MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
The International Journal of Engineering and Science (The IJES)theijes
The document summarizes a study on the Enhanced Adaptive Acknowledge (EAACK) scheme for detecting misbehaving nodes in mobile ad hoc networks (MANETs). It discusses the limitations of existing acknowledgment-based intrusion detection systems like Watchdog, TWOACK, and AACK in handling receiver collisions. The key issues related to acknowledgment-based schemes for detecting misbehavior in MANETs are addressed. The focus is on analyzing the limitations of acknowledgment approaches like AACK and studying EAACK as an improved approach for addressing receiver collisions in MANETs.
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks on MANETs using the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It found that the packet delivery ratio decreased significantly when black hole nodes were introduced that dropped packets instead of forwarding them as they should. Increasing the number of black hole nodes caused an even more dramatic decrease in the packet delivery ratio.
This document discusses detecting sequence number collector problems in black hole attacks in AODV-based mobile ad hoc networks. It begins with background on mobile ad hoc networks (MANETs) and characteristics such as dynamically changing topologies. It then discusses the AODV routing protocol and describes black hole attacks, where a malicious node advertises itself as having the shortest path. The problem is that a malicious node can act as a sequence number collector to obtain numbers from many nodes. The proposed solution classifies nodes into categories based on behavior and isolates malicious nodes from routing and forwarding. Associations between nodes are then used for route selection to increase security while encouraging cooperation.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The International Journal of Engineering and Science (The IJES)theijes
The document summarizes a study on the Enhanced Adaptive Acknowledge (EAACK) scheme for detecting misbehaving nodes in mobile ad hoc networks (MANETs). It discusses the limitations of existing acknowledgment-based intrusion detection systems like Watchdog, TWOACK, and AACK in handling receiver collisions. The key issues related to acknowledgment-based schemes for detecting misbehavior in MANETs are addressed. The focus is on analyzing the limitations of acknowledgment approaches like AACK and studying EAACK as an improved approach for addressing receiver collisions in MANETs.
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks on MANETs using the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It found that the packet delivery ratio decreased significantly when black hole nodes were introduced that dropped packets instead of forwarding them as they should. Increasing the number of black hole nodes caused an even more dramatic decrease in the packet delivery ratio.
This document discusses detecting sequence number collector problems in black hole attacks in AODV-based mobile ad hoc networks. It begins with background on mobile ad hoc networks (MANETs) and characteristics such as dynamically changing topologies. It then discusses the AODV routing protocol and describes black hole attacks, where a malicious node advertises itself as having the shortest path. The problem is that a malicious node can act as a sequence number collector to obtain numbers from many nodes. The proposed solution classifies nodes into categories based on behavior and isolates malicious nodes from routing and forwarding. Associations between nodes are then used for route selection to increase security while encouraging cooperation.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
This document summarizes an intrusion detection system called EAACK that detects malicious nodes in mobile ad hoc networks (MANETs). It begins by providing background on MANETs and challenges related to their decentralized structure and dynamic topology. It then discusses common attacks on MANETs like packet dropping, and the need for intrusion detection systems to increase network security. Existing IDS methods are outlined along with their limitations. The document proposes a new IDS called EAACK that aims to more accurately detect malicious behaviors without impacting network performance. Key concepts of trust values and monitoring nodes are incorporated into EAACK to reduce false detections.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
This document provides an overview of mobile ad-hoc networks (MANETs). It discusses how MANETs are formed without any infrastructure by mobile wireless nodes. Key points include: MANETs are useful when wired infrastructure is not present or practical; they allow for communication in disaster or battlefield situations. The document also covers routing challenges in MANETs due to dynamic topologies, and lists some common routing protocols. It discusses implementation issues like interference and discusses power constraints in MANETs. In summary, the document provides a high-level introduction to MANETs, their applications, routing challenges, and implementation considerations.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs). It defines a MANET as a network formed spontaneously by wireless mobile nodes without any preexisting infrastructure. Key characteristics of MANETs include dynamic topologies, energy-constrained operation, limited bandwidth, and security threats. Applications include collaborative work, crisis management, and personal area networks. The document also describes different routing protocols for MANETs including table-driven, source-initiated, and hybrid protocols. It then discusses challenges in WSNs such as ad-hoc deployment, limited resources, scalability, and fault tolerance and how these influence routing protocol design.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks in MANETs using the Ad hoc On-Demand Distance Vector (AODV) routing protocol. It was found that the packet delivery ratio decreased significantly when black hole attacks were introduced. Additionally, the packet delivery ratio decreased dramatically as the number of black hole nodes increased.
