This document summarizes a research paper that proposes a new trust management scheme to enhance security in mobile ad hoc networks (MANETs). The scheme uses uncertain reasoning to evaluate trust values based on direct observation from a node and indirect observation from neighboring nodes. Trust is evaluated using Bayesian inference for direct observation and Dempster-Shafer theory for indirect observation. Simulation results show the scheme improves throughput, packet delivery ratio, and security with a slight increase in delay and overhead compared to the standard Ad Hoc On-Demand Distance Vector (AODV) routing protocol.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
Security is the major challenge for Wireless Sensor Networks (WSNs). The sensor nodes are deployed in non controlled environment, facing the danger of information leakage, adversary attacks and other threats. Trust and Reputation models are solutions for this problem and to identify malicious, selfish and compromised nodes. This paper aims to evaluate varying collusion effect with respect to static (SW), dynamic (DW), static with collusion (SWC), dynamic with collusion (DWC) and oscillating wireless sensor networks to derive the joint resultant of Eigen Trust Model. An attempt has been made for the same by comparing aforementioned networks that are purely dedicated to protect the WSNs from adversary attacks and maintain the security issues. The comparison has been made with respect to accuracy and path length and founded that, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario. Additionally, it consumes more energy and resources in oscillating and collusive environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
Security is the major challenge for Wireless Sensor Networks (WSNs). The sensor nodes are deployed in non controlled environment, facing the danger of information leakage, adversary attacks and other threats. Trust and Reputation models are solutions for this problem and to identify malicious, selfish and compromised nodes. This paper aims to evaluate varying collusion effect with respect to static (SW), dynamic (DW), static with collusion (SWC), dynamic with collusion (DWC) and oscillating wireless sensor networks to derive the joint resultant of Eigen Trust Model. An attempt has been made for the same by comparing aforementioned networks that are purely dedicated to protect the WSNs from adversary attacks and maintain the security issues. The comparison has been made with respect to accuracy and path length and founded that, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario. Additionally, it consumes more energy and resources in oscillating and collusive environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attacks and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts.
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
Wireless Sensor Networks consists of sensor nodes
that are capable of sensing the information and maintaining
security. In this paper, an Anonymity and Trust Management
Scheme applied to Clustered Wireless Sensor Networks
(ATMC) is proposed which enhances the security level. It also
provides a stable path for communication. It is observed that
the performance of the network is better than existing schemes
through simulation
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...paperpublications3
Abstract: Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits. The absence of an online trusted third party implies that existing WSN trust management schemes are not applicable to UWSNs. In this paper, a trust management scheme for UWSNs to provide dynamic trust management is proposed. For trust data storage, geographic hash table is employed, it also helps to identify storage nodes and to significantly decrease storage cost. In order to mitigate trust fluctuations caused by environmental factors a subjective logic based consensus techniques is used. In this paper a set of trust similarity functions are exploited to detect trust outliers.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
A Wireless Sensor Network (WSN) is an autonomous and self-organizing network without any pre-established
infrastructure which offers many advantages in military applications and emergency areas. Source Localization is one of the important monitoring tasks of the WSN. It provides the accurate position of the source using various positioning technologies. In this paper an Impulse Radio Ultra wideband (IR-UWB) positioning system with a two-antenna receiver is used to estimate the Time of arrival (TOA) and Direction of arrival (DOA) positioning parameters. A two dimensional (2D) multiple signal classification (MUSIC) algorithm is used to estimate these parameters but it has much higher computational
complexity and also requires 2D spectral peak search. A Successive Multiple signal classification (MUSIC) algorithm is proposed in this paper which estimates the parameters jointly and gets paired automatically. It avoids the two dimensional peak searches and reduces the complexity compared to the existing methods 2D-MUSIC, Root-MUSIC, Matrix Pencil algorithm, Propagator method and Estimation of Signal Parameters via Rotational Invariance Techniques (ESPRIT) algorithm.
