IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been
associated to business, socially and in some critical applications like Military etc, The network which is
formed by self configuring wireless links which are connected to each other. These applications are
categorized by hostile environment that they serve while communicating between nodes. However in such
Wireless Network will be more exposed to different types of security attacks. The challenge is to meet
secure network communication. In this paper we focus on cluster based secure communication to improve
the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster
Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures.
The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify
the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens
are requested to classify and expel the attacker nodes which submit wrong reports.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
Wireless Sensor Networks (WSN) is a group of sensor nodes, each equipped with its own sensors, processor
and radio transceiver. Sensor nodes are characterized by low bandwidth, small memory sizes, limited power supplies and
limited energy. Without physical protection and in unattended environments all the Sensor nodes are deployed in open, so
security is important, as they prone to different types of malicious attacks. Wireless Sensor Network (WSN) is useful for
collecting the information from the Environment. The nodes will sense the information from the environment and sends
the data to other nodes or Base Stations. During the process of transmission of data, many security techniques and
methods are used. But the Wireless Sensor Networks are very difficult to secure the data, due to its mobility. Key
Management is important for implementing security in a wireless Sensor Network. In this paper, moving sensors will
provide security for the data collected and transmitted. The security is provided by using the Virtual Certificate (VC),
issued by the Virtual Certificate Authority (VCA). This mechanism overcomes the difficulties in the Wireless Sensor
Network. This mechanism verifies the validity of the proposed schemes and analyzes the consumption of energy,
communication overhead and packet loss.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Deep Learning based Threat / Intrusion detection systemAffine Analytics
The article is about a Threat/Intrusion Detection System, which could be used to detect such data leaks/breaches & take a preventive action to contain, if not stop the damage due to breach.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
In the study of network intrusion, much attention has been drawn to on-time detection of intrusion to safeguard public and private interest and to capture the law-breakers. Even though various methods have been found in literature, some situations warrant us to determine intrusions of network in real-time to prevent further undue harm to the computer network as and when they occur. This approach helps detect the intrusion and has a greater potential to apprehend the law-breaker. The purpose of this article is to formulate a method to this effect that is based on the statistical quality control techniques widely used in the manufacturing and production processes.
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
MANET (Wireless Mobile Ad-hoc Network) is a technology which are used in society in daily life an
activities such as in traffic surveillance, in building construction or it’s application is used in battlefield also. In
MANET there is no control of any node here is no centralized controller that’s why each node has its own
routing capability. And each node act as device and its change its connection to other devices.
The main problem of today’s MANET is a security, because there is no any centralized controller. Our main aim
is that we protect them from DDOS attack in terms of flooding through messages, packet drop, end to end delay
and energy dropping etc. For that we are applying many techniques for saving energy of nodes and identifying
malicious node and types of DDOS attack and in this paper we are discussing this technique.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been
associated to business, socially and in some critical applications like Military etc, The network which is
formed by self configuring wireless links which are connected to each other. These applications are
categorized by hostile environment that they serve while communicating between nodes. However in such
Wireless Network will be more exposed to different types of security attacks. The challenge is to meet
secure network communication. In this paper we focus on cluster based secure communication to improve
the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster
Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures.
