Abstract A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries. Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner (since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc networks. Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
Mobile Ad hoc Network is basically a crew of mobile traffic nodes, which figure an effectual dynamic topology and built a resource mannered network. Mobile Ad hoc Networks are exceptional cases of ad hoc networks that, but it is lacking infrastructure, communicating entities pass with various accelerations. For that reason, this impedes or delay lays the foundation of well built end-to-end communication paths. So Mobile Ad-hoc Network having efficient data transfer. In this manner, MANETs have out of the common network concerns and security challenges to get the advanced connectivity, immune communications, and reputation executives systems which have an impact on the trust in cooperation and settlement between mobile networking units. In this survey paper we confer about the security attributes, attacks, and challenges of MANETs.So, it is important to have a better and good formation algorithm to connect all the nodes to each other. There must be less time, low delay time, more battery life, more speeds of packets.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
The mobile ad hoc networks get subjected to security threats like other wireless networks. But due to their
peer to peer approach and absence of infrastructural resources the mobile ad hoc networks can not use
strong cryptographic mechanisms as used by their other wireless counterparts. This led to the
development of trust based methods as security solutions wherein a trusted node is relaxed from security
checks when the trust value reaches to a particular limit. The trust methods are prone to security risks but
have found their acceptance due to efficiency over computationally expensive and time consuming
cryptographic methods. The major problem with the trust methods is the period during which trust is
growing and is yet to reach the requisite threshold. This paper proposes security mechanism dependent
upon Random Electronic Code Book (RECB) combined with permutation functions. The proposed
mechanism has low time complexity, is easier to implement, computationally inexpensive and has very
high brute force search value. It can be used as the temporary security guard during the trust growth
phase. The impetus behind the proposed design is the reliance upon shared information between the peers
in the ad hoc networks.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
Mobile Ad hoc Network is basically a crew of mobile traffic nodes, which figure an effectual dynamic topology and built a resource mannered network. Mobile Ad hoc Networks are exceptional cases of ad hoc networks that, but it is lacking infrastructure, communicating entities pass with various accelerations. For that reason, this impedes or delay lays the foundation of well built end-to-end communication paths. So Mobile Ad-hoc Network having efficient data transfer. In this manner, MANETs have out of the common network concerns and security challenges to get the advanced connectivity, immune communications, and reputation executives systems which have an impact on the trust in cooperation and settlement between mobile networking units. In this survey paper we confer about the security attributes, attacks, and challenges of MANETs.So, it is important to have a better and good formation algorithm to connect all the nodes to each other. There must be less time, low delay time, more battery life, more speeds of packets.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
The mobile ad hoc networks get subjected to security threats like other wireless networks. But due to their
peer to peer approach and absence of infrastructural resources the mobile ad hoc networks can not use
strong cryptographic mechanisms as used by their other wireless counterparts. This led to the
development of trust based methods as security solutions wherein a trusted node is relaxed from security
checks when the trust value reaches to a particular limit. The trust methods are prone to security risks but
have found their acceptance due to efficiency over computationally expensive and time consuming
cryptographic methods. The major problem with the trust methods is the period during which trust is
growing and is yet to reach the requisite threshold. This paper proposes security mechanism dependent
upon Random Electronic Code Book (RECB) combined with permutation functions. The proposed
mechanism has low time complexity, is easier to implement, computationally inexpensive and has very
high brute force search value. It can be used as the temporary security guard during the trust growth
phase. The impetus behind the proposed design is the reliance upon shared information between the peers
in the ad hoc networks.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This paper introduces the Structural health monitoring (SHM) using Mobile Access Coordinated Wireless Sensor Network (MA-WSN) energy - efficient scheme for time sensitive applications. In Sensor Networks with Mobile Access points (SENMA), the mobile access points (MAs) traverse the network to collect information directly from each sensor. To organize disjoint nodes forming into small groups in high energy level, sensors are used in clustering methods, where each cluster has a coordinator referred as Cluster Head (CH). Early detection of failure CHs will reduce the data loss and provide possible minimal recovery efforts. Failure CHs are unable to connect to automatically organized another cluster head of access node and this access node collect and transfer data directly. So a new technique has been proposed in this paper which improves the life time of sensor nodes or it minimizes the maximum energy used by the sensor for transmitting data to the base station and also ensures monitoring quality. The performance of the proposed placement method has been tested by NS2 simulations and the result is compared with the sensor placement using effective independence method. This method obtains almost the same placement quality as that provided by using effective independence method, but with improvement in system life time.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