Keywords--Time of arrival (TOA), Direction of arrival (DOA), Impulse Radio Ultra Wideband (IR-UWB), Multiple
Signal Classification (MUSIC).
Multilevel inverters have become more popular over the years in electric high power application
with the promise of less disturbances and the possibility to function at lower switching frequencies than
ordinary two-level inverters. This paper presents information about several multilevel inverter topologies,
such as the Neutral-Point Clamped Inverter and the Cascaded Multi cell Inverter. These multilevel
inverters will also be compared with two-level inverters in simulations to investigate the advantages of
using multilevel inverters. Modulation strategies, component comparison and solutions to the multilevel
voltage source balancing problem will also be presented in this work.
Keywords — multilevel, Neutral-clamped, PWM.
With the improvements in Image acquisition systems there is an increasing concentration in the direction of
High Dynamic Range (HDR) images where the amount of intensity levels varies among 2 to 10,000. With these
numerous intensity levels the exact representation of luminance variations is entirely possible. But, because the
normal display devices are shaped to exhibit Low Dynamic Range (LDR) images, there is necessary to translate
HDR images to LDR images without down significant image structures in HDR images. In this paper four TMOs
like Reinhard, Gamma and color correction TMOs are evaluated .In this paper two novel TMOs are projected.
Keywords — HDR, LDR, Tone mapping, Gamma correction.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts.
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
Wireless Sensor Networks consists of sensor nodes
that are capable of sensing the information and maintaining
security. In this paper, an Anonymity and Trust Management
Scheme applied to Clustered Wireless Sensor Networks
(ATMC) is proposed which enhances the security level. It also
provides a stable path for communication. It is observed that
the performance of the network is better than existing schemes
through simulation
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network Intrusion Detection System (A-NIDS) offers a way to find possible threats via deviation from the normal model. The analysis of network traffic based on time series model has the advantage of exploiting the relationship between packages within network traffic and observing trends of behaviors over a period of time. It will generate new sequences with good features that support anomaly detection in network traffic and provide the ability to detect new attacks. Besides, an anomaly detection technique, which focuses on the normal data and aims to build a description of it, will be an effective technique for anomaly detection in imbalanced data. In this paper, we propose a combination model of Long Short Term Memory (LSTM) architecture for processing time series and a data description Support Vector Data Description (SVDD) for anomaly detection in A-NIDS to obtain the advantages of them. This model helps parameters in LSTM and SVDD are jointly trained with joint optimization method. Our experimental results with KDD99 dataset show that the proposed combined model obtains high performance in intrusion detection, especially DoS and Probe attacks with 98.0% and 99.8%, respectively.
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...paperpublications3
Abstract: Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits. The absence of an online trusted third party implies that existing WSN trust management schemes are not applicable to UWSNs. In this paper, a trust management scheme for UWSNs to provide dynamic trust management is proposed. For trust data storage, geographic hash table is employed, it also helps to identify storage nodes and to significantly decrease storage cost. In order to mitigate trust fluctuations caused by environmental factors a subjective logic based consensus techniques is used. In this paper a set of trust similarity functions are exploited to detect trust outliers.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
A Wireless Sensor Network (WSN) is an autonomous and self-organizing network without any pre-established
infrastructure which offers many advantages in military applications and emergency areas. Source Localization is one of the important monitoring tasks of the WSN. It provides the accurate position of the source using various positioning technologies. In this paper an Impulse Radio Ultra wideband (IR-UWB) positioning system with a two-antenna receiver is used to estimate the Time of arrival (TOA) and Direction of arrival (DOA) positioning parameters. A two dimensional (2D) multiple signal classification (MUSIC) algorithm is used to estimate these parameters but it has much higher computational
complexity and also requires 2D spectral peak search. A Successive Multiple signal classification (MUSIC) algorithm is proposed in this paper which estimates the parameters jointly and gets paired automatically. It avoids the two dimensional peak searches and reduces the complexity compared to the existing methods 2D-MUSIC, Root-MUSIC, Matrix Pencil algorithm, Propagator method and Estimation of Signal Parameters via Rotational Invariance Techniques (ESPRIT) algorithm.