The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify
the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens
are requested to classify and expel the attacker nodes which submit wrong reports.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
Wireless Sensor Networks (WSN) is a group of sensor nodes, each equipped with its own sensors, processor
and radio transceiver. Sensor nodes are characterized by low bandwidth, small memory sizes, limited power supplies and
limited energy. Without physical protection and in unattended environments all the Sensor nodes are deployed in open, so
security is important, as they prone to different types of malicious attacks. Wireless Sensor Network (WSN) is useful for
collecting the information from the Environment. The nodes will sense the information from the environment and sends
the data to other nodes or Base Stations. During the process of transmission of data, many security techniques and
methods are used. But the Wireless Sensor Networks are very difficult to secure the data, due to its mobility. Key
Management is important for implementing security in a wireless Sensor Network. In this paper, moving sensors will
provide security for the data collected and transmitted. The security is provided by using the Virtual Certificate (VC),
issued by the Virtual Certificate Authority (VCA). This mechanism overcomes the difficulties in the Wireless Sensor
Network. This mechanism verifies the validity of the proposed schemes and analyzes the consumption of energy,
communication overhead and packet loss.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Deep Learning based Threat / Intrusion detection systemAffine Analytics
The article is about a Threat/Intrusion Detection System, which could be used to detect such data leaks/breaches & take a preventive action to contain, if not stop the damage due to breach.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
In the study of network intrusion, much attention has been drawn to on-time detection of intrusion to safeguard public and private interest and to capture the law-breakers. Even though various methods have been found in literature, some situations warrant us to determine intrusions of network in real-time to prevent further undue harm to the computer network as and when they occur. This approach helps detect the intrusion and has a greater potential to apprehend the law-breaker. The purpose of this article is to formulate a method to this effect that is based on the statistical quality control techniques widely used in the manufacturing and production processes.
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
MANET (Wireless Mobile Ad-hoc Network) is a technology which are used in society in daily life an
activities such as in traffic surveillance, in building construction or it’s application is used in battlefield also. In
MANET there is no control of any node here is no centralized controller that’s why each node has its own
routing capability. And each node act as device and its change its connection to other devices.
The main problem of today’s MANET is a security, because there is no any centralized controller. Our main aim
is that we protect them from DDOS attack in terms of flooding through messages, packet drop, end to end delay
and energy dropping etc. For that we are applying many techniques for saving energy of nodes and identifying
malicious node and types of DDOS attack and in this paper we are discussing this technique.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Geospatial information system for tourism management in aurangabad city a re...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A 2.4 ghz cmos lna input matching design using resistive feedback topology in...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Coupling the bionic surface friction contact performance and wear resistance ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Misconduct disclosure of the intermediates using the trusted authorityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
Abstract A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries. Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner (since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc networks. Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been associated to business, socially and in some critical applications like Military etc, The network which is formed by self configuring wireless links which are connected to each other. These applications are categorized by hostile environment that they serve while communicating between nodes. However in such Wireless Network will be more exposed to different types of security attacks. The challenge is to meet secure network communication. In this paper we focus on cluster based secure communication to improve the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures. The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens are requested to classify and expel the attacker nodes which submit wrong reports.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Report based payment scheme for multihop wireless networkseSAT Journals
Abstract We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., signatures. The AC can verify the payment by investigating the consistency of the reports, and clear the payment of the fair reports with almost no processing overhead or cryptographic operations. For cheating re-ports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports. Instead of requesting the Evidences from all the nodes participating in the cheating reports, RACE can identify the cheating nodes with requesting few Evidences. Moreover, Evidence aggregation technique is used to re-duce the Evidences’ storage area. Our analytical and simulation results demonstrate that RACE requires much less communication and processing overhead than the existing receipt-based schemes with acceptable payment clearance delay and storage area. This is essential for the effective implementation of a payment scheme because it uses micropayment and the overhead cost should be much less than the payment value. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations. Index Terms: Cooperation incentive schemes; network-level security and protection; payment schemes; and selfishness attacks.
Eport based payment scheme for multihop wireless networkseSAT Journals
Abstract We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., signatures. The AC can verify the payment by investigating the consistency of the reports, and clear the payment of the fair reports with almost no processing overhead or cryptographic operations. For cheating re-ports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports. Instead of requesting the Evidences from all the nodes participating in the cheating reports, RACE can identify the cheating nodes with requesting few Evidences. Moreover, Evidence aggregation technique is used to re-duce the Evidences’ storage area. Our analytical and simulation results demonstrate that RACE requires much less communication and processing overhead than the existing receipt-based schemes with acceptable payment clearance delay and storage area. This is essential for the effective implementation of a payment scheme because it uses micropayment and the overhead cost should be much less than the payment value. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations. Index Terms: Cooperation incentive schemes; network-level security and protection; payment schemes; and selfishness attacks.