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
This document discusses different prediction methods for route recovery in mobile ad hoc networks (MANETs). It begins with an abstract discussing multiple path routing infrastructures in various networks. The document then provides background on ad hoc networks and discusses features of MANETs such as dynamic topologies and variable capacity links. It also introduces the Ad Hoc On-Demand Distance Vector (AODV) routing protocol and discusses topics like route discovery, link availability, and distributed hash tables in MANETs.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
This document summarizes a research paper that proposes a distributed localization scheme to detect jamming attacks in mobile ad hoc networks (MANETs). The scheme involves all nodes operating in promiscuous mode to monitor neighboring nodes for abnormal behavior, using metrics like packet delivery ratio and signal strength. If abnormal behavior is detected, an alert is broadcasted without relying on a centralized authority. This distributed approach is evaluated through simulations and found to more efficiently detect jamming attacks compared to a clustered network architecture with designated cluster heads.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
This document summarizes an intrusion detection system called EAACK that detects malicious nodes in mobile ad hoc networks (MANETs). It begins by providing background on MANETs and challenges related to their decentralized structure and dynamic topology. It then discusses common attacks on MANETs like packet dropping, and the need for intrusion detection systems to increase network security. Existing IDS methods are outlined along with their limitations. The document proposes a new IDS called EAACK that aims to more accurately detect malicious behaviors without impacting network performance. Key concepts of trust values and monitoring nodes are incorporated into EAACK to reduce false detections.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
This document provides an overview of mobile ad-hoc networks (MANETs). It discusses how MANETs are formed without any infrastructure by mobile wireless nodes. Key points include: MANETs are useful when wired infrastructure is not present or practical; they allow for communication in disaster or battlefield situations. The document also covers routing challenges in MANETs due to dynamic topologies, and lists some common routing protocols. It discusses implementation issues like interference and discusses power constraints in MANETs. In summary, the document provides a high-level introduction to MANETs, their applications, routing challenges, and implementation considerations.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs). It defines a MANET as a network formed spontaneously by wireless mobile nodes without any preexisting infrastructure. Key characteristics of MANETs include dynamic topologies, energy-constrained operation, limited bandwidth, and security threats. Applications include collaborative work, crisis management, and personal area networks. The document also describes different routing protocols for MANETs including table-driven, source-initiated, and hybrid protocols. It then discusses challenges in WSNs such as ad-hoc deployment, limited resources, scalability, and fault tolerance and how these influence routing protocol design.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks in MANETs using the Ad hoc On-Demand Distance Vector (AODV) routing protocol. It was found that the packet delivery ratio decreased significantly when black hole attacks were introduced. Additionally, the packet delivery ratio decreased dramatically as the number of black hole nodes increased.
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
This document discusses different prediction methods for route recovery in mobile ad hoc networks (MANETs). It begins with an abstract discussing multiple path routing infrastructures in various networks. The document then provides background on ad hoc networks and discusses features of MANETs such as dynamic topologies and variable capacity links. It also introduces the Ad Hoc On-Demand Distance Vector (AODV) routing protocol and discusses topics like route discovery, link availability, and distributed hash tables in MANETs.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
This document summarizes a research paper that proposes a distributed localization scheme to detect jamming attacks in mobile ad hoc networks (MANETs). The scheme involves all nodes operating in promiscuous mode to monitor neighboring nodes for abnormal behavior, using metrics like packet delivery ratio and signal strength. If abnormal behavior is detected, an alert is broadcasted without relying on a centralized authority. This distributed approach is evaluated through simulations and found to more efficiently detect jamming attacks compared to a clustered network architecture with designated cluster heads.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
This document proposes a Secure QoS-Oriented Distributed routing protocol (SQOD) for hybrid wireless networks. SQOD contains two parts: 1) A QoS-Oriented Distributed Routing Protocol (QOD) that reduces transmission delay and increases throughput through distributed resource scheduling. 2) An Enhanced Adaptive ACKnowledgment (EAACK) intrusion detection system that protects against attacks through a three-part ACK scheme involving standard ACKs, secure ACKs, and misbehavior reports with authentication. The document analyzes problems in existing routing protocols like false misbehavior reports, limited transmission power, and receiver collisions. It then describes the network and service models and provides details of the QOD and EAACK schemes
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
The document proposes a new intrusion detection system called EAACK that is designed specifically for MANETs. Existing intrusion detection systems for MANETs like Watchdog and TWOACK have disadvantages like failing to detect malicious nodes that generate false reports or forged acknowledgments. EAACK aims to address these issues by using digital signatures to authenticate acknowledgment packets and thus make the system more secure. It is claimed that EAACK can detect malicious behaviors better than existing approaches in some cases without degrading network performance.
EAACK is an intrusion detection system designed specifically for MANETs that aims to address weaknesses in existing approaches. It adopts digital signatures to authenticate acknowledgment packets and help guarantee they are valid. This helps EAACK tackle issues like false misbehavior reports and forged acknowledgments that other systems fail to detect. Compared to contemporary methods, EAACK demonstrates higher detection rates of malicious behavior in some cases without significantly impacting network performance.
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
Mobile ad hoc networks (MANETs) provide reliable communication in disaster areas by allowing for the autonomous and decentralized formation of wireless networks without existing infrastructure. MANETs are suitable for disaster relief because they are easy to deploy, can dynamically form multihop networks as nodes move, and do not rely on fixed network components that may be damaged. The key features of MANETs that make them appropriate for disaster areas are their ability to self-configure without centralized administration, adapt to unpredictable node movements, and restore connectivity when infrastructure is compromised or destroyed.
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
The document discusses using a window-based smart antenna design to improve routing performance in mobile ad hoc networks (MANETs). It proposes arranging antenna elements in a window configuration to achieve a desired radiation pattern with a minimum number of elements. The design aims to address issues like resource constraints in MANET nodes and different antenna arrangement options. It analyzes how smart antennas can enhance the dynamic source routing protocol by reducing redundant broadcasts, handling route requests/replies more efficiently, and improving data packet delivery and route error messaging. However, smart antennas also increase node complexity and computational overhead.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
The document proposes a new intrusion detection system called EAACK that is designed specifically for mobile ad hoc networks (MANETs). Existing intrusion detection systems for MANETs have weaknesses including being vulnerable to false misbehavior reports and forged acknowledgment packets. EAACK addresses these weaknesses by using digital signatures to authenticate acknowledgment packets and thereby guarantee their validity. This helps EAACK more accurately detect malicious nodes and behaviors. The system is also designed to reduce network overhead compared to previous acknowledgment-based approaches.
Similar to IEAACK-Secure Detection System For Packet-Dropping Attack In Manets (20)
Since so many years a problem occurs in KSB Pump Va mbori for casting process i.e. cracks occurs in the castings & it is repeated one. Therefore the compan y has given opportunity to me to solve this problem . In case of steel casting there are mainly cracks & also blo w holes induced due to the casting procedure. There are many factors for the casting defects .The factor is unev en material feeding in casting & also due to the mo uld material & also the core material. These cracks finally brea k directly the component of the casting i.e. in cas e of pump the casting component is like Impeller,Volute casing & casing cover. At the time of feeding of steel material in to the casting the material is in liquid us form i.e. it i s hot material & this material is feeding into casting at the time o f feeding it develop different region of heat. At o ne side the temp is high &at other side the temp is low this also pr oduce cracks. To simulate that casting we use the M AGMA SOFTWARE for simulation & validate it using NDT.