Keywords--Time of arrival (TOA), Direction of arrival (DOA), Impulse Radio Ultra Wideband (IR-UWB), Multiple
Signal Classification (MUSIC).
Multilevel inverters have become more popular over the years in electric high power application
with the promise of less disturbances and the possibility to function at lower switching frequencies than
ordinary two-level inverters. This paper presents information about several multilevel inverter topologies,
such as the Neutral-Point Clamped Inverter and the Cascaded Multi cell Inverter. These multilevel
inverters will also be compared with two-level inverters in simulations to investigate the advantages of
using multilevel inverters. Modulation strategies, component comparison and solutions to the multilevel
voltage source balancing problem will also be presented in this work.
Keywords — multilevel, Neutral-clamped, PWM.
With the improvements in Image acquisition systems there is an increasing concentration in the direction of
High Dynamic Range (HDR) images where the amount of intensity levels varies among 2 to 10,000. With these
numerous intensity levels the exact representation of luminance variations is entirely possible. But, because the
normal display devices are shaped to exhibit Low Dynamic Range (LDR) images, there is necessary to translate
HDR images to LDR images without down significant image structures in HDR images. In this paper four TMOs
like Reinhard, Gamma and color correction TMOs are evaluated .In this paper two novel TMOs are projected.
Keywords — HDR, LDR, Tone mapping, Gamma correction.
Recently, rates of vehicle ownership have risen globally, exacerbating problems including air pollution,
lack of parking, and traffic congestion. While many solutions to these problems have been proposed,
Carpooling is one of the most effective solutions to this problems Recently, several carpooling
platforms have been built on cloud computing systems, with originators posting online list of
departure/arrival points and schedules from which participants can search for rides that match their
needs. In this paper, an improved carpool system is described in detail and called the improved
intelligent carpool system (IICS), which provides car poolers the use of the carpool services via a smart
handheld device anywhere and at any time. This IICS Consist the geographical, traffic, and societal
information and used to manage requests and find minimum route. We apply advanced genetic-based
carpool route and matching algorithm (AGCRMA) for this multiobjective optimization problem called
the carpool service problem (CSP).
The systems connected to the network are vulnerable to many malicious programs which threatens the
confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses, adware,
scareware exists. A new malicious program has gained momentum known as spyware. Traditional techniques such as
Signature-based Detection and Heuristic-based Detection have not performed well in detecting Spyware. Based on the recent
studies it has been proven that data mining techniques yield better results than these traditional techniques. This paper presents
detection of spyware using data mining approach. Here binary feature extraction takes place from executable files, which is
then followed by feature reduction process so that it can be used as training set to generate classifiers. Hence, the generated
classifiers classify new and previously unseen binaries as benign files or spywares.
Abstract:
This paper reports on the design of an ultra wideband power amplifier using 0.25um GaN- HEMT Technology device obtained from the Triquint Semiconductor. There is huge interest in transistors based on Gallium Nitride in recent years due to its high breakdown voltage and its capability to operate in High frequency applications. The load pull analysis is carried out to obtain both the required source and load impedances. The
power amplifier with over 10W output power and 42% power added efficiency in the frequency range of 3-5GHz is presented in this paper. The PA is designed using a computer aided design tool called Advanced System Design (ADS).ADS provide two different simulation opportunities. These are referred as schematic simulation and
electromagnetic simulation called Momentum. Schematic Simulations are performed on the proposed PA in this paper.
Keywords:- GaN-HEMT Technology, Load pull analysis, Advanced system design(ADS)
A hybrid power system which consists of PV-arrays and wind turbines with energy storing devices (battery
bank) and power electronic devices has been discussed in this paper to achieve an efficient and cost
competitive system configuration so that hybrid power sources could improve the life of people especially in
rural areas where electricity from the main grid has not reached yet
Key words: Renewable energy, PV panel, Battery, Hybrid system
The complexity of landscape pattern mining is well stated due to its non-linear spatial image formation and
inhomogeneity of the satellite images. Land Ex tool of the literature work needs several seconds to answer input
image pattern query. The time duration of content based image retrieval depends on input query complexity. This
paper focuses on designing and implementing a training dataset to train NML (Neural network based Machine
Learning) algorithm to reduce the search time to improve the result accuracy. The performance evolution of
proposed NML CBIR (Content Based Image Retrieval) method will be used for comparison of satellite and natural
images by means of increasing speed and accuracy.