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
Abstract In multihop cellular networks mobile nodes typically transmit packets during intermediate mobile nodes for enhancing recital. Stingy nodes typically don't collaborate that incorporates a negative result on the network fairness and recital. A fair, inexpensive and best incentive mechanism by Selfish Node Detection (FESCIMbySND) has been projected to stimulate the mobile node’s cooperation. Hashing operations area unit employed in order to extend the safety. Trivial Hash perform has been wont to improve end-to-end delay and outturn. Additionally Cyclic Redundancy Check Mechanism has been used to spot the ridiculous nodes that involve themselves in sessions with the intention of dropping the in sequence packets. Moreover, to cut back the impact at the Accounting Center a Border node has been commend the task of propose the checks employing a digital signature. Keywords: Border Node Mechanism, Cyclic Redundancy Check, Selfish nodes, Trivial Hash Function
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Dete...Eswar Publications
Wireless Sensor Networks (WSN) consist of a number of resource constrained sensors to collect and monitor data from unattended environments. Hence, security is a crucial task as the nodes are not provided with tamper-resistance hardware. Provision for secured communication in WSN is a challenging task especially due to the environment in which they are deployed. One of the main challenges is detection of intrusions. Intrusion detection system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches. Different intrusion detection methods have been proposed in the literature to identify attacks in the network. Out of these detection methods, machine-learning based methods are observed to be efficient in terms of detection accuracy and alert generations for the system to act immediately. A brief study on different intrusions along with the machine learning based anomaly detection methods are reviewed in this work. The study also classifies the machine learning algorithms into supervised, unsupervised and semi-supervised learning–based anomaly detection. The performances
of the algorithms are compared and efficient methods are identified.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
ABSTRACT
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
The technique to detect and avoid the denial of service attacks in wireless s...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Elevating security in mobile adhoc network using (20)
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
Elevating security in mobile adhoc network using
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 687
ELEVATING SECURITY IN MOBILE ADHOC NETWORK USING
CLUSTER-BASED CERTIFICATE REVOCATION WITH
VINDICATION CAPABILITY
S.Herman Jeeva1
, D.Saravanan2
, RM.Chandrasekaran3
, Uma M4
1
PG scholar, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg. And Tech.,
Trichy, Tamilnadu, India
2
Associate Professor, Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg.
And Tech., Trichy, Tamilnadu, India
3
Professor, Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamilnadu,
India
4
Assistant Professor Department of Computer Science and Engineering, Pavendar Bharathidasan college of Engg.
And Tech., Trichy, Tamilnadu, India
Abstract
Mobile Ad hoc Networks (MANETs) is a continuously self-configuring, infrastructure-less network of mobile devices connected
without wires and also it is an open network environment where nodes can join and leave the network freely. Hence, the dynamic
natures of MANETs is not secure than the wired networks. To overcome this issue, the Cluster-based Certificate Revocation with
Vindication Capability (CCRVC) scheme is proposed. In the meanwhile nodes forms a cluster consists of a Cluster Head with
some Cluster Members (CMs) situated within the transmission range of their cluster Head. Each node should have to acquire
valid certificates from the Certification Authority (CA) before it can join the network that is responsible for distribution and
management of certificates to all nodes and also CA is responsible for updating two lists, Warning list and Black list. Both the
lists are used to hold the accusing and accused nodes information, respectively. Experimental results show that the proposed
CCRVC scheme is effective and efficient to provide efficient and secure communication.
Keywords— Mobile ad hoc networks (MANETs), certificate revocation, and security.
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Certificate Management is the widely used mechanism in
MANET'S. Since in a public key infrastructure [12] it helps
in delivering trust and to protect applications and network
services. A complete security solution of certificate
management has three components such as prevention,
detection, and revocation. Many research efforts took place
in some areas such as certificate verification, certificate
distribution [14], attack detection [2], [6] and certificate
revocation [1]. In order to secure network communications,
Certification is essential.
Using the digital signature of the issuer, the public key is
encrypted into an attribute. It is used to guarantee that a
public key belongs to an individual and also in mobile
Adhoc networks it helps to prevent tampering and forging.
