Abstract: Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic These attacks are very effective based on high throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput, it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism means combines Measurement-based detection and accusation-based reaction techniques.The attacks and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting. Keywords— Wireless mesh network,high throughput metrics, secure multicast routing,metric manipulation attacks, Byzantine attacks
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
One main challenge in the design of routing protocols is their vulnerability to security attacks. This is mainly due to the wireless and dynamic nature of ad hoc networks. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept thereby exploiting the proper functioning of the protocol. In this paper the performance of multicast on demand routing protocols such as Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol and On Demand Multicast Routing Protocol (ODMRP) are evaluated and analyzed under black hole attack under different scenarios in terms of the performance metrics such as packet delivery ratio and end to end delay. The evaluation is done with network simulator NS-2. Simulation results indicate that both the protocols suffer a significant reduction in packet delivery ratio in the presence of black hole attackers but the impact is more in ODMRP when compared to MAODV.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication
between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes
for DTNs exploit the advantage of message replication to achieve high message delivery rate. However,
these schemes commonly suffer from large communication overhead due to the lack of efficient mechanisms
to control message replication. In this paper we give a brief survey on routing protocols designed for
DTNs, and evaluate the performance of several representative routing protocols including Epidemic, Spray
and Wait, PRoPHET, and 3R through extensive trace-driven simulations. Another objective of this work is
to evaluate the security strength of different routing schemes under common DTN attacks such as the black
hole attack. The results and analysis presented in this paper can provide useful guidance on the design and
selection of routing protocols for given delay-tolerant applications.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeIOSR Journals
The research work is carried out on the study of tribological property of aluminium based metal matrix composite material, which is fabricated by using sol-gel technique. The composite material is prepared through liquid metallurgy method by using varying percentage of Alumina and aluminium and fixed percentage of copper 4.2%. Test sample billet is fabricated through casting method and has been examined the different mechanical behaviour such as Vickers Hardness Number, Ultimate Tensile Strength, 0.2% Proof Stress, etc.
From the study, it has been observed that with increase in the alumina content in matrix the ductility of composite show a contrary effect. The Pin-On-Disc test is used to evaluate the tribological property wear for composite material and it is observered that tendency of wear rate has improved. The weight losses of the specimen are measured and wear and friction characteristics are calculated with respect to time. Depth of wear track, sliding speed, bearing load friction coefficient and wear volume have been shown large sensitivity to the applied normal load and the testing time (or sliding distance). The XRD and SEM analysis are used to analyse the wear debris and track; and silent conclusion has been drawn
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
One main challenge in the design of routing protocols is their vulnerability to security attacks. This is mainly due to the wireless and dynamic nature of ad hoc networks. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept thereby exploiting the proper functioning of the protocol. In this paper the performance of multicast on demand routing protocols such as Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol and On Demand Multicast Routing Protocol (ODMRP) are evaluated and analyzed under black hole attack under different scenarios in terms of the performance metrics such as packet delivery ratio and end to end delay. The evaluation is done with network simulator NS-2. Simulation results indicate that both the protocols suffer a significant reduction in packet delivery ratio in the presence of black hole attackers but the impact is more in ODMRP when compared to MAODV.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication
between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes
for DTNs exploit the advantage of message replication to achieve high message delivery rate. However,
these schemes commonly suffer from large communication overhead due to the lack of efficient mechanisms
to control message replication. In this paper we give a brief survey on routing protocols designed for
DTNs, and evaluate the performance of several representative routing protocols including Epidemic, Spray
and Wait, PRoPHET, and 3R through extensive trace-driven simulations. Another objective of this work is
to evaluate the security strength of different routing schemes under common DTN attacks such as the black
hole attack. The results and analysis presented in this paper can provide useful guidance on the design and
selection of routing protocols for given delay-tolerant applications.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Study of the Tribological behavior of as cast Al-4.2%Cu-Al2O3 compositeIOSR Journals
The research work is carried out on the study of tribological property of aluminium based metal matrix composite material, which is fabricated by using sol-gel technique. The composite material is prepared through liquid metallurgy method by using varying percentage of Alumina and aluminium and fixed percentage of copper 4.2%. Test sample billet is fabricated through casting method and has been examined the different mechanical behaviour such as Vickers Hardness Number, Ultimate Tensile Strength, 0.2% Proof Stress, etc.