Abstract In multihop cellular networks mobile nodes typically transmit packets during intermediate mobile nodes for enhancing recital. Stingy nodes typically don't collaborate that incorporates a negative result on the network fairness and recital. A fair, inexpensive and best incentive mechanism by Selfish Node Detection (FESCIMbySND) has been projected to stimulate the mobile node’s cooperation. Hashing operations area unit employed in order to extend the safety. Trivial Hash perform has been wont to improve end-to-end delay and outturn. Additionally Cyclic Redundancy Check Mechanism has been used to spot the ridiculous nodes that involve themselves in sessions with the intention of dropping the in sequence packets. Moreover, to cut back the impact at the Accounting Center a Border node has been commend the task of propose the checks employing a digital signature. Keywords: Border Node Mechanism, Cyclic Redundancy Check, Selfish nodes, Trivial Hash Function
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Planning Of Procurement o different goods and services
Energy efficient ccrvc scheme for secure communications in mobile ad hoc networks
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 143
ENERGY EFFICIENT CCRVC SCHEME FOR SECURE
COMMUNICATIONS IN MOBILE AD HOC NETWORKS
T Jagadeepak1
, B Prabhakara Rao2
, B A S Roopa Devi3
1
PG Student, Dept. of ECE, University College of Engineering, JNTUK, Andhra Pradesh, India
2
Professor, Dept. of ECE, University College of Engineering, JNTUK, Andhra Pradesh, India
3
Associate Professor, Dept. of CSE, Pragati Engineering College, Andhra Pradesh, India
Abstract
A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time
without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to
various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this
paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude
them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from
outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well
as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be
utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries.
Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner
(since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme
EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc
networks.
Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Mobile ad hoc networks (MANETs) have received a
drastically increasing interest over the past few years, owing
to their innumerous features which are applicable in myriad
applications such as automated battle fields, quick disaster
recovery, military communications and other commercial
and civilian environmental applications.
A MANET is a network which consists of a set of mobile
nodes that communicate over a shared wireless medium
without the necessity of any predefined infrastructure or any
centralized administration. Every node in the network is
equipped with a wireless transmitter and receiver with the
aid of which every node communicate with each other in
their wireless transmission range. Hence every node must be
capable enough in forming a tactical network and maintain it
inorder to carryon communication with other nodes. Each
node must act as a host as well as a router. To be more
elaborative, every node in an MANET must be equipped
with all aspects of networking functionalities, such as
routing and relaying packets in addition to playing the role
of end users. Inorder to communicate with other nodes
which are not present with in the vicinity of their
transmission range, they rely upon their neighbors to
communicate through multi-hop networking following a set
of rules predefined by the routing protocols. There are
innumerous protocols which are mainly of reactive or
proactive type. Hence selection of a routing protocol is also
important inorder to carry out an efficient communication.
Due to these dynamic characteristics with arbitrary topology
changes, lack of any centralized administration and limited
capabilities of mobile nodes, there are a lot of challenges
which are yet to be addressed in MANETs as discussed in
[5]. Security is one of the crucial requirements for a
network. Due to the open networking type of environment
and independent mobility nature, any node including
intruders can freely join and leave the network at any
moment. Intruders can directly threaten the robustness of the
network and hence necessary preventive steps should be
taken to eradicate the attacks caused by such intruders.
Various security attacks to which MANETs are vulnerable
are primarily classified into active and passive security
attacks which are launched by both internal and external
attackers. Different types of security attacks and their
counter-measures are survived in [3], [14].
Implementing security to protect MANETs is therefore
considered as a prime concern and a challenging issue.
However, the ultimate goal of any security solution is to
provide security services such as authenticity,
confidentiality, integrity, non-repudiation and availability to
mobile users [19]. Inorder to achieve these goals, the
security solution should provide complete protection
spanning the entire protocol stack.
Although a large number of techniques to provide security
against various kinds of attacks have been developed for
MANETs, most of them are not effective since only
detecting and blocking attackers is not enough in the
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 144
network to maintain network security. This is because due to
the open networking type of environment, these blocked
attackers may freely move to other locations and repeatedly
launch attacks against other nodes. Hence inorder to reduce
the damage from the attackers, they must be isolated from
the network after detection of the first attack from them.
This can be achieved by opting certification systems. In
networks employing a certification systems, nodes can only
communicate with each other who possesses a valid
certificate i.e., an attacker whose certificate is revoked due
to malicious activities in the network cannot exist in the
network [13].
Certificate management is the widely used mechanism
which serves as a means of conveying trust in public key
infrastructure to secure applications and network services
[2], [7]. A complete security solution for certificate
management should encompass these three components –
prevention, detection and revocation. In the methods
employing certificate management, certificate is a
prerequisite for every mobile node. A trusted third party
takes care of the certificate distribution and their revocation.
