The witness node means original node. If the verification is success, the information collecting to the packets that packets are send to the destination.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
Wireless sensor networks gains its importance because of the critical applications in which it is involved like
industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor
networks we consider an active attack, NODE REPLICATION attack and COLLUDING attack. We use localized
algorithms, ((ie) replication detection is done at the node level and eliminated without the intervention of the base
station) to solve replication attacks and colluding attacks. Replication attacks are detected to using a unique key pair
and cryptographic hash function. We propose to use XED and EED algorithm[1] ( authenticates the node and tries to
reduce the replication) , with this using the Event detected location , non-beacon node is used to find the location of a
malicious node and by a simple threshold verification we identify malicious clusters
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
Node clone detection using a stable overlay network IJECEIAES
Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data‟s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Hack Recognition In Wireless Sensor NetworkIJERA Editor
A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
Wireless Sensor Networks (WSNs) are often deployed in unfavourable situations where an assailant can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. This replication node is also called as Clone node. The clone node or replicated node behave as a genuine node. It can damage the network. In node replication attack detecting the clone node important issue in Wireless Sensor Networks. A few distributed solutions have been recently proposed, but they are not satisfactory. First, they are intensity and memory demanding: A serious drawback for any protocol to be used in the WSN- resource constrained environment. In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies, and detection ranges. Further, they are vulnerable to the specific assailant models introduced in this paper. In this scenario, a particularly dangerous attack is the replica attack, in which the assailant takes the secret keying materials from a compromised node, generates a large number of assailant-controlled replicas that share the node’s keying materials and ID, and then spreads these replicas throughout the network. With a single captured node, the assailant can create as many replica nodes as he has the hardware to generate.. The replica nodes are controlled by the assailant, but have keying materials that allow them to seem like authorized participants in the network. Our implementation specifies, user will specify its ID, which means client id, secret key will be create, and then include the port number. The witness node will verify the internally bounded user Id and secret key. The witness node means original node. If the verification is success, the information collecting to the packets that packets are send to the destination.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
Wireless sensor networks gains its importance because of the critical applications in which it is involved like
industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor
networks we consider an active attack, NODE REPLICATION attack and COLLUDING attack. We use localized
algorithms, ((ie) replication detection is done at the node level and eliminated without the intervention of the base
station) to solve replication attacks and colluding attacks. Replication attacks are detected to using a unique key pair
and cryptographic hash function. We propose to use XED and EED algorithm[1] ( authenticates the node and tries to
reduce the replication) , with this using the Event detected location , non-beacon node is used to find the location of a
malicious node and by a simple threshold verification we identify malicious clusters
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
Node clone detection using a stable overlay network IJECEIAES
Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data‟s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Hack Recognition In Wireless Sensor NetworkIJERA Editor
A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Evaluation of reactances and time constants of synchronous generatoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mri image registration based segmentation framework for whole hearteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Economic feasibility report on cetp using physico chemical process-a case studyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Feasibility study of concrete based pavement by using fibers & cementing wast...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Journals
Abstract Wireless Sensor Network consists of hundreds or thousands of sensor nodes. Impractical to maintain topology and protect each sensor nodes from attack. Wireless Sensor Network is often deployed in an unattended and hostile environment to perform the monitoring and data collection tasks. When sensor nodes are deployed in such an environment, sensor network lacks in physical protection and is subject to insertion of malicious node. After that an adversary may launch various attacks to disrupt the in-network communication through malicious node. In such attacks malicious node behave like normal nodes by selectively drop packets for make it harder to detect their malicious nature. Many schemes have been proposed to detect malicious nodes, but very few can identify attacks. But those proposals are send redundant packets, consume more energy and storage to identify malicious nodes. A simple and effective scheme proposed as Stop Transmit and Listen (STL) to find the malicious node. Each node is having the built-in time limit to stop their transmission. For every few seconds every node stops their transmission and listens for malicious behavior. Malicious nodes are not aware of non-transmitting time. If malicious node sends or forwards the data in non-transmitting time, malicious node is caught by their neighbor nodes in the network. Key Words: IDS, Secure Routing Protocol, Stop Transmit and Listen