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
The document describes the design of a simple spur gear train and helical gear train with an idler gear using the AGMA (American Gear Manufacturers Association) standard method. Key steps of the design process include selecting input parameters, creating a preliminary drawing, selecting materials, and performing theoretical calculations to determine dimensions and check for bending and contact stresses based on AGMA equations. A comparative study is carried out to select the optimal gear train design that meets the strength requirements for the given input parameters and load conditions.
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
A leaf spring is a simple form of spring,commonly used for the suspension in wheeled vehicles. It is also one of the oldest forms of spring. Sometimes referred to as a semielliptical l eaf spring (SELS) it takes the form of a slender ar c-shaped length of spring steel of rectangular cross section. The centre of the arc p rovides location for the axle,while tie holes are provided at either end for attaching to the vehicle body. In the present work,a seven-leaf steel spring use d in passenger cars is replaced with a composite mu lti leaf spring made of glass/epoxy composites. The dimensions sand the num ber of leaves for both steel leaf spring and compos ite leaf springs are considered to be the same. The primary objective is to compare their load carrying capacity,stiffness and weight savings of composite leaf spring. Finally,fatigue life of steel and com posite leaf spring is also predicted using life dat a
Brimmed diffuser is collection�acceleration device which shrouds a wind turbine.For a given turbine di ameter,the power augmentation can be achieved by brimmed diffuser,p opularly known as wind lens. The present numerical investigation deals with the effect of low pressure region created by wind l ens and hence to analyze the strong vortices formed by a brim attached to the shroud diffuser at exit. Also in this analysis,a c omparative numerical prediction of mass flow rates through the wind turbine has been carried out with various types of wind lens wh ich in turn helps to optimize the torque augmentati on. It has been numerically proved that there is significant increase in the wa ke formation & vortex strength when brimming effect is added to a diffuser
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
The automobile engine connecting rod is a high volume production,critical component. It co nnects reciprocating piston to rotating crankshaft,transmitting the thrust of the piston to the crankshaft. Every vehicle that uses an internal combustion engine requires at least one connecting rod depending upon the number of cylinders in the engine. As the purp ose of the connecting rod is to transfer the reciprocating motion of the piston into rotary motion of the crankshaft. Connecting ro ds for automotive applications are typically manufactured by forging from either w rought steel or powdered metal. the material used f or this process is Mg-Alloy and also finite element analysis of connecting rod
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
1) The document discusses improving the critical speed of the valve train in a single cylinder engine from 3600 rpm to 5000 rpm. It aims to optimize the valve spring parameters to increase the speed limit without failure of contact between components.
2) An analytical and simulation-based approach is proposed. The valve spring stiffness, pushrod buckling, contact stresses, and natural frequency response will be analyzed. ADAMS multi-body dynamics software will be used to simulate the optimized design.
3) Preliminary results found that with the optimized valve spring configuration, the engine speed could be increased beyond 5000 rpm without failure, unlike with the existing design. Experimental validation of the optimized design will evaluate performance.
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
This paper consist of working of reciprocating pump which is driven by a compound pendulum. It provide s the energy required to lift the water from a tank placed approximately several meter below the ground level. Basic application of the mechanism will be for watering the garden which will be operated by means of operation opening and closing of entrance gate. Paper consists of basic concept,design of pump and compound pendulum mecha nism and fabricationed model. The concept can also be implemented in the rural areas,having the problem of electric supply. We aim at making a prototype for providing some me an for pumping of water by the pump which requires less human efforts,conside ring cost effectiveness,easy to operate and portab le mechanism.
The IC engine has seen numerous revolutionary and e volutionary modifications in technology and design over the past few decades. The sole motto behind the modifications wa s to increase the overall efficiency of the IC Engi ne including volumetric and thermal efficiency. Recently few benchmarking techn ologies like the CRDI,MPFI,HCCI,etc. in the Otto cycle and Diesel cycle engines have created an enormous revolution in the automobile industry. In spite of these technologica l and design advances,the efficiencies are not being more than a particular l imit. However,the concept of split cycle engines has dra stically increased the overall performance in all respect. The split cycle concept basically separates the fou r strokes of the conventional cycle. The Scuderi engine one of the best-in-class engine desi gns based on the split cycle concept. The Scuderi engine works on the split cycle and gives higher efficiency than the previous split cycle engines resulting overall high perform ance. It also eliminates the problems faced by previous engines based on the spl it cycle in terms of breathing (volumetric efficien cy) and thermal efficiency. This paper throws light on the greater volumetric,thermal and overall efficiency key points related t o the Scuderi Engines.
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
The excessive rise of temperature in the journal be aring operating at boundary/mixed lubrication regim es. Journal bearing test set- up is used to measure the temperature along the cir cumference of the bearing specimen for different lo ading conditions. Here in this journal bearing of l/d ratio 1,diameter of jo urnal is 60mm and the bearing length is 60mm,clear ance is .06mm has been designed and tested to access the temperature rise of the bearing. The result shows that as the load o n the bearing is increasing temperature also increasing. Temperature analysis o f journal bearing is also done by the Ansys workben ch software
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
Energy is one of the building blocks of the country . The growth of the country has been fueled by chea p,abundant energy resources. Solar energy is a form of renewable ener gy which is available abundantly and collected unre servedly. The parabolic concentrator reflects the direct incident solar rad iation onto a receiver mounted above the dish at it s focal point. The conversion of concentrated solar radiation to heat takes place in receiver. The heat transfer characteristics of the receiver changes during the rotation of the receiver which affects thermal performance. The working temperature may also influence the ther mal performance and overall efficiency of the system. Thermal as well as optica l losses affect the performance of a solar paraboli c dish-cavity receiver system. The thermal losses of a solar cavity receiver include c onvective and radiative losses to the air in the ca vity and conductive heat loss through the insulation used behind the helical tube surface. Convective and radiative heat losses form the major constituents of the thermal losses. The convection heat loss from cavit y receiver in parabolic dish solar thermal power sy stem can significantly reduce the efficiency and consequently the cost effectiveness of the system. It is important to assess this heat loss and subsequently improve the thermal performance of the receiver.