As the first step, intruders must be prevented from obtaining
certificates. If at all any intruders acquires a certificate by
any means and launches attacks to disrupt the network
performance, they should be detected as quickly as possible
and their certificates should be revoked. Among these three
components, certificate revocation is an important task of
enlisting and removing the certificates of the nodes who
have detected to launch attacks on their neighborhood nodes
[17].
However these nodes operate with low or limited power
capability, computational capacity, bandwidth etc by
default. So inorder to achieve a secure and reliable
communication between nodes, these resource constraints
make the task more enduring [3]. So an effective utilization
of mobile nodes energy levels must also be done inorder to
enhance the performance of the network more efficiently on
the basis of security. The remaining of the paper is
organized as follows. Section 2 deals with the related work
followed by Section 3 which states the problem in the
existing scheme along with the new proposed technique.
Section 4 briefly explains about the EECCRVC scheme.
Section 5 deals with the performance analysis of the
proposed scheme. Section 6 finally concludes the paper.
2. RELATED WORK
So far, several different types of certificate revocation
techniques are developed for MANETs. Among these,
simple approach is proposed in [1] in which a digital
certificate valid for a certain time period is assigned to each
node by the Certification Authority (CA). Based upon the
accusations of any other node with valid certificate,
intruders are kept hold in Certificate Revocation List (CRL).
This updated CRL is broadcasted throughout the network by
CA. However, this mechanism does not deal with false
accusations.
In URSA [4], certificates are distributed between nodes by
their neighbors and also exchange information that they
know about others. In this technique, the certificate of the
suspicious node is revoked if at all it exceeds a certain
threshold. This method does not deal with false accusations
and no CA is necessary but the operational cost is still high.
DICTATE [6] in contrast to URSA, employs a number of
CAs to efficiently perform the distribution and revocation of
certificates. Here, these set of CAs takes care of the entire
network security and the updated information is distributed
among all CAs. However, deployment of such a large
number of CAs is not an easy task in MANETs.
With the scheme proposed by G. Arboit [10], all the nodes
are allowed to vote against others in the network to collect
accusations against suspicious nodes. But as with URSA,
there is no CA in the network and instead each node
monitors the behavior of its neighbors. But the voting based
mechanism is based on variable weights in this case. The
higher the reliability of the node, the greater its weight will
be in the network. The certificate of the suspicious node is
revoked when the sum of all the weighted votes reaches a
certain threshold. However, it does not deal with false
accusations and is quite slow.
J. Clulow [8] proposed a suicide for the common good
strategy, where certificate revocation can be completed
quickly by one accusation. However, certificates of both the
accused and accusing nodes are revoked simultaneously.
This method is not quite good enough with the increase in
the number of attackers in the network as the number of
legitimate nodes available in the network gets decreased
with the increase in attacker nodes.
In Cluster based revocation schemes [13], [15] clusters are
formed with the self-organizing capability of nodes in which
a CA is responsible in listing both the accused and accusing
nodes in BL and WL respectively. This information is
broadcasted throughout the network with which the nodes
listed in the BL are isolated from the network. They can also
deal with false accusations and can quickly revoke the
malicious nodes certificates.
All these above stated mechanisms can be broadly classified
into two types – voting based and non-voting based
mechanisms. In voting based mechanisms, attacker nodes
certificate is revoked through votes from valid neighboring
nodes. These mechanisms are highly accurate with more
reliability. However, decision process is slow and heavy
communication overhead is generated. Whereas, in case of
non-voting based mechanisms, an attacker node is accused
by only one neighbor with a valid certificate. Decision
process is simple and fast with lower overhead generated.
But these mechanisms are less accurate.
In [11], a dynamic energy efficient clustering algorithm has
been proposed which employs two dynamically computed
energy based thresholds, using which the load of the
network is balanced throughout the network distributing
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 145
among the adjacent CHs. It also re-triggers the CHs locally
to utilize their energies in a distributive manner. This
mechanism locally alters the clustered topology to increase
the network lifetime by reducing the energy consumption of
the suffering CHs.
3. PROPOSED METHODOLOGY
In this paper, Energy Efficient Cluster based Certificate
Revocation with Vindication Capability (EECCRVC)
scheme is proposed that provides secure communications
among the mobile nodes, utilizing their energy levels more
effectively.
The proposed scheme adopts the Cluster based Certificate
Revocation with Vindication Capability scheme (CCRVC)
as it outperforms other mechanisms in providing secure
communications by inheriting the merits of both voting and
non-voting based schemes, which isolates the attackers from
the network carefully and is also capable of addressing false
accusations. It can quickly revoke the attacker nodes
certificates and can operate with minimal generated
overhead because of the employed node clustering
architecture. In addition to that, it is much accurate and
more reliable. However, as clustering architecture is
incorporated in CCRVC scheme, Cluster Heads (CHs) play
a prominent role in the network along with CA, in
monitoring the nodes in the network. So, their energy levels
get degraded more rapidly than other nodes (since most of
the network operations are carried out through them). Since
all the nodes in the network are expected to operate for
longer time in the network, their energy levels should be
utilized effectively inorder to maintain network security
consistently. So inorder to accomplish this issue, a new
technique EECCRVC is implemented.