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Similar to Efficient distributed detection of node replication attacks in mobile sensor networks (20)
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Efficient distributed detection of node replication attacks in mobile sensor networks
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 7
EFFICIENT DISTRIBUTED DETECTION OF NODE REPLICATION
ATTACKS IN MOBILE SENSOR NETWORKS
Balaji.N1
, Anitha.M2
1
Department of Computer & Communication Engineering M.A.M College of Engineering, Tamilnadu, India
2
Department of Information &Technology Engineering M.A.M College of Engineering, Tamilnadu, India
Abstract
Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. Detecting and monitor of the
node is very difficult in distributed network and form a node replication attacks in a mobile sensor network .To detect the node
replication attacks in mobile sensor networks using two localized algorithms, XED and EDD. Our proposed algorithm can resist node
replication attacks in a localized fashion. Note that, the Nodes only need to do a distributed algorithm, task without the intervention of
the base station. The techniques developed in our solutions are to challenge and response and encounter number, are fundamentally
different from the others. Moreover, while most of the existing schemes in static networks rely on the witness finding strategy is cannot
be applied to mobile sensor networks, the velocity exceeding strategy used in existing schemes in mobile networks incurs efficiency
and more no security problems. Therefore, based on our node replication challenge and response to encounter number approaches in
localized algorithms are proposed to resist node replication attacks in mobile sensor networks. The advantage of our proposed
algorithm include 1) Localized detection; 2) Efficiency and effectiveness; 3) Network-wide synchronization avoidance; 4) Network-
wide revocation avoidance Performance comparisons with known methods are provided to demonstrate the efficiency of our proposed
algorithms.
Keywords: Mobile Sensor Network, Attack, node replication attack, static and mobile WSN.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Recent researches Wireless communication and portable
computers with two or more mobile nodes already issued a
temporary network without the use of network infrastructure
or centralized management of the sensor mobile network you
can create . That led to a new concept [1]. Source and
destination mobile node to communicate with each other, if
not within the scope of the data packets to the mobile parts [2],
which is between the relaying transmissions through other
mobile hosts in the mobile host is not allowed to do. Here, in
no special infrastructure such as military and rescue affairs in
various fields, many applications developed for mobile
networks are expected to be required. A sensor node, the node
captured from the same identity (ID) number of copies of the
lead, and malicious activities, and strategic levels of the
network makes the replicas. This is a so -called node
replication attacks. Each node in a sensor network is free to
move freely in any direction. Cellular system is rather a master
-slave relationship.
Fig.1 Node Replication Attack
This temporary access to data networks is less than that of
conventional fixed networks. Hope is not a viable solution for
the owner of the original data, the data items that went into the
mobile area. A voting mechanism, using neighbors ' can reach
consensus on a legal point [3].Unfortunately, when you reach
a distributed fashion innovation, disjoint parts distribution
network response time to discover the identity of the node .At
least when nodes to replicate two hops from each other, the
local approach can detect the replicated node in a network.
When reproducing at least two hops away from each other at
the ends, you can find a local approach with the tip of a
network.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 8
1.1Wormhole Attack
In wormhole attack, a malicious node adversary receives
packets at one location in the network and tunnels them to
another location in the network, then that packets are resent
into the network, this tunnel between two colluding attackers
is called wormhole.
1.2 Black Hole Attack
This attack will flood of demand -based protocol to say it all.
In this attack, the attack will create a very narrow path in
response to a node receives a route request. The real answer is
that a malicious node will start from the front edge of the
answer, and then created a false path. [5] Malicious
communication between nodes can be added to the device
itself, it is the ability to move between them for misbehavior.
Interfere will carry the node with proper operation of the
network routing protocol and the number of attacks mounted.
1.3 Routing Table Overflow
In the case of overflow routing table, routing table overflow,
the causes are not nodes. Novel routes to avoid the creation or
implementation of the protocol were enough to overwhelm the
need to create routes. Proactive routing algorithms, routing
information before it needs to be found. It only needs to find a
way to process the reaction becomes mandatory. Toxic
poisoning routing node
1.4 Node Routing Poisoning
The node routing network nodes compromised. Other
authorized end up sending the actual routing of packets to
send updates or updates of any change [6]. Routing table
poisoning will provided caused by sub-optimal routing.