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
Crankshaft is a crucial component in an engine asse mbly. Crankshaft is consisting of two web sections and one crankpin,which converts the reciprocating displacement of the pist on to a rotary motion with a four link mechanism. G enerally crankshafts are manufactured using cast iron and forged steel mater ial. In this work to design and finite element anal ysis of crankshaft of 4 cylinder petrol engine of Maruti swift Vxi. of 1200 cubic capacity. The finite element analysis in ABA QUS software by using six materials based on their composition viz. Cast iron,EN30B,SAE4340,Structural steel,C70 Alloy steel and Aluminium based composite material reinforced with silicon carbide & fly ash. The parameter like von misses stress,deformation;maximum and minimum principal stress & strain were obtained from analysis software. The results of Finite element show that t he Aluminium based composite material is best mater ial among all. Compare the result like weight and Stiffness parameter. It is resulted of 65.539 % of weight,with reduction i n deformation.
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
Nowadays,necessity of small components is a common trend. These requirements encourage the researcher s to develop very minutest size components to fulfill the demand. The manufact uring of these type of components is a difficult ob ligation and for that various machining methods are develop to manufacture such c omponents. In this article the Electro Chemical mac hining and Electrical Discharge Machining is reviewed. We tried to summar ize the work of various researchers. The study show s that this type of machining processes gives good alternative.
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
This document presents an experimental study on heat transfer enhancement using nanofluid jet impingement. Key findings include:
1) The use of nanofluids (Al2O3-water) can increase heat transfer coefficients by up to 44% compared to using water alone.
2) Heat transfer coefficients are highest near the stagnation point and decrease further from the center.
3) Varying the nozzle-to-plate distance (Z/D ratio) between 2-8 results in maximum heat transfer, with little effect beyond Z/D of 12.
4) Increasing the flow rate leads to higher heat transfer coefficients, up to a 5% increase from 2 lpm to 4 lpm.
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
The demand for bigger,faster and lighter moving ve hicles,such as ships,trains,trucks and buses has increased the importance of efficient str uctural arrangements. In principle two approaches exist to develop efficient structures:e ither application of new materials or the use of new structural design. A proven and well-establi shed solution is the use of composite materials and sandwich structures. In this way high strength to weight ratio and minimum weight can be obtained. The sandwich structures have potential to offer a w ide range of attractive design solutions. In addition to the obtained weight reduction,these so lutions can often bring space savings,fire resistance,noise control and improved heating and cooling performance. Laser-welded metallic sandwich panels offer a number of outstand ing properties allowing the designer to develop light and efficient structural configuratio ns for a large variety of applications. These panels have been under active investigations during the last 15 years in the world.
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
Bumper is a energy absorbing protective element whi ch absorb the energy in front collision and protect valuable parts like radiator etc. Bumper is act like protect ive shield generally made of steel material. As eco nomic point of view and to reduce consumption of fuel manufacturin g of light weight vehicle is requirement of current situation. Application of composite material in automobile sec tor is now day common thing. Aluminum honeycomb san dwich panel is basically material from aerospace industri es and known for its high strength to weight ratio. Sandwich structure basically having its properties due to ge ometry. To determine various properties of sandwich structure conducting experiments is expensive,so generally F EA is used .However complex geometry is hurdle so t here are various theories are available for simplification o f model. These theories convert 3D model in to homo genous model .As far as concerning India manufacturing rate of s andwich structure is very less,so generally cost i s more. Greatest giant manufacturer is china we can observe their bu llet train and metro transport facility constructio n. Recently in march 2014 largest selling Indian cars are failed in NCap test in 100% frontal crash test. So requirement of more energy absorbing material with economy cons ideration is important.
Robotic welding requires specialized fixtures to ac curately hold the work piece during the welding operation. Despite the large variety of welding fix tures available today the focus has shifted in maki ng the welding arms more versatile,not the fixture. T he new fixture design reduces cycle time and operat or labor while increasing functionality;and allows co mplex welding operations to be completed on simple two axis welding arms
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
In these paper structural fields of the solid disc brake during short and emergency braking with four different materials is studied. The distribution of the tempe rature depends on the various factors such as frict ion,surface roughness and speed. The effect of the angular velo city and the contact pressure induces the temperatu re rise of disc brake. The finite element simulation for three -dimensional model was preferred due to the heat fl ux ratio constantly distributed in circumferential direction . Here value of temperature,friction contact power,nodal displacement and deformation for different pressure condition using analysis software with four materi als namely cast iron,cast steel,aluminium and carbon fibre reinforced plastic are taken. Presently the D isc brakes are made up of cast iron and cast steel. With the v alue of simulation result best suitable material fo r the brake drum with higher life span is determined.
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
Metallic matrix composites are combinations of two or more different metals inter metallic compounds or second phases in which dispersed phases are embe dded within the metallic matrix. They are produced by controlling the morphologies of the constituents to achieve optimum combination of properties. Properties of the composites depend on the properti es of the constituent phases,their relative amount,and dispersed phase geometry including particle siz e,shape and orientation in the matrix. In this pap er,The mechanical properties,behaviour and micro stru ctural evolution of aluminium metal matrix metallic composites fabricated under various process conditi ons were investigated to understand their process- structure�property relations by optimization proces s. Addition of silicon carbide to aluminum has show n an increase in its mechanical properties.