4. ENERGY EFFICIENT CLUSTER BASED
CERTIFICATE REVOCATION
In this section, the certificate revocation scheme which
relied upon [17] is discussed elaborately. As stated, this
scheme has the capability outperforming others in providing
security. In this mechanism, entire certificate maintenance
criteria i.e., certificate distribution and certificate revocation
is handled by a Certification Authority (CA). However, this
scheme addresses the issue of revoking attacker nodes
certificates rather than certificate distribution itself,
assuming that every node in the network already has a
certificate received before joining the network. Inorder to
tackle with false accusations, it adopts the clustering
architecture in which CHs are responsible for recovering the
nodes against false accusations. Other fundamental
assumptions in this scheme are any node can be able to
detect the attacker nodes which are within one-hop distance
away. Rather than dealing with attack detection, this scheme
carries out the certificate revocation process once an
attacker node is identified.
4.1 Certification Authority
A trusted third party authority, Certification Authority (CA)
is deployed in the network. Its main task is to distribute
certificates to all the nodes joining in the network and
revoke those of any nodes which misbehave in the network
based upon the accusations received on the intruders
(attacker and malicious nodes) by others. Inorder to
accomplish this, CA maintains two lists namely Black list
(BL) and Warned list (WL). The nodes which are accused as
attackers are kept hold in BL and the corresponding
accusing nodes are listed in WL. The CA updates these two
lists based upon the control packets it receives from other
nodes in the network. However, no node is allowed to
accuse against its neighbors more than once. Once the CA
updates its lists, it broadcasts them to all the nodes in the
network using which the certificates of the nodes listed in
BL are revoked and isolated from the network or recovered
back against false accusations.
4.2 Clustering Architecture
The main aim of adopting clustering architecture is to detect
false accusations, enabling CHs within each cluster and to
reduce communication overhead generated by exchanging
the control packets providing security.
Mobile nodes cooperate and communicate with each other
arbitrarily inorder to form clusters which consist of a set of
Cluster Members (CMs) and a Cluster Head (CH) within
each cluster. If at all any CM in a cluster wants to
communicate with other nodes in the network, it forwards
those packets to its corresponding CH, which in turn
forwards them to the related CH in the network which
contains the destination node. So every CH maintains the
information of all CHs which are within 2-hops away. All
the CMs belonging to one cluster are within the transmission
range of the corresponding CH. This can be illustrated in the
figure 1. Here node F does not belong to the cluster headed
by node A even if it is present in the vicinity of A. This
indicates that any node within the transmission range of a
CH might not be the member of that cluster and can be the
CM of another cluster.
Fig - 1: Clustered MANET
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 146
However, inorder to incorporate this clustering technique in
MANETs, it makes use of two control packets – CHP (CH
Hello Packet) and CMP (CM Hello Packet) whose packet
format is described in section 4.5. Inorder to establish links
between the nodes in a cluster or to check the link
availability, nodes periodically broadcast these hello
packets. A new link is detected if a node receives a new
hello packet and then responds to it accordingly inorder to
establish the link between them. Any established link is
considered to be disconnected if it does not receive a hello
packet within a stipulated time interval.
In this scheme, if a node joins the network, it searches
whether there is any CH in its vicinity by broadcasting
CMP. If there is any CH, it responds to this CMP by sending
a CHP. Then that newly joined node will become a CM of
that corresponding CH once its request is accepted.
Otherwise, if it does not find any CH in its vicinity, it starts
broadcasting the CHP and becomes a CH. Any node coming
into its vicinity can select this node as its CH. Only the
normal nodes with high reliability are allowed to become a
CH and in this case, a normal node is allowed to declare
itself as a CH with a probability of R.
To maintain clusters, CH and CMs frequently confirm their
existence by exchanging hello messages in regular time
intervals i.e., the CH periodically broadcasts CHPs to the
CMs within its range and each CM replies to the CM with
CMP. Here in this case, this time interval is considered as
uT . If the nodes do not receive a CHP or CMP within a time
period uT2 , they are considered to be moved away from
their vicinity and their routing information is purged off
from their respective tables. Then that node should again
initiate the CH selection process to become a member in
another cluster or it can declare itself as a CH if it is
possessed to be a CH and starts broadcasting CHPs to form
a new cluster. On the other hand, if a CH has no CMs in its
cluster but has another CH in its vicinity, then it can declare
itself as CM and joins as a CM in that neighboring cluster.