From the study, it has been observed that with increase in the alumina content in matrix the ductility of composite show a contrary effect. The Pin-On-Disc test is used to evaluate the tribological property wear for composite material and it is observered that tendency of wear rate has improved. The weight losses of the specimen are measured and wear and friction characteristics are calculated with respect to time. Depth of wear track, sliding speed, bearing load friction coefficient and wear volume have been shown large sensitivity to the applied normal load and the testing time (or sliding distance). The XRD and SEM analysis are used to analyse the wear debris and track; and silent conclusion has been drawn
Characteristics analysis of silicon carbide based 1-D Photonic crystal with 2...IOSR Journals
Silicon carbide based 1-D Photonic crystals with 2 layered unit cell are analyzed in this paper. The
transmission characteristics of photonic crystals are computed by transfer matrix method and performance of
such photonic crystals of different material combinations are also compared, and after comparison some one
able to know the characteristics such as pass band width, stop band width, centre band gap of a light wave of a
particular wave length traveling through this 2 layered unit cell photonic crystal in nano meter range where one
layer of this unit cell must be made of semiconductor material named silicon carbide (SiC).
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...IOSR Journals
Abstract: Every community produces both liquid and solid wastes and air emissions. The liquid wastewastewater-is
essentially the water supply of the community after it has been used in a variety of applications.
From the standpoint of sources of generation, wastewater may be defined as a combination of the liquid or
water-carried wastes removed from residences, institutions, commercial and industrial establishments, together
with such groundwater, surfacewater and stromwater as may be present. This waste water through sewer comes
to the sewage treatment plant so that parameters are reduced and treated wastewater be disposed into water or
land. For treating the sewage UASB( UP FLOW ANAEROBIC SLUDGE BLANKET) and SBR(SEQUENCING
BATCH REACTOR) technologies are mostly used.
All the parameters of these samples were analyzed using standard methods prescribed in “Standard methods for
examination of water and wastewater”. It was observed that pH & temperature values at outlet by both the
processes are almost same. Reading were taking on two consecutive days and value of Biochemical Oxygen
Demand by UASB process was 32, 32mg/l and by SBR process was 11, 16mg/l. Chemical oxygen Demand by
UASB process was 112, 96mg/l and by SBR process was 32, 34mg/l. Total Suspended Solids by UASB process
was 58, 44mg/l and by SBR process was 10, 12mg/l. Both the processes were used for treating the wastewater
and the SBR process showed better results as comparative to UASB.
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...IOSR Journals
Main objective of this paper is to optimize Bending stress at critical section, which is most important
parameter in gear design. It must be low as low possible. Bending Stress optimize by all affected Parameters of
asymmetric spur gear tooth at critical section of tooth. Objective function for bending stress at critical section
has been developed to minimize/optimize bending stress at critical section thickness of asymmetric spur gear
tooth. A programme has been developed in SciLab software with help of developed objective function to
optimize the bending stress at critical section of an asymmetric spur gear. Result obtains from SciLab
programme compared to ANSYS software and give comment on validation of developed objective function
Effect of yogic practices on Static & Dynamic flexibility of College StudentIOSR Journals
Abstract: To see the effect of six weeks yogic exercise in college students 38 BPE 1st year students of IDCPE
Ishwar Deshmukh Collge of Physical Education Nagpur were selected as a subject. The pre-test and post test
had been taken by using Dynamic flexibility test, side split flexibility test and shoulder and wrist elevation
flexibility test tools. To determine the difference between the 2 groups (initial and post test) of one group
experimental group of the BPE 1st year student t test was employed at 0.05 significance level. And to determine
the training effect the t test for comparison mean was employed for two tails at the confidence level 0.05 level of
significant.
The comparative between the initial and post test of dynamic flexibility test, side split flexibility test and
shoulder and wrist elevation flexibility test for the state level football players were found to be statistically no
significant at .05 confidence level.
Key wards: Dynamic flexibility, Side sliding flexibility, shoulder and wrist elevation, BPE, IDCPE,
comparative t test.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
Enhance the Throughput of Wireless Network Using Multicast Routing
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 5, Issue 5 (Mar. - Apr. 2013), PP 77-83
www.iosrjournals.org
www.iosrjournals.org 77 | Page
Enhance the Throughput of Wireless Network Using Multicast
Routing
Ramya1
, Vadivel2
1
PG Scholar,2
Lecturer
M.Kumarasamy College of Engineering ,Karur Tamilnadu, India
Abstract: Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting.