Many research efforts are made to weaken malicious attacks
on the network. For enlisting and removing the certificates
of nodes, certificate revocation plays a major task which has
been detected to launch attacks on the neighborhood. This
all will happen when attacks are identified. Certificate
Revocation helps in removing misbehaving nodes from the
network and gets blocked from all its activities suddenly.
Certificate revocation’s basic security problem is aimed at
providing secure communications in MANETs.
To elevate the performance of MANET, Cluster-based
Certificate Revocation with the scheme of Vindication
Capability (CCRVC) is proposed. Topology is constructed
as clusters. Some of the nodes joined to form a cluster
consist of nodes within the transmission range and each
cluster contains Cluster Head (CH) and Cluster Member
(CM). To join the network each node should have a valid
certificate. Certification Authority (CA) issues the valid
certificates. Nodes are arranged as clusters that ensures
preloading of certificate which is responsible for issuing and
maintaining certificates of all nodes which can communicate
with each other without any constraints. For holding the
information of accusing and accused nodes, CA updates two
lists such as Warned list and Black lists.
Through votes, a malicious attacker’s certificate get revokes
from valid neighboring nodes using Voting-based
mechanism. Neighboring nodes issues certificates for new
joining nodes. The certificate of an attacker is revoked,
based on votes from its neighbor’s nodes.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 688
Fig-1: Cluster-Based Architecture
Without a valid certificate nodes cannot communicate with
each other and that node gets isolated from network
activities using certificate revocation. A main challenge is
threshold determination. Nodes that are launching attacks
cannot be revoked if it exceeds the network degree and can
successively communicate with other nodes.
False accusations which are malicious are not addressed by
URSA from nodes is a critical issue. The scheme which
allows all nodes that are connected in the network to vote
together is proposed by Arboit et al. [1]. The primary
difference from URSA is that nodes vote with different
weights but URSA has no Certification Authority present in
the network instead of that each node plays a role of
monitoring the behavior of its neighbors. Here node’s
weight is calculated in terms of dependability and
truthfulness of the node that can be the number of
accusations against other nodes and itself from others. The
acquired weight is increased because of its reliability. The
accuracy of certificate revocation is enhanced, when the
weighted sum from voters against the node exceeds a
predefined threshold so the certificate of an accused node is
normally revoked. Because of voting between each node,
communications overhead used to exchange voting
information would be high and it rises the revocation time.
Non-voting-based mechanism states that a given node
deemed as a malicious attacker will be decided by any node
with a valid certificate. The suicidal strategy which was
proposed Clulow et al. [4] proposed that only one accusation
completes certificate revocation quickly. Certificates of both
the accused node and accusing node have to be revoked
simultaneously. Each time accusing node has to sacrifice
itself to remove an attacker from the network. Due to its
suicidal strategy, the application of this strategy is limited
even though this approach reduces both the time required to
remove a node and communications overhead.
Simultaneously, the accuracy is reduced.
Park et al. [10] proposed a cluster-based certificate
revocation scheme, where nodes are self-organized to form
clusters. In this scheme, a trusted certification authority
manages the control messages, holding the accuser and
accused node in the warning list (WL) and blacklist (BL)
which is maintaining by certification authority. The main
advantage of the voting-based mechanism is that the high
accuracy in confirming the given accused node as a real
malicious attacker or not.
The main disadvantages of non-voting-based method are
slow decision process to satisfy the condition of certificate
revocation and also it sustains heavy communications
overhead to exchange the accusation information for each
other.
Cluster-based Certificate Revocation with Vindication
Capability (CCRVC) scheme is proposed [10], [8]. In this,
clustering plays a major role, where the cluster head is to
detecting the falsely accused nodes within its cluster and
regaining their certificates to solve the issue of false
accusation.
CCRVC achieves immediate revocation and lowering
overhead as compared to the voting-based scheme and when
compared to the non-voting-based scheme improves the
reliability and accuracy.
2. THE PROBLEM
It is difficult to identify the attackers through wireless Ad
hoc network since it is a self configured network. Various
revocation techniques are used for enhancing network
security.