4.3 Node Classification based on Reliability
Nodes are generally classified into three categories based
upon their behavior – legitimate nodes, malicious nodes and
attacker nodes. A legitimate node is the one which is
considered to perform secure communications in the
network. Every node which enters the network newly is
considered to be legitimate, since its behavior cannot be
assessed prior. An attacker node is one which launches
attacks in the network by any means inorder to disrupt the
secure communications. Whereas, a malicious node does not
launch attacks but performs some malicious activities in the
network supporting the attacker nodes. These types of nodes
are hard to identify.
However, in this scheme, those nodes are categorized into
the following three types based upon their reliability –
normal nodes, warned nodes and revoked nodes. When a
node joins the network it is considered as a legitimate node
which does not launch attacks. These nodes are considered
as normal nodes. These normal nodes accuse the attacker
nodes and revoke the certificates positively inorder to
guarantee network security. These nodes have the ability to
accuse other nodes and to declare itself as a CH or CM
without any restrictions. However, these normal nodes may
consist of both legitimate nodes and malicious nodes or
attacker nodes when they join the network. Warned nodes
are nodes which are listed in the WL. They are considered
as suspicious nodes with low reliability. Warned nodes
consist of a mixture of legitimate nodes which accuse the
attacker nodes correctly and also malicious nodes which
falsely accuse legitimate nodes. The warned nodes are
permitted to communicate with each other with some
restrictions. Warned nodes are not allowed to become CHs
inorder to avoid further damage in the network and they are
not allowed to accuse other nodes till they are vindicated
from the WL. Revoked nodes are the nodes which are listed
in the BL. These nodes are considered as the nodes with
little reliability. The certificates of these nodes are revoked
and hence they cannot participate in any of the network
activities, thus isolating them. The node classification is
shown in the figure 2.
Fig - 2: Node Classification
4.4 Two Types of Accusations
CCRVC make use of two control packets which are as
illustrated in the section 4.5 to deal with these accusations –
Accusation Packet (AP) inorder to revoke attacker nodes
certificates and Recovery Packets (RP) to cope with false
accusations.
4.4.1 Revoking Attacker Node Certificates
Once an attacker is identified, neighboring nodes checks
whether it is listed in BL or not. If it is not listed, then they
send an AP to the CA. Once the CA receives the first arrived
AP, the CA verifies the certificate of the accusing node and
places the accused node in the BL if it is valid. Meanwhile,
accusing node is kept hold in the WL which is vindicated
later if it is a legitimate node. Then the updated lists are
broadcasted throughput the network by the so that
certificates of the nodes listed in the BL are revoked.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 147
4.4.2 Against False Accusations
Malicious nodes may send false accusations against
legitimate node claiming that they are attacker’s inorder to
reduce the number of legitimate nodes in the network. This
degrades the accuracy and robustness of the networks.
Inorder to prevent this problem, clustering architecture is
utilized in which CHs play a prominent role in detecting
these false accusations. CHs carefully monitor all these
members and determine whether the member nodes are
accused correctly or not. If CH detects any false accusations,
then it sends a RP to the CA notifying about the false
accusation. Upon receiving the recovery packet from the
CH, the CA can remove the falsely accused node from the
BL to restore its legal identity. However, this recovered
node is kept held in WL from the BL along with the node
which send the RP. These nodes are vindicated based on
threshold based mechanism employed inorder to vindicate
nodes from the WL which is explained in latter section.
4.5 Control Packets
This scheme employs five kinds of control packets – CH
Hello Packet (CHP), CM Hello Packet (CMP), Accusation
Packet (AP), Recovery Packet (RP) and Broadcasting
Packet in addition to the routing protocol control messages
whose packet formats are shown in the figure 3.
The sizes of the prior four control packets are fixed in
contrast to certificate information broadcasting packet which
has 83 + 32{ n(BL) + n(WL) } bits where n(BL) is the
number of nodes in BL and n(WL) is the number of nodes in
WL. Although, increase in the number of malicious and
attacker nodes in the network slightly increase the amount of
control traffic, it is not significant because most of the traffic
consists of CHPs and CMPs of which their size and
transmission frequency are independent from the number of
suspicious nodes.
4.6 Node Vindication Mechanism from WL
Since mobile nodes are considered to be uniformly
distributed in the network, there should be enough legitimate
nodes in the network inorder to detect the presence of the
attackers i.e., atleast one legitimate node should be present
near an attacker inorder to accuse it inorder to preserve the
robustness of the security system. Since the number of
normal nodes that get listed in WL increases with the
increase in the malicious nodes in the network, the number
of normal nodes in the network gradually decreases over
time. Such a scenario affects the reliability of the scheme.