Traffic congestion in the network [7], or access the network
set up in a few areas. This invention uses the pseudo- demand
routing the attack can launch the attack. So before the request
packet is received by the legal way to receive and reject those
packets that the nodes
1.5Rushing Attack
On-demand routing protocol which use duplicate during the
route innovation process are vulnerable to this attack. An
attacker which receives a route request packet from the initiate
node flood the packet rapidly throughput the network before
further nodes which also receive the same route request packet
can respond. Nodes that receive the lawful route request
packet previously received through the attacker and hence
discard those packets.
1.6 Identification of Problem
Sensor networks, which are composed of a number of sensor
nodes with limited resources, have been demonstrated to be
useful in applications, such as environment monitoring [8] and
object tracking [9]. As sensor networks could be deployed in a
hostile region to perform critical missions, the sensor networks
are unattended and the sensor nodes normally are not equipped
with tamper-resistant hardware [7]. This allows a situation
where the adversary can compromise one sensor node,
fabricate many replicas having the same identity (ID) from the
captured node, and place these replicas back into strategic
positions in the network for further malicious activities. This
is also-called node replication attack. Since the credentials of
replicas are all clones of the captured nodes, the replicas can
be considered as legitimate members of the network, making
detection difficult. From the security point of view, the node
replication attack is extremely harmful to networks because
replicas, having keys, can easily launch insider attacks,
without easily being detected.
2. RELATED WORKS
The first detection of node replication attacks solutions relies
on a centralized base station WORKS. In this solution, each
node is a base station (BS), its neighbors and sends a list of
suggested places [3] .the “Close" to each other, the two lists
are sent to the nodes that do not result in the entry clone
detection. Then, BS becomes clones. This solution has several
drawbacks in the presence of a single point of failure BS, and
communication costs are high due to the large number of
messages. Also, BS so close to the edges of their operational
life is shorter than the other nodes to route messages. Finding
other solutions remains local. For example, a voting
mechanism for a particular node [10] is used in a near -term
adoption. These kinds of node will the same location, the false
detection problem, if you cannot find. Node replication attacks
described finding the solution to a naive point of distribution
network broadcast. . The solution for the network was flooded
by comparing the location information. Each node in a
network containing information about the location neighbor
found a tip of the nozzle is in a position corresponding to the
position that enjoys a location claim; this will result in clone
detection. The WSN nodes and the number of iteration, the N
flooded However, this process is very energy consuming.
Sybil attack, a node will be deleted from the ends of a number
of stolen identities says. Identity theft is on the chip and clone
attacks that are based on the reference; however, angles two
attacks [11] are available. They are effectively addressed RSSI
or authentication mechanism based on a fixed key knowledge.
They are efficiently addressed mechanism for RSSI or with
authentication Based on the knowledge of a fixed key set for
efficient detection of clone attacks is actually an open issue.
To the best of our knowledge the first non naïve, globally-
aware and distributed node-replication detection solution was
recently proposed [12]. In particular, two distributed detection
protocols with emergent properties were proposed. The first
one, the Randomized Multicast (RM) [13], distributes node
location information to randomly-selected nodes. The second
one, the Line-Selected Multicast (LSM), uses the routing
topology of the network to detect replication. In the RM, when
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 9
a node broadcasts its location, each of its neighbours sends a
digitally signed copy of the location claim to a set of randomly
selected nodes. Assuming there is a replicated node, if every
neighbour randomly selects O (√n) destinations, then
exploiting the birthday paradox. There is a non negligible
probability at least one node will receive a pair of non
coherent location claims. The node that detects the existence
of another node in two different locations within the same
time-frame will be called witness.
The RM protocol implies high communication costs: Each
neighbour has to send O (√n) messages. To solve this problem
the authors propose using the LSM protocol [14]. The LSM
protocol behaviour is similar to that of RM but introduces a
minor modification that implies a noticeable improvement in
terms of detection probability. Node replication is eventually
detected by the node (called witness) on the intersection of
two paths that originate from different network positions by
the same node ID [15], [16], In fact, during a check the same
node y0 is present with two non-coherent locations; the
Witness will trigger a revocation protocol for node y0.