Keywords: Spatial Image, Satellite image, NML, CBIR
This paper presents interfaces required in wireless sensor node (WSN) implementation. Here keyboard,
LCD, ADC and Wi-Fi module interfaces are presented. These interfaces are developed as hardware prototypes in
the application of wireless sensor node as a single chip solution. Protocols of these interfaces have been described
with the help of their hardware simulations and synthesis reports.
The end application is proposed to monitor physical parameters remotely using wireless protocol. The sensor node
has to be implemented on Field Programmable Gate Array (FPGA). The proposed node design is reconfigurable,
and hence flexible in context of future modification. Xilinx platform is proposed for synthesis, simulation and
implementation.
Keywords — FPGA, wireless sensor node.
Wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes. WSNs are
widely applicable in monitoring and control of environmental parameters such as temperatures, sound,
pressure, etc. Sensor nodes cooperatively pass data among themselves in the network. Sometimes it is
necessary to update data or program image through wireless links after they are deployed in order to adjust
configuration parameters of sensors or distribute management commands and queries to the sensor nodes. In many applications these code updates need to be kept secret. Authentication and confidentiality play a very
important role in providing secure code updates. Sometimes an adversary may transmit forged data, forcing
nodes to waste their energy in identifying it as invalid. And also adversaries may sometimes repeatedly send
invalid program image requests to its neighbours making them exhaust their energy. To avoid such attacks
authentication of nodes need to be made and code updates need to be kept confidential.
Keywords— Wireless sensor networks, secure code updates, confidentiality, authentication, denial of
service.
Big data is to be implemented in as full way in real-time; it is still in a research. People
need to know what to do with enormous data. Insurance agencies are actively participating for the
analysis of patient's data which could be used to extract some useful information. Analysis is done in
term of discharge summary, drug & pharma, diagnostics details, doctor’s report, medical history,
allergies & insurance policies which are made by the application of map reduce and useful data is
extracted. We are analysing more number of factors like disease Types with its agreeing reasons,
insurance policy details along with sanctioned amount, family grade wise segregation.
Keywords: Big data, Stemming, Map reduce Policy and Hadoop.
Happy Hours is a time-limited offer strategy which attracts people by providing maximum
discounts. People are not aware about these offers going in their nearby areas because of their busy
schedule. Mobile device is ubiquity available with customers everywhere and all the time which can help
in personalizing advertisements with the help of spatial information and various other parameters.
Existing systems use SMS to notify users about advertisements and SMS has limitations. Traditional
systems use request-response pattern where user needs to always submit query which ultimately
degrades user experience. Also mobile visualization ends up with too much too visualize in a too little
display area. Our proposed system considers all of the above issues and leverages the strengths of
proactive model and context-aware personalized dashboard for Happy Hours and their Deals
recommendations.
This paper present design of new type of electromagnetic damper or eddy current damper
which has advantages of no mechanical contact, higher reliability and stability, high efficiency and
compactness. By using this damper we can minimized damping of different masses and thereby damping
coefficient. The damper is composed of neodymium iron boron grade N 50 magnet .By using this damper I
found greater difference in damping when experimental result are compared with analytical result.
The objective of the paper is to investigate the possibility of using a 2DOF controller in disturbance rejection associated with delayed double integrating processes. The effect of time delay of the process in a range between 0.1 and 0.9 seconds is considered. The controller is tuned using MATLAB optimization toolbox with three forms of the objective function in terms of the error between the step time response of the closed-loop control system and the desired zero value. Using the proposed controller with the fractional delayed double integrating process indicates the robustness of the controller in the time delay range used. The 2DOF controller is able to complete with the PID plus first-order lag controller , but it can not compete with other types of controllers such as the I-PD and PD-PI controllers..