So, all the legitimate normal nodes that are getting listed in
WL must be vindicated accordingly so that enough normal
nodes are present in the network to accuse the intruder
nodes.
Since the nodes in the WL consists of both malicious nodes
and legitimate nodes as discussed, nodes listed in the WL
must be differentiated between them such that legitimate
nodes must be released from the WL while withholding the
malicious nodes inorder to improve the reliability and
accuracy of the scheme. Node releasing mechanism is
employed inorder to assess and vindicate those legitimate
nodes from the WL which is based upon a threshold value.
Fig - 3: Control Packets
In this mechanism, CA counts the number of accusations
against a given node over certain voting period, vT and then
compares this number of received accusations against the
threshold K. If the number of accusations against the nodes
listed in BL reaches that threshold value, then it is
considered as a real attacker and the corresponding accusing
node is released from the WL and this node can act as a
normal node without any restrictions. If the number of
accusations doesn’t reach the threshold value, they are kept
hold in the WL considering them as warned nodes.
So, determining the threshold is very important issue inorder
to distinguish malicious nodes from the legitimate nodes. In
general, the value of the threshold K is set slightly greater
than the number of malicious nodes in the network.
However, if the threshold is set too large, the time required
to determine whether a node is legitimate or not gradually
increases because it has to wait till the accusations reach that
determined threshold based upon which a node is assessed
as legitimate. Conversely if the threshold is set less than the
malicious nodes (or too small), malicious nodes in the WL
are released by other malicious nodes through collusion.
Inorder to avoid this uncertainty, CCRVC scheme
dynamically determines an optimum threshold value, K
based on the number of neighboring nodes for any given
node. A given node is considered to have N number of
neighbors which are obtained over the voting time period.
Number of neighboring nodes is determined by
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 148
vrvTrN 22
Where, r – range of the nodes, v – velocity of the nodes, ρ –
density of the network and vT - voting time period
Based upon the obtained number of neighboring nodes,
value of optimum threshold value, K is determined by
maximum accuracy policy γ(K),
N
ki
iNiiNi
pppp
i
N
K 11
Here, p is the ratio of total number of attackers and
malicious nodes to the total number of nodes in the network.
However, as stated in [17], γ(K) achieves the maximum
when K is equal to N/2, i.e., the system delivers maximum
accuracy when the optimum threshold value K is equal to
half the total number of neighboring nodes of a given node.
4.7 Energy Utilization
The scheme CCRVC provides the security based on
clustering architecture. Hence the batteries of the CHs get
drained more quickly compared to other nodes in the
network. So inorder to prevent them from losing energy than
other nodes, the proposed scheme EECCRVC alters the
CHs within each cluster by switching them on regular time
intervals locally such that an employed CH operates for
certain time interval. After that time interval, another CH is
elected in a cluster which is operated for that next time
interval. The time interval which we have considered for
switching between the CHs is iT . By employing this
technique, the energy levels of all the nodes are utilized
effectively in a distributed manner, instead of relying upon
some elected nodes. The proposed scheme keeps most of the
nodes alive in the network for longer time which can
enhance the performance of CCRVC scheme as more
number of nodes exist in the network for longer durations.
5. PERFORMANCE EVALUATION
The performance of this scheme is evaluated in the network
simulator NS-2 [16]. Various scenarios are developed and
simulated inorder to verify the efficiency of the scheme in
terms of accuracy and reliability. Certification revocation of
attacker nodes, vindication of the legitimate nodes from WL
and withholding of the malicious nodes in the WL are
carefully examined along with the comparisons of the
average energy levels of the nodes in the network in both
CCRVC and the proposed scheme. Results demonstrate that
the proposed scheme shows better results in terms of nodes
average energy along with providing secure communication
between nodes.
5.1 Simulation Setup
A Scenario is generated in NS-2 which consists of mobile
nodes within a terrain region of 1.5 km
2
. The mobility
model employed here is Random Way Point (RWP)
mobility model which indicates that the nodes communicate
with each other by moving randomly in the restricted terrain
region. AODV (Ad hoc On-demand Distance Vector)
routing protocol is employed which has the capability of
delivering a better performance as the node mobility and
node density increases in the network [18]. All the nodes in
the network are placed uniformly at random locations in the
network with the probability of becoming CH, R as 0.3.
Table-1 specifies the simulation parameters setup to carry
out the simulation.