Keywords— Wireless mesh network,high throughput metrics, secure multicast routing,metric manipulation
attacks, Byzantine attacks
I. INTRODUCTION
Wireless mesh network that offers low cost high bandwidth community wireless services.WMN
consists of a set of stationary wireless router that form a multihop backbone and a set of mobile clients that
communicate via the wireless backbone. Multicast routing protocols deliver data from a source to
multiple destinations organized in a multicast group.Previous work primarily focused on maximizing
throughput by selecting path based on metric that capture the quality of wireless links. ODMRP it is a mesh
based protocol potential to be more attack resilient,Identify class of severe attacks in multicast protocols that
exploit the use of high throughput. metrics, including local metric manipulation and global metric manipulation
In a typical high-throughput multicast protocol, nodes periodically send probes to their neighbors to
measure the quality of their adjacent links. The path select the best metric. This assumption is difficult to
guarantee in wireless networks that are vulnerable to attacks coming from both insiders and outsiders,if the
attacks coming from insider node means its very effective. An aggressive path selection introduces new
vulnerabilities and provides the attacker with an increased arsenal of attacks leading to unexpected
consequencesAn aggressive path selection introduces new vulnerabilities and provides the attacker with an
increased arsenal of attacks leading to unexpected consequences. For example, adversaries may manipulate the
metrics in order to be selected on more paths and to draw more traffic, creating opportunities for attacks such as
data dropping, mesh partitioning, or traffic analysis
II. RELATED WORK.
Attacks on routing protocols can target either the route establishment process or the data delivery
process, or both. Ariadne [15] and SRP [6] propose to secure on-demand source routing protocols by using hop-
by-hop Authentication techniques to prevent malicious packet manipulations on the route discovery process
ODSBR provides resilience to colluding Byzantine attacks by detecting malicious links based on an end-to-end
acknowledgment-based feedback technique.
secure unicast or multicast routing considers routing protocols that use only basic routing metrics,
such as hop count and latency. None of them consider routing protocols that incorporate high-throughput
metrics, which have been shown to be critical for achieving high performance in wireless networks symmetric
links, correct trust evaluation on nodes, ability to correctly determine link metrics despite of attacks. In addition,
none of them consider attacks on the data delivery phase high performance and security as goals in multicast
routing and considers attacks on both path establishment and data delivery phases .
Besides attacks on the routing layer, wireless networks are also subject to wireless-specific attacks,
such as flood rushing and wormhole attacks Techniques to defend against wormhole attacks include Packet
Leashes which restricts the maximum transmission distance by using time or location information, Truelink
2. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 78 | Page
which uses MAC level acknowledgments to infer if a link exists or not between two nodes, and the work in ,
which relies on directional antennas
III. PROPOSED METHODOLOGY
Retransmission diversity is mainly used. This is eliminate the malicious node from our multicast
routing. There will be chance to packet loss will occur before the detection. Intermediate node make use of
special buffer and store sensitive data. If packet loss will occur means the intermediate node successfully
receives the lost packets and retransmitted, i.e which should act as a relay node. We investigate and motivate
the need for a simple form of node cooperation, also popularly referred to as retransmit diversity.
In mesh networks, one has control over the deployment of atleast some nodes in the network, which can
serve as relay points for traffic for other nodes. Such nodes are limited in number for easier network
management and can be assumed to be stationary. Hence, it is possible to conceive such “special” nodes to be
vested with smart antennas capabilities to improve the overall network performance. Other applications would
include digital battlefields envisioned by DARPA, zeroconfiguration community networks, etc.
In simple form of retransmit diversity may not necessarily provide performance improvement in
homogeneous omni-directional networks if the relay does not have a better link gain to the destination than the
source, and if the fading is fast and independent from one packet to another.
This has motivated researchers to consider more sophisticated forms of cooperation diversity such as
distributed space-time codes, virtual MIMO, etc. in omni-directional networks. Such sophisticated approaches
deliver good diversity gains at the cost of requiring synchronization, distributed code design, rate and/or power
control amongst the cooperating nodes, which prevents their distributed implementation from being light
weight. While such sophisticated approaches are warranted in omni-antenna networks, we show that even the
simple form of retransmit diversity presented in the example above can provide significant performance
improvement and hence has incentives to be exploited in heterogeneous smart antenna networks.