Two types of mechanisms used for certificate revocation are
Voting based mechanism and non-voting mechanism.
2.1 Voting based Mechanism
In URSA, each node provides a vote to its neighbor node
within the cluster. Here each node performs one-hop
monitoring with its neighbor nodes and monitoring
information is exchanged with its neighboring nodes. A
predefined number is maintained as a threshold for getting
negative votes by each node. When the threshold value by
exceeds the number of negative votes for a node, the
certificate of accused node gets revoked. Then, the node can
get isolated from the network activities. However, the
accused node would be communicating with other nodes in
network when threshold value is assigned larger. The risk
factor is that false accusation from malicious node is not
addressed.
Arboit et al. [15] proposed that voting varies with the
weights. The weight of a node is calculated based on the
reliability and trustworthiness which can be derived from its
past behaviors.
When the weighted sum from voters against the node
exceeds a predefined threshold, the certificate can be
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 689
revoked. The certificate revocation accuracy can be
enhanced and communication overhead would be high when
all nodes are participated in each voting.
2.2 Non-voting based Mechanism
Due to the suicidal strategy, Certificate revocation can be
completed by only one accusation that is simultaneously
both the accused node and accusing node certificates will be
revoked.
In the non-voting based mechanism, the time required
removing an accused node and communications overhead of
the certificate revocation procedure can be reduced but the
accuracy will be low.
3. CONTRIBUTION
Cluster-based Certificate Revocation with Vindication
Capability (CCRVC) scheme is proposed. In this, the falsely
accused nodes within its cluster are detected using the
cluster head and using certification authority recovering
their certificates to solve the issue of false accusation.
CCRVC scheme compared to the voting-based scheme to
achieve prompt revocation and lowering overhead and also
CCRVC scheme compared to the non-voting-based scheme
to improve the reliability and accuracy. Cluster-based
revocation scheme revokes attacker nodes keep receiving
only one accusation node from a neighboring node.
The Certification authority scheme maintains two types of
lists called warning list and blacklist to guard against
malicious nodes from further framing other legitimate
nodes. Moreover, false accusation can be addressed by the
cluster head which is in the clustering architecture to revive
the falsely revoked nodes. In this, the main focus is that
once a malicious attacker has been identified, the certificate
revocation procedure is done, rather than the attack
detection mechanism itself. Within one-hop away, each
node has the ability to detect its neighboring attack nodes.
Clusters are formed with cooperation of nodes and within
the transmission range each cluster consists of a Cluster
Head with some Cluster Members (CMs). Before joining the
network each nodes have to acquire valid certificates from
the Certification Authority, which is responsible for issuing
and maintaining certificates of all nodes, so that nodes can
easily communicate with each other.
Based on their reliability, nodes are termed as normal node,
warned node, and revoked node
Normal Node: Normal Node is a node which joins the
network and does not launch attacks. This type of nodes has
high reliability and also has the capacity to accuse other
nodes and to proclaim itself as a CH or a CM.
Warned Node: Warned nodes are the nodes which are in
the warning list with low reliability They are considered
doubtful because the warning list contains a mixture of
legitimate nodes and a few malicious nodes.
Revoked Node: Revoked nodes are the accused nodes that
are listed in the blacklist with little reliability. They are
considered as malicious attackers destitute of their
certificates and removed from the network.
4. SYSTEM DESIGN
The system design involves the different steps involved in
the proposed CCRVC scheme. The entire process is
summarized in the Fig.2 which gives a clear cut idea about
the proposed method.
4.1 Process
Each of the nodes sends an accusation packet to the
certificate authority (CA) against attacker node when the
neighboring nodes detect attacks from any one node. Based
on the first received packet, the CA holds neighboring node
in the Warning List (WL) and attacker node in the Black
List (BL). The CA disseminates the revocation message to
all nodes in the network after verifying the validity of
neighboring node. To revoke attacker’s certificate each node
update their local WL and BL only after receiving the
revocation message. At the same time, CH determine that
one of the node was framed by updates their WL and BL.