Table -1: Simulation Parameters
Parameter Value
Terrain Region 1500m x 1500 m
Routing Protocol AODV
Mobility model Random Way Point
Node Placement Uniform Distribution
Simulation Time 200 sec
No. of nodes 100
uT 5 sec
vT 5 sec
iT 10 sec
5.2 Simulation Results
The effectiveness of any certificate revocation scheme is
identified by evaluating how revocation of the identified
attacker nodes certificates is done accurately. Hence inorder
to determine this, we deployed 100 nodes in the network and
evaluated the number of revoked nodes (i.e., nodes enlisted
in the black list), by taking 2 malicious nodes in the network
to incorporate false accusations while varying attacker
node’s number. Here attacker nodes are changed from 0-14
in steps of 2 nodes for each simulation and the number of
revoked nodes is determined.
Fig - 4: Revoked nodes in the network
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 149
Fig – 4 shows that the simulation results are nearly equal to
the analytical results and almost all the attacker nodes are
placed in the black list. This decreases the impact of
attacker’s in the network because once they are listed in the
black list, their certificates are permanently revoked making
the network more secure.
However, as the impact of the malicious nodes should also
be reduced, based on the employed threshold based
mechanism, malicious nodes are to be placed in the warned
list (warned nodes) promptly while reducing the legitimate
nodes in this scheme. To determine this, the number of
malicious nodes in the network is varied from 0-14 in steps
of 2 nodes in the presence of 2 attackers in every case (i.e.,
around 15 percent of the intruders are included in the
network at extreme cases) and the total number of nodes is
set to 100 nodes. Observation is done how the nodes in the
warned list change with respect to the varied malicious
node’s number in the network. Simulation results in this
case are shown in fig – 5 which is compared with analytical
results of the number of revoked nodes. Results clearly
demonstrate that the curve of the simulation results closely
follow the analytical result curve with slight variation.
Fig - 5: Warned nodes in the network
Observation results indicated that almost all the malicious
nodes in the network are listed in warned list, losing their
capability of accusing other nodes. In addition to this,
legitimate nodes must be properly vindicated from the
warned list which positively accuses these intruders. Most of
the legitimate nodes which accused these attackers are
carefully vindicated from the warned list based on the
threshold based mechanism.
Fig – 6 shows the case when the intruders in the network
gets varied from 0 – 20 nodes in steps of 4 nodes with 100
nodes in the network. Evaluated results clearly demonstrate
that almost all the intruders are kept held in their respective
lists and circulated throughout the network whose behavior
is strictly restricted inside the network. However, as the
number of intruders increased in the network, legitimate
nodes which got struck in BL or WL decreased gradually,
thus increasing the reliability of the scheme.
Fig - 6: Listed restricted nodes
However, inorder to determine the energy utilization, we
considered 10 percent intruders (5 percent attacker nodes
with 5 percent malicious nodes) in the network and
determined the average energy of the nodes after simulating
the scenario for 200 seconds.
Fig - 7: Average Energy of the nodes
As shown in fig – 7, the average energy utilized by both the
schemes differs by around 7 percent, which shows the
effectiveness of EECCRVC scheme over CCRVC scheme.
This shows how the proposed scheme utilizes the energy
levels of the nodes in the network making more number of
nodes alive in the network for longer durations. By doing so,
more number of legitimate nodes are available in the
network which are used to send accusations against other
nodes. Though the number of intruder nodes are more in
number than the legitimate nodes in the network, this
scheme can successfully enlist the intruder nodes as atleast
few legitimate nodes are always present in the network
because of their vindication on time to time basis providing
secure communications.
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 150
6. CONCLUSION
In this paper, the proposed EECCRVC scheme effectively
utilizes the energy levels of the nodes in addition to
providing secure communications using CCRVC scheme.
Particularly, this scheme quickly revokes the attacker nodes
certificates promptly with less generated overhead compared
with other techniques. And also it is more accurate in
determining the revoked nodes and warned nodes with high
reliability based on the employed threshold based
mechanism and vindication capability. In addition to
providing security, it makes use of the nodes energy levels
in an effective manner so that most of the nodes can operate
for longer durations in the network which helps in the
presence of more legitimate nodes in the network. So, the
proposed EECCRVC scheme is more efficient in revoking
attacker nodes certificates, holding malicious nodes
accurately restricting their behavior in the network and
utilizes nodes energies in an effective manner providing
secure communications in the network.
REFERENCES
[1]. S. Micali, “Efficient Certificate Revocation”,
Massachusetti inst. of technology, Cambridge, MA, 1996.
[2]. L. Zhou and Z. J. Haas, “Securing Ad hoc Networks”,
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov-
Dec 1999.
[3]. H.Yang, H.Luo, F. Ye, S. Lu and L. Zhang, “Security in
Mobile Ad hoc Networks: Challenges and Solutions”, IEEE
Wireless Comm., vol. 11, no. 1, pp. 38-47. Feb 2004.
[4]. H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang,
“URSA: Ubiquitous and Robust Access Control for Mobile
Ad hoc Networks”, IEEE Transactions on Networking, Vol.