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
A lubricant is a substance that reduces friction an d wear by providing a protective film between two moving surfaces. Good lubricants possess the proper ties such as low toxicity,high viscosity index,hi gh load carrying capacity,excellent coefficient of fr iction,good anti-wear capability,low emission int o the environment,high ignition temperature. So tribolog y related problems can be minimized by proper selection of lubricant from wear consideration. Tod ay,the depletion of reserves of crude oil,the gro wing prices of crude oil and concern about protecting th e environment against pollution have developed the interest towards environment-friendly lubricants. B ecause of these the purpose of this work is to eval uate the anti-wear characteristics of cottonseed oil and to check the suitability of cottonseed oil as a lu bricant for multi-cylinder engine. Four ball testing machin e is used for anti-wear testing as per ASTM D 4172. The wear preventive characteristic of cottonseed oi l is obtained by measuring wear scar diameter. The present study shows the potential of cotton seed oi l as an alternating lubricant.
Magnetic abrasive finishing is a machining process where the tooling allowance is remove by media wi th both magnetic and abrasive properties,with a magnetic f ield acting as a binder of a grain. Such machining falls into the category of erosion by abrasive suspension and lend itself to the finishing of any type of surface . The possibility of finishing complex surfaces is a spec ial benefit of this machining. Magnetic abrasive fi nishing process is most suitable for obtaining quality fini sh on metallic and non-metallic surfaces. Magnetic abrasive finishing used for complicated product finishing & Roughness and tolerance band achieved that is diffi cult using conventional machine process. The product dimension al requirement easily possible with taking trial wi th MAF parameters.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
1. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
IEAACK-Secure Detection System For Packet-Dropping Attack
In Manets
Ms. Preeti Sharanvijay. Chikkshetty
Department of Computer Science and Engg, N.B.N. Sinhgad College of Engg.
Solapur University, Solapur, India
Prof. Abhijit. V. Mophare,
Asst. Prof. in CSE Dept., N.B.N. Sinhgad College of Engg.
Solapur University, Solapur, India
Prof. Amarnath Shivanand Chadchankar
Asst. Prof. in CSE Dept., BMIT, Solapur University, Solapur, India
Abstract
MANET is a collection of wireless independent nodes along with transmitter and receiver that
communicate with each other via bidirectional link. The self-configuring ability of nodes in
MANET made it popular among critical mission applications like military use or emergency
recovery. But due to the changing topology and open access MANET become vulnerable to
problems (such as receiver collision, limited transmission power, false misbehaviour report ,
packet dropping) To solve this problem we use three approaches of Intrusion Detection
System (IDS) such as Watchdog, TWOACK, and AACK. We have proposed a new protocol
design for MANET that is IDS based EAACK which consist of ACK, S-ACK and MRA for
solving all the problems of Watchdog approach in IDS of MANET.
Introduction
Over the past decade, there has been a growing interest in wireless networks, as the cost of
mobile devices such as PDAs, laptops, cellular phones, etc have reduced drastically. The
latest trend in wireless networks is towards pervasive and ubiquitous computing - catering to
both nomadic and fixed users, anytime and anywhere. Several standards for wireless networks
have emerged in order to address the needs of both industrial and individual users. One of the
most prevalent forms of wireless networks in use today is the Wireless Local Area Network
(WLAN). In such a network, a set of mobile nodes are connected to a fixed wired backbone.
WLANs have a short range and are usually deployed in places such universities, companies,
cafeterias, etc. There is still a need for communication in several scenarios of deployment
where it is not feasible to deploy fixed wireless access points due to physical constraints of
the medium. For example, consider communication amongst soldiers in a battlefield,
involving troops spread out over a large area. In this case, it is not only feasible to deploy a
fixed wireless access point, but also risky since an enemy attack would bring down the whole
network. This problem has led to a growing interest among the research community in mobile
ad hoc networks, wireless networks comprised of mobile computing devices communicating
without any fixed infrastructure.
By definition, Mobile Ad hoc NETwork (MANET) is a collection of mobile
nodes equipped with both a wireless transmitter and a receiver that communicate with each
other via bidirectional wireless links either directly or indirectly. One of the major advantages
of wireless networks is its ability to allow data communication between different parties and
2. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
still maintain their mobility. However, this communication is limited to the range of
transmitters. This means that two nodes cannot communicate with each other when the
distance between the two nodes is beyond the communication range of their own. MANET
solves this problem by allowing intermediate parties to relay data transmissions. This is
achieved by dividing MANET into two types of networks, namely, single-hop and multihop.
In a single-hop network, all nodes within the same radio range communicate directly with
each other. On the other hand, in a multi-hop network, nodes rely on other intermediate nodes
to transmit if the destination node is out of their radio range. In contrary to the traditional
wireless network, MANET has a decentralized network infrastructure. MANET does not
require a fixed infrastructure; thus, all nodes are free to move randomly. MANET is capable
of creating a self-configuring and self-maintaining network without the help of a centralized
infrastructure, which is often infeasible in critical mission applications like military conflict or
emergency recovery. Minimal configuration and quick deployment make MANET ready to be
used in emergency circumstances where an infrastructure is unavailable or unfeasible to
install in scenarios like natural or human-induced disasters, military conflicts, and medical
emergency situations.
LITERATURE REVIEW
Elhladi M. Shakshuki, Nan Kang and Tarek R. Sheltami[1],The migration to wireless network
from wired network has been a global trend in the past few decades. The mobility and
scalability brought by wireless network made it possible in many applications. Among all the
contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most
important and unique applications. On the contrary to traditional network architecture,
MANET does not require a fixed network infrastructure; every single node works as both a
transmitter and a receiver. Nodes communicate directly with each other when they are both
within the same communication range. Otherwise, they rely on their neighbours to relay
messages. The self-configuring ability of nodes in MANET made it popular among critical
mission applications like military use or emergency recovery.