Then CA receives recovery packet from some of the
neighbor nodes to revive the falsely accused node. The CA
removes the falsely accused node from the BL and holds
both the falsely accused node and normal node in the WL
only after receiving the first recovery packet and then
disseminates the information to all the nodes. Finally the
nodes update their WL and BL to recover the falsely
accused node.
Fig-2: System Architecture.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 690
5. SYSTEM IMPLEMENTATION
5.1 Simulation of AODV Protocol
Fig-3: Creation of nodes and Transmission of packets using
AODV protocol
Creation of nodes and transmission of packets between
those nodes is made by Normal Network with AODV
protocol. The calculation of parameters such as end to end
delay (EED), throughput (Tp), packet delivery ratio (PDR),
energy (E) spent is done.
5.2 Simulation of DoS Attack
Implementation of DoS Attack during packet transmission
makes the performance degradation. The parameters such as
end to end delay (EED), throughput (Tp), packet delivery
ratio (PDR), energy (E) spent are calculated.
Fig-4: Dropping of packets
5.3 Simulation of CCRVC Scheme
Using proposed Cluster-based Certificate Revocation with
Vindication Capability (CCRVC) scheme, transmission of
packets between the nodes is done to avoid attack and to
increase network performance. The Calculation of
parameters such as end to end delay (EED) , throughput
(Tp), packet delivery ratio (PDR), energy (E) spent is made.
6. RESULT ANALYSIS
Comparison between AODV, ATTACK and CCRVC with
various parameters is done and output is shown using
graphs.
Fig-5: Graph Representing Variations of Delay
Fig. 6 Graph Representing Variations of Energy
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 691
Fig-7: Graph Representing Variations of Packet Delivery
Ratio
Fig-8: Graph Representing Variations of Throughput
All the above graphs show the variation of delay (D), energy
(E), packet delivery ratio (PDR) and throughput (Tp) with
respect to time.
7. CONCLUSIONS
A major issue is to ensure a secure communications in
MANET, certificate revocation of attacker nodes is
addressed. Cluster-based certificate revocation with
vindication capability scheme has advantages of both
voting-based and non-voting based mechanisms in which
malicious certificate is revoked and false accusation
problems are solved. This CCRVC scheme reduces the
revocation time as compared to the voting-based
mechanism.
In the cluster based model falsely accused nodes are restored
by the CH, which improves the accuracy when compared to
the non-voting based Mechanism. The legitimate nodes are
released and restored in a new stimulant method which also
enhances the number of available normal nodes in the
network for protecting the efficiency of quick revocation.
Thus the scheme of CCRVC is more potential and coherent
in certificate revocation of malicious attacker nodes,
reducing revocation time, and improving the validity and
reliability of certificate revocation.
REFERENCES
[1]. Arboit G., Crepeau C., Davis C.R. and Maheswaran M.
(2008) “A Localized Certificate Revocation Scheme for
Mobile Adhoc Networks,”Adhoc Network, vol.6, no.1,
pp.17-31.
[2]. Bounpadith Kannhavong, Hidehisa Nakayama,
Yoshiaki Nemoto, and Nei Kato. (2007) “A survey of
routing attacks in mobile Adhoc networks”
[3]. Camp T., Boleng J. and Davies. (2002) “The survey of
mobility models for Adhoc network research,” Wireless
Communication and Mobile Computing, vol.2, no.5, pp.
483-502.
[4]. Clulow J. and Moore T. (2006) “Suicide for the
Common Good: A New Strategy for Credential Revocation
in Self- organizing Systems,” ACMSIGOPS Operating
Systems Rev., vol.40, no.3, pp. 18-21.
[5]. Hegland A.M., Winjum E.,Rong C. and Spilling P.
(2006) “A survey of key management in Adhoc Networks,”
IEEE Communications Surveys and Tutorials, vol 8, no. 3,
pp. 48-66.
[6]. Herman Jeeva S. and Saravanan D.(2014)“Integral
Component CCRVC Scheme for Enhancing Security in
MANET” in IJIRSET, Vol.2, Special Issue 1, pp. 425 - 429.