3. PROPOSED SYSTEM
To detect the replicas node in mobile sensor networks using
two algorithms, XED and EDD, are proposed. The proposed
techniques developed a solutions for a replica attack,
challenge-and-response and encounter-number, are
fundamentally different from the others. The proposed
algorithm can resist node replication attacks in a localized
fashion. Compared to the distributed algorithm, nodes perform
the task without the intervention of the base station. The
localized algorithm is a particular type of distributed
algorithm. Each node in the localized algorithm can
communicate with only its one-hop neighbors’. This
characteristic is helpful in reducing the communication
overhead significantly and enhancing the resilience against
node compromise. The algorithm can identify replicas with
high detection accuracy. The revocation of the replicas can be
performed by each node without flooding the entire network
with the revocation messages. The time of nodes in the
network does not need to be synchronized.
3.1 Target Localization Problem
Such as environmental monitoring and multi- sensor target
tracking sensor network applications, plays a key role.
Wireless sensor networks based on techniques developed in
places like the tip of a sensor based on the location
information in routing decisions need to shout . Beacon nodes
to use some special nodes to be considered in their own places
of ethics / prediction methods, innovation, and more than
location. These algorithms work in two steps. The first step:
Non lighthouse beacon nodes to nodes that receive messages
from the radio signals. The message includes a reference to the
location of the beacon node. Second Step will provide non
lighthouse beacon and non- beacon nodes, for example, the
distance between the nodes, perform some specific
measurements. And the arrival time difference between the
received signal strength measurements in terms of the
messages. Without protection, an attacker can easily spoil and
normal operation of the sensor nodes for location estimation of
sensor networks to be carried out. In different places, running
in the wrong place can offer tips to prevent an attack beacon
packets. Also, an attacker manipulating and lying about the
location of a lighthouse or beacon signals may be
compromised to distribute malicious location references.
Beacon signals. In one case, the non- beacon nodes to
determine their locations wrong. From the point of view of
security and connection dimensions of the problem has been
studied intensely in recent years. The most common problem
with a sensor area of security issues in the sensitive area of a
circular disk model assumes that it is cantered. At one point he
is said to be in the sensing area.
4. DETECTON TECHNIQUE OVER MOBILE
SENSOR NETWORK
In this paper, a defense mechanism against replication attacks
is proposed in mobile sensor networks .In this technique;
multiple paths are established between source and destination
for data transmission using XED and EDD for optimization. In
the elected routes, the nodes with highest trust value, residual
bandwidth and residual energy are elected as active nodes by
using ant agents. Every active node monitors its neighbor
nodes within its transmission region and collects the trust of
all monitored node. The active nodes adaptively change as per
the trust thresholds.
Fig.2 Architecture of mobile sensor network
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 10
4.1 Detection System
In this paper detection -based security scheme provided for
mobile sensor network. Although mobile sensor network is
less computation and communication skills, as they continue
to permit the detection of anomalies in network nodes with
specific characteristics of the neighborhood information. We
show that the properties as key enablers to be used in large-
scale sensor networks security. In many attacks against mobile
sensor networks, initially as a legitimate node within the
network it has to do with the attack. Near the edges of a
simple dynamic statistical model of the received packet power
levels and lower risk by monitoring the arrival of a sensor
capable of detecting intruder detection built in conjunction
with the protocol to create nose in the networking nodes. We
show that such characteristics can be exploited as key enablers
for given that the security to large scale sensor networks. In
many attacks against Mobile sensor networks, initially
attacker is to make itself as a legitimate node within the
network. To create a sensor nose capable of detecting an
intruder a simple dynamic statistical model of the adjacent
nodes is built in conjunction with a low complication detection
algorithm by monitoring received packet power levels and
arrival rates
4.2 Node Deployment
Each node requests our node deployment to the base station at
the time of deployment. After requesting, Node details are
verified and save accordingly. Details include Node-Id, IP-
Address and Port Number. Base station captures the node
position and also save the node current position. Base station
updates node position as per the node movement. Base station
monitors the entire network and updates its position as per the
movement.