12, no. 6, pp. 1049-1063, Oct 2004.
[5]. George Aggelou, Mobile Ad hoc Networks, Mc Graw –
Hill, 2004.
[6]. J. Luo, J. P. Hubaux and P. T. Eugster, “DICTATE:
Distributed Certification Authority with probabilistic
freshness for ad hoc networks”, IEEE Transactions on
Dependable and Secure Computing, vol. 2, no. 4, pp. 311-
323, Oct-Dec 2005.
[7]. A. M. Hegland, E. Winjum, C. Rong and P. Spilling, “A
Survey of Key Management in ad hoc networks”, IEEE
comm. Surveys and tutorials, vol. 8, no. 3, pp. 48-66, Third
quarter, 2006.
[8]. J. Clulow and T. Moore, “Suicide for the common good:
A new strategy for credential revocation in self-organizing
systems”, ACMSIGOPS Operating System Reviews, vol.
40, no. 3, pp. 18-21, Jul 2006.
[9]. B. Kannhavong, H. Nakayama, A. Jamalipour, Y.
Nemato and N. Kato, “A survey of Routing attacks in
MANETs”, IEEE wireless comm. Magazine, vol. 14, no. 5,
pp. 85-91, Oct 2007.
[10]. G. Arboit, C. Crepeau, C. R. Davis and M.
Maheswaran, “A Localized Certificate Revocation scheme
for Mobile Ad hoc Networks”, ad hoc networks, Vol. 6, no.
1, pp. 17-31, Jan 2008.
[11]. H. Safa, O. Mirza, H. Artail, “A Dynamic Energy
Efficient Clustering algorithm for MANETs”, IEEE Int’l
conf, on wireless and mobile computing, WIMOB’08, Oct
2008.
[12]. Ratish Agarwal, Mahesh Motwani, “Survey of
clustering algorithms for MANET”, IJCSE, vol. 1, pp. 98-
104, 2009.
[13]. Kyul Park, Hiroki Nishiyama, Nirwan Ansari, Nei
Kato, “Certificate Revocation to cope with false accusations
in mobile ad hoc networks”, Proc. IEEE, 71st
Vehiculer
Technology Conf. (VTC’10), May 2010.
[14]. Sudhir Agarwal, Sanjeev Jain, Sanjeev Sharma, “A
Survey of Routing attacks and Security measures in mobile
ad hoc networks”, Journal of Computing, vol. 3, issue 1, Jan
2011.
[15]. W. Liu, H. Nishiyama, N. Ansari and N.Kato, “A
Study on Certificate Revocation in Mobile Ad hoc
Networks”, Proc. IEEE Int’l conf. on communications
(ICC), Jun 2011.
[16]. The ns manual (ns notes and documentation), 2011.
[17]. Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang
and Nei Kato, “Cluster based Certificate Revocation with
Vindication Capability for Mobile Ad hoc Networks”, IEEE
Transactions on Parallel and Distributed Systems, Vol. 24,
no. 2, Feb 2013.
[18]. T. Jagadeepak, B. Prabhakara Rao and B. A. S. Roopa
Devi, “Investigating the performance of routing protocols
using quantitative metrics in mobile ad hoc networks”,
IJAREEIE, vol. 3, issue 7, Jul 2014.
[19]. Karthik Sadasivam, T. Andrew Yang, “Evaluation of
Certificate-Based Authentication in Mobile Ad hoc
Networks”, University of Houston-Clearlake, Houston, TX,
USA.
BIOGRAPHIES
T Jagadeepak has completed his B.E. in
Electronics and Communication
Engineering from S R K R Engineering
college, affiliated to Andhra University,
A.P., India in the year 2012. He is
currently pursuing his Master’s Degree
program in Computers and
Communications Engineering in J.N.T.
University, Kakinada, A.P., India.
Dr B Prabhakara Rao obtained B.Tech.,
& M.Tech from S.V. University,
Tirupathi with specializations in
Electronics and Communications
Engineering, Electronic Instrumentation
and Communications Systems in the
years 1979 and 1981 respectively. He
received the Doctoral degree from Indian Institute of
Science, Bangalore in the area of Sonar Signal processing in
the year 1995. Currently, he is the senior professor in
Electronics and Communication Engineering in J.N.T.
University, Kakinada, A.P., India.
B A S Roopa Devi, has completed her
B.Tech in Computer Science &
Engineering, J.N.T. University Hyderabad,
A.P. India in the year 2004, M.Tech in
Software Engineering, J.N.T. University
Hyderabad, A.P. India in the year 2006.
She is currently working as an Associate professor in CSE
Dept., Pragati engineering college, affiliated to J.N.T
University, Kakinada , A.P., India.