The transmitter continues to (re)transmit the packet on fading loss using its normal strategy of operation
without any change for a maximum of F trials. If the link involves a smart node then the smart antenna gain on
the link would contribute to reliability
The transmitter transmits using its normal strategy of operation. On experiencing a fading loss, if there
is a neighbor within the communication pattern of both the transmitter and receiver, then that node can
potentially receive the packet from the transmitter due to wireless broadcast advantage and hence relay the
packet (on successful decoding) to the receiver. In any case, the number of retransmissions for the packet
(including transmitter and relay) is bounded by F, after which the packet is dropped. In the absence of a relay,
the operation is the same as that of non-cooperation
Here, on a fading loss, the transmitter reduces its transmission rate to a low value which helps improve
BER performance. Any available antenna gain on the link contributes to reliability as well. However, this
increases the average SNR consumed per transmission and also the delay (which impacts throughput directly)
although the number of re-trials required during correlated fading is reduced
Attacks
All the nodes in an network are categorized as friends, acquaintances or strangers based on their
relationships with their neighboring nodes. During network initiation all nodes will be strangers to each other. A
trust estimator is used in each node to evaluate the trust level of its neighboring nodes. The trust level is a
function of various parameters like length of the association, ratio of the number of packets forwarded
successfully by the neighbor to the total number of packets sent to that neighbor, ratio of number of packets
received intact from the neighbor to the total number of received packets from that node, average time taken to
respond to a route request etc. Accordingly, the neighbors are categorized into friends (most trusted),
acquaintances (trusted) and strangers (not trusted). In an ad hoc network, the relationship of a node i to its
neighbor node j can be any of the following types
3. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 79 | Page
N1,N2- Friend node
N3,N6Acquaintance
N7,N5-Stranger
(i) Node i is a stranger (S) to neighbor node j:
Node i have never sent/received messages to/from node j. Their trust levels will be very low. Any
new node entering ad hoc network will be a stranger to all its neighbors. There are high chances of malicious
behavior from stranger nodes.
(ii) Node i is an acquaintance (A) to neighbor node j:
Node i have sent/received few messages from node j. Their mutual trust level is neither too low nor
too high to be reliable. The chances of malicious behavior will have to be observed.
(iii) Node i is a friend (F) to neighbor node j:
Note i sent/received plenty of messages to/from node j. The trust levels between them are
reasonably high. Probability of misbehaving nodes may be very less. The above relationships are computed by
each node and a friendship table is maintained for the neighbours.
Neighbors Relationship
N1 F
N2 F
N3 A
N4 S
N5 A
N6 S
To prevent RREQ flooding, the threshold level is set for the maximum number of RREQ packets a
node can receive from its neighbors. To prevent DATA flooding, the intermediate node assigns a threshold
value for the maximum number of data packets it can receive from its neighbors. If Xrs, Xra, Xrf be the RREQ
flooding threshold for a stranger, acquaintance and friend node respectively, Xrf > Xra > Xrs. If Yrs, Yra, Yrf
be the DATA flooding threshold for a stranger, acquaintance and friend node respectively then Yrf > Yra > Yrs.
If the specified threshold level is reached, further RREQ packets from the initiating node are ignored and
dropped.
Let X[i] denotes the number of packets delivered from neighboring node i, where 1 ≤ i ≤ n. Xrf,
Xra and Xrs are the threshold values set for friends, acquaintances and strangers. Let Z[i] is a Boolean array to
activate or stop the prevention algorithm. The algorithm for preventing RREQ flooding . The algorithm to
prevent DATA flooding is similar to the algorithm flooding. The threshold values for DATA flooding can be set
as per the requirements of the application software
In evaluate the performance of the Flooding Attack Prevention algorithm, WLAN throughput and
delay in the network are considered. In the default setup, the nodes communicate using the AODV protocol
which shows the degradation in throughput of the network and increased delay in the presence of malicious
4. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 80 | Page
nodes. With the implementation of flooding attack prevention algorithm over AODV, the flooding attacks are
constrained and this results in increased throughput and reduced delay
IV. RESULT
This section provides the results of Packet delivery ratio performance and packet drop performance
and throughput performance using secure on demand multicast routing protocol
1.Packet Delivery Ratio Performance:
Fig 1.packet delivery ratio performance
Fig 1. represent the attackers do not perform any action in the network. where the attackers are identified and
completely isolated in the network, and serves as the baseline for evaluating the impact of the attack.packet
delivery ratio will be occurs on 0 to 1
.
Fig2. packet delivery ratio performance comparision
Fig 2.represent packet delivery ratio will be high. The attackers combine local metric manipulation
with the data dropping attack. The attackers conduct the LMM attack by readvertising the same metric they
received in JOIN QUERY, which is equivalent to making their link metric of the previous hop equal to 1
5. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 81 | Page
2.PACKET DROP PERFORMANCE:
fig 3. Packet drop Performance
Fig 3. represent the attackers do not perform any action in the network. the neighbour node identified
the attacker node. so there is no packet drop will be occur.
Fig 4.represent the attackers do not perform any action in the network. where the attackers are identified
and completely isolated in the network, The attackers drop data packets, but participate in the protocol correctly
otherwise. The attack has effect only when attackers are selected in the forwarding group.