4.3Execute Offline Step
In this module execute our proposed algorithm’s Offline steps.
Our algorithm generates the secret key and saves accordingly.
The current node maintains other node’s given secret key at
the time of meet past interaction. Current node maintains the
block list also. The block list consist of replicated node details
are stored.
4.4 Find Next Hop and Candidate Hop
Based on sensor node’s geographic position and source node’s
(Main system) geographic position prepare the neighbor list to
avoid opposite direction nodes. Neighbor list consist of current
coverage’s all the node. Prepare next hop and candidate list
based on the neighbor list. Next hop is selected from neighbor
list based on the source node nearby hop balanced node is add
candidate list. The candidate list is used when current next hop
is any problem (For example at the time of replication
detection next hop is any problem furthermore candidate list is
considerable.) the next priority is given to candidate hop. If
more than one candidate is available the higher priority is goes
to nearby source node position.
4.5 Localized Detection
After getting next hop name, execute our proposed algorithm’s
online steps. In that algorithm first check next hop is source
node or not, if yes object will directly forward to source node.
Otherwise check current node meet already the next hop or
not, if yes request the secret key given during previous
interaction. Current hop check the received secret key is
matching to previously given. If yes, then current node made
communication to next hop and replace the existing secret key
in next hop otherwise it is replicated node. The current next
hop name is added to the current sensor nodes block list.
4.6 Eliminate Replicated Hop
In localized detection find any replicated node to eliminate
current hop and select another next hop from candidate list.
Again execute our proposed algorithm. This process is made
up to get original hop
5. PERFORMANCE METRICS
The performance is evaluated according to the following
metrics for node reapplication attack in mobile sensor
network. This can evaluate a dictions performance in easy
manner
Table1: Detection Mechanisms for performance overheads
6. MATHEMATICAL MODEL
Step 1: Let us consider in WSN with node, witness node set
&neighbour.
Where,
x = Number of nodes in the network
p = probability a neighbour replicates location information
z = Number of witness nodes
Step2: Probability of selected witness node is
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 11
(1-z) (1)
Step3: The attack is detected is equal to the probability that at
least one neighbour of each clone sends the claim to the same
witnesses.
(1-(1-z) ^x)^2 (2)
Step4: The evaluation of protocol is done based on energy
consumption, memory overhead, detection probability by
using below equation
(O (p .z .x) (3)
Chart -1.Comparison of protocols
7. CONCLUSIONS
The Replica Detection Algorithms for mobile sensor
networks, XED and EDD, are proposed. Although XED is not
resilient against collusive replicas, its detection framework,
challenge-and-response, is considered novel as compared with
the existing algorithms. Notably, with the novel encounter-
number detection approach, which is fundamentally different
from those used in the existing algorithms, EDD not only
achieves balance among storage, computation, and
communication overheads, which are all, but also possesses
unique characteristics, including network-wide time
synchronization avoidance and network-wide revocation
avoidance, in the detection of node replication attacks. This
method improves the security aspect of wireless sensor
networks mainly in unattended environment and improves the
real time data acquisition systems in future.
REFERENCES
[1] R. Brooks, P. Y. Govindaraju, M. Pirretti, N.
Vijaykrishnan, and M.T. Kandemir, “On the detection
of clones in sensor networks using random key
predistribution,” IEEE Trans. Syst., Man, Cybern. C,
Applicat. Rev., vol. 37, no. 6, pp. 1246–1258, Nov.
2007.
[2] M. Conti, R.Di Pietro, L. V. Mancini, andA.Mei,
“Arandomized, efficient, and distributed protocol for
the detection of node replication attacks in wireless
sensor networks,” in Proc. ACMInt. Symp. Mobile Ad
Hoc Networking and Computing (MobiHoc), Montreal,
Canada, 2007, pp. 80–89.
[3] J. Ho,M.Wright, and S. K. Das, “Fast detection of
replica node attacks in mobile sensor networks using
sequential analysis,” in Proc. IEEE Int. Conf.