G. Jayakumar and G Gopinathmk[2] Mobile ad hoc networks(MANET) represent
complex distributed systems that comprise wireless mobile nodes that can freely and
dynamically self organize into arbitrary and temporary adhoc network topologies, allowing
people and devices to seamlessly internet work in areas with no preexisting communication
infrastructure e.g., disaster recovery environments. Tactical networks have been the only
communication networking application that followed the ad-hoc paradigm. Recently the
introduction of new technologies such as Bluetooth, IEEE 802.11 and hyperlan are helping
enable eventual commercial MANET deployments outside the military domain. These recent
revolutions have been generating a renewed and growing interest in the research and
development of MANET.
R. Rivest, A. Shamir, and L. Adleman[4],An encryption method is presented with the
novel property that publicly revealing an encryption key does not thereby reveal the
corresponding decryption key. A message is encrypted by representing it as a number M,
raising M to a publicly specified power e, and then taking the remainder when the result is
divided by the publicly specified product, n, of two large secret prime numbers p and q.
Decryption is similar; only a different, secret, power d is used, where e _ d _ 1 (mod (p - 1) _
(q - 1)). The security of the system rests in part on the difficulty of factoring the published
divisor, n.
3. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
Problem Definition And Scope
Problem Statement:
A)Watchdog: proposed a scheme named Watchdog that aims to improve the throughput of
network with the presence of malicious nodes. In fact, the Watchdog scheme is consisted of
two parts, namely, Watchdog and Pathrater. Watchdog serves as IDS for MANETs. It is
responsible for detecting malicious node misbehaviours in the network. Watchdog detects
malicious misbehaviours by promiscuously listening to its next hop’s transmission. If a
Watchdog node overhears that its next node fails to forward the packet within a certain period
of time, it increases its failure counter. Whenever a node’s failure counter exceeds a
predefined threshold, the Watchdog node reports it as misbehaving. In this case, the Pathrater
cooperates with the routing protocols to avoid the reported nodes in future transmission.
Many following research studies and implementations have proved that the Watchdog scheme
is efficient. Furthermore, compared to some other schemes, Watchdog is capable of detecting
malicious nodes rather than links.
B.TWOACK: The main purpose of TWOACK is to solve the weakness of Watchdog such as
receiver collision and limited transmission power also TWOACK can detects misbehaving
links by acknowledging every data packets transmitted over each three consecutive nodes
along the packet the from the source to destination [8].Upon retrieval of a packet, each node
along the route is required to send back an acknowledgement packet to the node that is two
hops away from it down the route. TWOACK work on routing protocols such as Dynamic
Source Routing (DSR)[5].
C. AACK: Adaptive ACKnowledgement (AACK) new scheme proposed by Sheltami et al.
[6] based on TWOACK. AACK is a network layer based scheme which can be considered as
a combination TWOACK (identical to TWOACK) and end to end acknowledgement scheme.
As compared to TWOACK, AACK significantly reduced network overhead while still
capable of maintaining or surpassing the same network throughput [9].
System Description:
EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and
misbehavior report authentication (MRA). In order to distinguish different packet types in
different schemes, we included a 2-b packet header in EAACK. According to the Internet
draft of DSR [11], there is 6 b reserved in the DSR header. In EAACK, we use 2 b of the 6 b
to flag different types of packets.
A. ACK: ACK is basically an end-to-end acknowledgment scheme. It acts as a part of the
hybrid scheme in EAACK, aiming to reduce network overhead when no network Misbehavior
is detected. In ACK mode, node S first sends out an ACK data packet Pad1 to the destination
node D. If all the intermediate nodes along the route between nodes S and D are cooperative
and node D successfully receives Pad1, node D is required to send back an ACK
acknowledgment packet Pak1 along the same route but in a reverse order. Within a predefined
time period, if node S receives Pak1, then the packet transmission from node S to node D is
successful. Otherwise, node S will switch to S-ACK mode by sending out an S-ACK data
packet to detect the misbehaving nodes in the route.
B. S-ACK: The S-ACK scheme is an improved version of the TWOACK scheme proposed.
The principle is to let every three consecutive nodes work in a group to detect misbehaving
nodes. For every three consecutive nodes in the route, the third node is required to send an S-
ACK acknowledgment packet to the first node. The intention of introducing S-ACK mode is
to detect misbehaving nodes in the presence of receiver collision or limited transmission
power. In S-ACK mode, the three consecutive nodes (i.e., F1, F2, and F3) work in a group to
4. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
detect misbehaving nodes in the network. Node F1 first sends out S-ACK data packet Psad1
to node F2. Then, node F2 forwards this packet to node F3. When node F3 receives Psad1, as
it is the third node in this three-node group, node F3 is required to send back an S-ACK
acknowledgment packet Psak1 to node F2. Node F2 forwards Psak1 back to node F1. If node
F1 does not receive this acknowledgment packet within a predefined time period, both nodes
F2 and F3 are reported as malicious. Moreover, a misbehaviour report will be generated by
node F1 and sent to the source node S.