Fig 4. Packet drop Performance comparision
3.THROUGHPUT PERFORMANCE:
All the nodes send the hello packet to its neighbor.our approach eliminate the malicious node from
our multicast routing.packet loss will be occur.node 2(source) only retransmit the lost packet.In our approach
node 24(intermediate node) make use a special buffer and store the sensitive data.if packet loss will be occur
means node 24 successfully receive the lost packet and retransmitted
6. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 82 | Page
Fig 5 Throughput Performance.
Fig 5 represent maximize throughput will be occur.How much packet will be send that packet will be
received in particular time and also the attacker do not perform any action in the network
Fig 6. Throughput Performance comparision
Fig 6 represent throughput performance will be high . neighbour node identified the attacker node
based on the trust level.and the neighbour node create one alarm meg and send the alarm meg all the node
except the attacker node.so all the node identified the attacker node.so how much packet will be send that
packet will be received in particular time and also the attacker do not perform any action in the network
V. CONCLUSION AND FUTURE WORK
The security implication of using high- throughput metrics in multicast protocols in
wireless mesh networks. In particular, node identified metric manipulation attacks that can inflict
significant damage on the network. The attacks not only have a direct impact on the multicast
service, but also raise additional challenges in defending against them due to their metric
poisoning effect. This paper overcome the challenges with our novel defence scheme, Rate Guard,
that combines measurement-based attack de- taction and accusation-based reaction. Our
defence also copes with transient network variations and malicious attempts to attack the
network indirectly by exploiting the defense itself. This paper demonstrate through analysis and
experiments that our defense is effective against the identified attacks, resilient to malicious
exploitations, and imposes a small overhead
References
7. Enhance The Throughput Of Wireless Network Using Multicast Routing
www.iosrjournals.org 83 | Page
[1]. 1 J. Dong, R. Curtmola, and C. Nita-Rotaru, “On the Pitfalls of Using High-Throughput Multicast Metrics in Adversarial Wireless
Mesh Networks,” Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and AdHoc Comm.andNetworks(SECON’08),2008.
[2]. 2. Y.B. Ko and N.H. Vaidya, “Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks,” Mobile Networks and
Applications, vol.7,no.6,pp.471-480,2002.
[3]. 3. R. Chandra, V. Ramasubramanian, and K. Birman,
[4]. “Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks,” Proc. 21st IEEE Int’l Conf.,Distributed
Computing Systems(ICDCS’01),2001.
[5]. 4.Y.-B. Ko and N.H. Vaidya, “GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks,” Proc. Int’l Conf. Network
Protocols(ICNP), pp. 240-250, 2000.
[6]. 5. E.L. Madruga and J.J. Garcia-Luna-Aceves, “Scalable Multicasting: the Core-Assisted Mesh Protocol,” Mobile Networks and
Applications, vol. 6, no. 2, pp. 151-165, 2001.
[7]. 6. S.J. Lee, W. Su, and M. Gerla, “On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks,” Mobile
Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
[8]. 7. E.M. Royer and C.E. Perkins, “Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing,” Internet Draft, July 2000.
[9]. 8. J.G. Jetcheva and D.B. Johnson, “Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks,” Proc.
ACM MobiHoc, 2001.
[10]. 9. H. Lundgren, E. Nordstrom, and C. Tschudin, “Coping with Communication Gray Zones in IEEE 802.11b Based Ad Hoc
Networks,” Proc. Fifth ACM Int’l Workshop Wireless Mobile Multimedia(WOWMOM ’02), 2002.
[11]. 10. D.S.J.D. Couto, D. Aguayo, J.C. Bicket, and R. Morris, “A High- Throughput Path Metric for Multi-Hop Wireless Routing,”
Proc. ACM MobiCom, 2003
[12]. 11.S. Roy, D. Koutsonikolas, S. Das, and C. Hu, “High-Throughput Multicast Routing Metrics in Wireless Mesh Networks,” Proc.
26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS),2006.
[13]. 12.A. Chen, D. Lee, G. Chandrasekaran, and P. Sinha, “HIMAC: High Throughput MAC Layer Multicasting in Wireless
Networks,”Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS ’06),200
[14]. 13.. B. Awerbuch, D. Holmer, and H. Rubens, “The Medium Time Metric: High Throughput Route Selection in Multirate Ad Hoc
Wireless Networks,” Mobile Networks and Applications, Special Issue on Internet Wireless Access: 802.11 and Beyond, vol. 11, no.
2, pp. 253-266, 2005
[15]. 14.P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks,” Proc. SCS Comm.Networks and Distributed
Systems Modeling and Simulation Conf. (CNDS), pp. 27-31, Jan. 2002.
[16]. 15.Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc
Networks,” Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications
[17]. (WMCSA), 2002.