Computer Communications (INFOCOM), Brazil, 2009,
pp.1773–1781.
[4] B. Parno, A. Perrig, V. Gligor, “Distributed detection
of node replication attacks in sensor networks,” in
Proc. IEEE Symp. Security and Privacy (S&P),
Oakland, CA, USA, 2005, pp. 49–63.
[5] K. Xing and X. Cheng, “From time domain to space
domain: Detecting replica attacks in mobile ad hoc
networks,” in Proc. IEEE Int. Conf. Computer
Communications (INFOCOM), SanDiego,CA, USA,
2010, pp. 1–9.
[6] C.-M. Yu, C.-S. Lu and S.-Y. Kuo, “Mobile sensor
network resilient against node replication attacks,” in
Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc
Communications and Networks (SECON), California,
USA, 2008, pp. 597–599, (poster).
[7] C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “Efficient and
distributed detection of node replication attacks in
mobile sensor networks,” in Proc. IEEE Vehicular
Technology Conf. Fall (VTC-Fall), Anchorage, AK,
USA, 2009, pp. 1–5.
[8] B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang,
“Localized multicast: Efficient and distributed replica
detection in large-scale sensor networks,” IEEE Trans.
Mobile Comput., vol. 9, no. 7, pp. 913–926, Jul. 2010.
[9] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie,
“Random-walk based approach to detect clone attacks
in wireless sensor networks,” IEEE J. Sel. Areas
Commun., vol. 28, no. 5, pp. 677–691, Jun. 2010.
[10] M.Zhang, V. Khanapure, S. Chen, and X. Xiao,
“Memory efficient protocols for detecting node
replication attacks in wireless sensor networks,” in
Proc. IEEE Int. Conf. Network Protocols (ICNP),
Princeton, NJ, USA, 2009, pp. 284–293.
[11] R. A. Johnson and D. W. Wichern, Applied
Multivariate Statistical Analysis. Englewood Cliffs, NJ,
USA: Prentice-Hall, 2007.
[12] T. Karagiannis, J. L. Boudec, and M. Vojnovic,
“Power law and exponential decay of inter contact
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 12
times between mobile devices,” in Proc. ACM Int.
Conf. Mobile Computing and Networking (MobiCom),
Montreal, Canada, 2007, pp. 183–194.
[13] M. Luk, G. Mezzour, A. Perrig, and V. Gligor,
“MiniSec: A securesensor network communication
architecture,” in Proc. Int. Conf. Information
Processing in Sensor Networks (IPSN),
Cambridge,MA, USA, 2007.
[14] Liu and P. Ning, “TinyECC: A configurable library for
elliptic curvecryptography in wireless sensor
networks,” in Proc. Int. Conf. Information Processing
in Sensor Networks (IPSN), Missouri, USA, 2008,
pp.245–256.
[15] D. J. Malan, M. Welsh, and M. D. Smith,
“Implementing public-key infrastructure for sensor
networks,” ACM Trans. Sensor Network, vol. 4, no. 4,
pp. 1–23, 2008
[16] J. Newsome, E. Shi, D. Song, and A. Perrig, “The
Sybil attack in sensor networks: Analysis and
defenses,” in Proc. Int. Conf. Information Processing
in Sensor Networks (IPSN), Berkeley, CA, USA, 2004,
pp. 259–268
BIOGRAPHIES
N.BALAJI received B.E.-Computer
science Engineering (2012) from j.j.
college of engineering and Technology,
Trichy ,Tamil Nadu, India under Anna
University and M.E. in Computer and
Communication Engineering (2014) from
Anna University, M.A.M College Of Engineering, Trichy,
India. Her current research area is Wireless Sensor Network
Security.
Ms.M.Anitha is an Assistant Professor in
the Department of information technology
at M.A.M College Of Engineering, Trichy,
India. She received his B.E. in computer
Sciences and Engineering from A.R.J
College of Engineering & Technology,
Mannargudi. Anna University Tamil Nadu, India. In
2011 and She received his M.Tech in Advanced Computing
from SASTRA University Tamil Nadu, India in 2013.