C. MRA: The MRA scheme is designed to resolve the weakness of Watchdog when it fails to
detect misbehaving nodes with the presence of false misbehaviour report. The false
misbehaviour report can be generated by malicious attackers to falsely report innocent nodes
as malicious. This attack can be lethal to the entire network when the attackers break down
sufficient nodes and thus cause a network division. The core of MRA scheme is to
authenticate whether the destination node has received the reported missing packet through a
different route. To initiate the MRA mode, the source node first searches its local knowledge
base and seeks for an alternative route to the destination node. If there is no other that exists,
the source node starts a DSR routing request to find another route. Due to the nature of
MANETs,
D. Digital Signature: As discussed before, EAACK is an acknowledgment-based IDS. All
three parts of EAACK, namely, ACK, S-ACK, and MRA, are acknowledgment-based
detection schemes. They all rely on acknowledgment packets to detect misbehaviour in the
network. Thus, it is extremely important to ensure that all acknowledgment packets in
EAACK are authentic and untainted. Otherwise, if the attackers are smart enough to forge
acknowledgment packets, all of the three schemes will be vulnerable. With regard to this
urgent concern, we incorporated digital signature in our proposed scheme. In order to ensure
the integrity of the IDS, EAACK requires all acknowledgment packets to be digitally signed
before they are sent out and verified until they are accepted. However, we fully understand the
extra resources that are required with the introduction of digital signature in MANETs. To
address this concern, we implemented both DSA [33] and RSA [23] digital signature schemes
in our proposed approach. The goal is to find the most optimal solution for using digital
signature in MANETs.
Fig.1 ACK scheme: The destination node is required to send back an acknowledgment
packet to the source node when it receives a new packet.
5. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
Proposed Work:
Proposed System:
Fig.2: Proposed System Architecture
Current node: If an attacker sends any packet to gather information through this system,
Home agent calls the classifier construction to find out the attacks. If an attack has been
occurred, it will filter the respective system from the global networks.
Home agent: It is present in every system and it collects information about its system from
application layer to network layer.
Neighbouring node: In this any system in the network transfer any information to some other
system, it broadcast through intermediate system. Before it transfer the message it send
mobile agent to the neighbouring node.
Data collection: This module is used for each anomaly detection subsystem to collect the
values of features for corresponding layer in a system. Normal profile is created using the data
collected during the normal scenario and attack data is collected during the attack scenario.
Data process: Data pre-processing is a technique to process the information with the test train
data. The audit data is collected in a file and it is smoothed so that it can be used for anomaly
detection. In the entire layer anomaly detection system, the above mentioned preprocessing
technique is used.
Local integration: This module concentrate on self system and it find out the local anomaly
attacks. Every system under that wireless network follows the same methodology to provide a
secure global network.
Global integration: Global integration module is used to find the intrusion result for entire
network. The aim of this module is to consider the neighbour node(s) result for taking
decision towards response module.
DSA Algorithm: In EAACK, Digital Signature is used to prevent the attackers from
acknowledgment packets. All the parts of EAACK scheme (ACK, S-ACK, MRA) are
acknowledgement based detection schemes. They all are relay on the ACK packets to detect
malicious node in MANET network. Thus it is extremely vital to ensure that all
acknowledgement packets in EAACK are authentic and contaminated. In another way, if the
attackers are insolent enough to forge acknowledge packet all the three schemes will be
vulnerable. To overcome this problem, we use Digital Signature Algorithm (DSA) [7] in IDS.
To ensure the integrity of IDS, EAACK requires to all the ACK packets to be digitally signed
before they are send out and verified when they are accepted by the receiver.
6. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
Step 1: A fixed length message is digested by using hash function H for every message m,
mathematically this can described as: H (m) =d
Step 2: The sender Alice needs to apply its own private key Pr-Alice on the message digest d
and produces result signature SigAlice, which is attached to message m and Alice’s private key.
SPr-Alice (d) = SigAlice
The sender Alice is obliged to always keep her private key Pr-Alice as a secret without
concealed to anyone else. Otherwise, if the attacker Eve gets this secret private key, she can
intercept the message and easily forge malicious messages with Alice’s signature and send
them to Bob. As these malicious message signed by Alice, Bob sees them as legit and
authentic messages from Alice. Thus, Eve can attacks on the entire network and generate
malicious attacks to Bob.
Step 3: Alice can send message m along with the signature SigAlice to Bob via an unsecured
channel. Bob then decrypts the received message m’ against the pre agreed hash function H to
get the message digest d’. This process can be generalized as,H (m’) =d’
Step 4: Bob can verify the signature by applying Alice’s public key Pk-Alice on SigAlice ,by
using SPr-Alice (SigAlice) = d
Step 5: If d == d’ then it is original message m’ transmitted through an unsecured channel is
indeed sent from Alice and the message it itself is intact.
Result
1) Simulation Results—Scenario 1: In scenario 1, malicious nodes drop all the packets
that pass through it. Fig.3 shows the simulation results that are based on PDR. In Fig.
3, we observe that all acknowledgment-based IDSs perform better than the Watchdog
scheme. Our proposed scheme EAACK surpassed Watchdog’s performance by 21%
when there are 20% of malicious nodes in the network. From the results, we conclude
that acknowledgment-based schemes, including TWOACK, AACK, and EAACK, are
able to detect misbehaviours with the presence of receiver collision and limited
transmission power. However, when the number of malicious nodes reaches 40%, our
proposed scheme EAACK’s performance is lower than those of TWOACK and
AACK. We generalize it as a result of the introduction of MRA scheme, when it takes
too long to receive an MRA acknowledgment from the destination node that the
waiting time exceeds the predefined threshold. The simulation results of RO in
scenario 1 are shown in Fig. 4. We observe that DSR and Watchdog scheme achieve
the best performance, as they do not require acknowledgment scheme to detect
misbehaviors. For the rest of the IDSs, AACK has the lowest overhead. This is largely
due to its hybrid architecture, which significantly reduces network overhead. Although
EAACK requires digital signature at all acknowledgment process, it still manages to
maintain lower network overhead in most cases. We conclude that this happens as a
result of the introduction of our hybrid scheme.
2)
Fig. 3. Simulation results for scenario 1—PDR.
Fig. 4. Simulation results for scenario 1—RO.
7. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
2) Simulation Results—Scenario 2: In the second scenario, we set all malicious nodes to
send out false misbehavior report to the source node whenever it is possible. This scenario
setting is designed to test the IDS’s performance under the false misbehavior report. Fig. 5
shows the achieved simulation results based on PDR. When malicious nodes are 10%,
EAACK performs 2% better than AACK and TWOACK. When the malicious nodes are at
20% and 30%, EAACK outperforms all the other schemes and maintains the PDR to over
90%. We believe that the introduction of MRA scheme mainly contributes to this
performance. EAACK is the only scheme that is capable of detecting false misbehavior
report. In terms of RO, owing to the hybrid scheme, EAACK maintains a lower network
overhead compared to TWOACK in most cases, as shown in Fig. 6. However, RO rises
rapidly with the increase of malicious nodes. It is due to the fact that more malicious nodes
require a lot more acknowledgment packets and digital signatures.
Fig. 5. Simulation results for scenario 2—PDR. Fig. 6. Simulation results for scenario 2—RO.
3) Simulation Results—Scenario 3: In scenario 3, we provide the malicious nodes the ability
to forge acknowledgment packets. This way, malicious nodes simply drop all the packets that
they receive and send back forged positive acknowledgment packets to its previous node
whenever necessary. This is a common method for attackers to degrade network performance
while still maintaining its reputation. The PDR performance comparison in scenario 3 is
shown in Fig. 7. We can observe that our proposed scheme EAACK outperforms TWOACK
and AACK in all test scenarios. We believe that this is because EAACK is the only scheme
which is capable of detecting forged acknowledgment packets. Fig. 8 shows the achieved RO
performance results for each IDS in scenario 3. Regardless of different digital signature
schemes adopted in EAACK, it produces more network overhead than AACK and TWOACK
when malicious nodes are more than 10%. We conclude that the reason is that digital
signature scheme brings in more overhead than the other two schemes.
Fig. 7. Simulation results for scenario 3—PDR. Fig. 8. Simulation results for scenario 3—RO.
8. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
CONCLUSION
In this paper we have studied various IDS’s in MANET, with their merits and demerits. Our
proposed IDS IEAACK scheme removes the weakness of watchdog approach (such as
receiver collision, limited transmission power etc) and provides a secure end to end
acknowledgement for all the nodes. Also we studied the digital signature algorithm is used to
provide authentication of data and validating the sender. In the future, we plan to follow
hybrid cryptography techniques to reduce the network overhead caused by digital signature.
References
[1] Elhladi M. Shakshuki, Nan Kang and Tarek R. Sheltami,” EAACK—A Secure
Intrusion-Detection System for MANETs“, in IEEE Transactions ON Industerial Electronics,
vol. 60, NO. 3, MARCH 2013.
[2] G. Jayakumar and G Gopinath,”Ad hoc mobile wireless networks routing
protocol-A review”, J Comput, Sci., vol. 3, no.8, pp.574-582,2007.
[3] N. Nasser and Y. Chen,” Enhanced intrusion detection systems for discovering
malicious nodes in mobile ad hoc network”, in Proc. IEEE Int.Conf. Commun., Glasgow,
Scotland, Jun. 24–28, 2007, pp. 1154–1159.
[4] R. Rivest, A. Shamir, and L. Adleman,”A Method for Obtaining Digital
Signatures and Public-key Cryptosystems. In the Communications of ACM” , vol .20,pp 120-
126,1978.
[5] D. Johnson and D. Maltz,” Dynamic Source Routing in ad hoc wireless
networks”, in Mobile Computing. Norwell, MA: Kluwer, 1996, ch.5, pp. 153-181.
[6] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis.”Secure
Routing and Intrusion Detection in Ad hoc Networks”, In the Proceedings of 3rd
International Conference on Pervasive Computing and Communications, pp. 191-199, 2005.
[7] N. Kang, E. Shakshuki , and T. Sheltami ,” Detecting misbehaving nodes in
MANETs”, in Proc. 12th Int. Conf. ii WAS, Paris, France, Nov. 8-10,2010, pp. 216-222.
[8] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-
based approach for the detection of routing misbehavior in MANETs”, IEEE Trans. Mobile
Compu.,vol. 6, no.5, pp. 536-550,May 2007.
[9] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud ,” Video
transmission enhancement in presence of misbehaving nodes in MANETs” Int. J. Multimedia
Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
[10] A. Singh, M. Maheshwari, and N. Kumar, "Security and trust management in
MANET ", in Communications in Computer and Information Science, vol. 147. New York:
Springer-Verlag, 2011, pt. 3, pp. 384-387.
[11] B. Sun “Intrusion detection in mobile ad hoc networks”, Texas A&M Univ.,
College Station, TX, 2004.
[12] Prof. Anushka K. Rajyalakshmi G. V., ”Secure Adaptive Acknowledgment
Algorithm for Intrusion Detection System”, International Jouranal of Engineering Research
in Management & Technology(IJERMT), India, ISSN: 2278-9359,vol.2, issue 7.
[13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad
hoc networks”, in Proc. 6th Annu. Int. Conf. Mobile Comput. Net. , Boston, MA, 2000, pp.
255–265.
[14] R.H. Akbani, S. Patel , D.C. Jinwala, ”DoS Attacks in Mobile Ad Hoc Networks: A
Survey”, The proceedings of the Second International Meeting of Advanced Computing
&Communication Technologies(ACCT), pp. 535-541, Rohtak, Haryana, India. 2012. – here1.
9. NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT]
ISSN: 2394-3696
VOLUME 2, ISSUE 3 MARCH2015
[15] Akshatha Y, Dr. Rashmi M. Jogdand, “A Study on Enhanced Adaptive Acknowledge
(EAACK) Scheme – A Secure Intrusion Detection System in Wireless MANETs”,
International Journal of Latest Trend in Engineering and Technology (IJLTET), Special
Issue- IDEAS-2013, ISSN: 2278-621X.