[7]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas
Jamalipour,Yoshiaki Nemoto and Nei Kato.(2009) “A
Dynamic Anomaly Detection Scheme for AODV-Based
Mobile Adhoc Networks”.
[8]. Jie Lian, Kshirasagar Naik, Gordon B. and Agnew
(2004) “A Framework for Evaluating the Performance of
Cluster Algorithm for hierarchical Networks”
[9]. Liu W., Nishiyama H., Ansari N. and Kato N. (2011)
“A Study on Certificate Revocation in Mobile Adhoc
Network,” Proc. IEEE Int’l Conf. Comm. (ICC).
[10]. Luo J., Kong P., Zerfos S., Lu and Zhang L. (2004)
“URSA: Ubiquitous and Robust Access Control for Mobile
Adhoc Networks,” IEEE/ACM Trans. Networking, vol. 12,
no. 6, pp. 1049-1063.
[11]. Park K., Nishiyama H., Ansari N. and Kato N. (2010)
“Certificate Revocation to Cope with False Accusations in
Mobile Adhoc Networks,” Proc. IEEE 71st Vehicular
Technology Conf. (VTC’10), May 16-19.
[12].Sakarindr P. and Ansari N. (2007) “Security Services in
group communications over wireless infrastructure, mobile
Adhoc, and wireless sensor networks,” IEEE Wireless
Communications14(5), pp. 8-20.
[13]. Saravanan Dhavamani. and Chandarasekaran
Ramasamy(2014)“Trustworthy Enabled Reliable
Communication Architecture in Mobile Ad Hoc Network”
in Journal of Computer Science, pp. 1120 - 1129.
[14]. Yang H., Luo H., Ye F., Lu S. and Zhang L. (2004)
“Security in Mobile Adhoc Networks: challenges and
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 692
solutions,” IEEE Wireless Communications,11(1), pp. 38-
47.
[15]. Yang H., Shu J., Meng X. and Lu S. (2006) “SCAN:
Self-Organized Network Layer Security in Mobile Adhoc
Networks,” IEEE J. Selected Areas in Comm., vol.24, no.2,
pp. 261-273
BIOGRAPHIES
Mr. Herman Jeeva S received the B.E
degree in Computer Science and
Engineering from St.Joseph’s College of
Engineering and Technology, Thanjavur in
2012. He is currently doing the M.E in the
same stream in Pavendar Bharathidasan
College of Engineering and Technology, Mathur,
Tiruchirappalli.
Mr. Saravanan D received the B.E degree
in Electrical and Electronics Engineering
from Maharaja Engineering College,
Tiruppur in 2000 and received the M.E
degree in Computer Science and
Engineering from Annamalai University,
Chidambaram in 2005. He is currently doing the Ph.d in the
area of MANET and also working as an Associate Professor
in Pavendar Bharathidasan College of Engineering and
Technology, Tiruchirappalli with 11 years of teaching
experience and his area of interest include MANET.
Dr.RM.Chandraekaran is working as a
Professor at the Department of Computer
Science and Engineering, Annamalai
University, Annamalai Nagar, Tamil Nadu,
India. From 1999 to 2001 he worked as a
software consultant in Etiam, Inc,
California, USA. He has conducted Workshops and
Conferences in the Areas of Multimedia, Business
Intelligence and Analysis of algorithms, Data Mining. He
has presented and published more than 32 papers in
conferences and journals and is the author of the book
Numerical Methods with C++ Program (PHI, 2005). His
Research interests include Data Mining, Algorithms and
Mobile computing. He is Life member of the Computer
Society of India, Indian Society for Technical Education,
Institute of Engineers, Indian Science Congress Association.
Mrs.Uma M received the B.Tech degree
in Computer Science and Engineering
from VIT University, Vellore in 2003 and
received the M.E degree in Computer
Science and Engineering from Pavendar
Bharathidasan College of Engineering and
Technology, Tiruchirappalli in 2006. She is currently doing
her Ph.d in the area of MANET and also working as an
Assistant Professor in Pavendar Bharathidasan College of
Engineering and Technology, Tiruchirappalli with 8 years of
teaching experience and her area of interest include
MANET.