Keywords — Delayed double integrating process, 2DOF controller, controller tuning, MATLAB optimization toolbox, Control system performance.
This paper is addressed towards extraction of important words from conversations, with the
objective of utilizing these watchwords to recover, for every short audio fragment, a little number of
conceivably relatable reports, which can be prescribed to members, just-in-time. In any case, even a short
audio fragment contains a mixed bag of words, which are conceivably identified with a few topics; also,
utilizing automatic speech recognition (ASR) framework slips errors in the output. Along these lines, it is
hard to surmise correctly the data needs of the discussion members. We first propose a calculation to
remove decisive words from the yield of an ASR framework (or a manual transcript for testing) to
coordinate the potentially differing qualities of subjects and decrease ASR commotion. At that point, we
make use of a technique that to make many implicit queries from the selected keywords which will in
return produce list of relevant documents. The scores demonstrate that our proposition moves forward over
past systems that consider just word recurrence or theme closeness, and speaks to a promising answer for a
report recommender framework to be utilized as a part of discussions.
Optimizing completions in deviated and extended reach wells is a key to safe drilling and optimum
production, particularly in complex terrain and formations. This work summarizes the systematic methodology
and engineering process employed to identify and refine the highly effective completions solution used in ERW
completion system and install highly productive and robust hard wares in horizontal and Extended Reach Wells
for Oil and Gas. A case study of an offshore project was presented and discussed. The unique completion design,
pre-project evaluation and the integrated effort undertaken to firstly, minimize completion and formation damage.
Secondly, maximize gravel placement and sand control method .Thirdly, to maximize filter cake removal
efficiencies. The importance of completions technologies was identified and a robust tool was developed .More
importantly, the ways of deploying these tools to achieve optimal performance in ERW’s completions was done.
The application of the whole system will allow existing constraints to be challenged and overcome successfully;
these achievements was possible, by applying sound practical engineering principle and continuous optimization,
with respect to the rig and environmental limitation space and rig capacity.
Keywords: Well Completions , Deviated and Extended Rearch Wells , Optimization
This study was carried out to identify suitable sites for Industrial development at Giridih District in Jharkhand state using GIS-based multi-criteria evaluation (MCE) such as landuse/landcover, groundwater, geomorphology, slope, road proximity, rail proximity, river proximity factors. High resolution spatial data (Landsat7 ETM+) and seven thematic information layers were analyzed using ArcGIS 9.3 and ERDAS Imagine 9.2 softwares to identify suitable areas for establishing an industry in Giridhi District. The entire study focuses on GIS based Overlay Weight Ages. In this study landuse/landcover, groundwater, geomorphology, slope, road proximity, rail proximity, river proximity are the factors that were identified for the multi-criteria evaluation. Various thematic maps were generated using visual interpretation of Landsat7 ETM+ satellite data for every variable showing site suitability measured on a size of 1-10. Weights for every criterion are created by contrasting with one another based on their significance. The final suitability map was obtained using weighted overlay techniques and Spatial Analyst Tool. Outcome generated through the GIS analysis shows that 160.85 km2 areas is very highly suitable, 407.85 km2 area is moderately suitable; 4398.30 km2 area is less suitable, for industrial development.
The problem of controlling an unstable delayed double integrating process with fractional delay using a
feed forward first-order lag-lead compensator is studied. The effect of time delay of the process in a range between
0.1 and 0.9 seconds is considered. The compensator is tuned using MATLAB optimization toolbox with five forms
of the objective function in terms of the error between the step time response of the closed-loop control system and
the response steady-state value. Using the proposed compensator with the fractional delayed double integrating
process indicates the robustness of the compensator in the time delay range used with superior time-based
specifications compared with other technique based on PID controller.
Keywords — Delayed double integrating process with fractional delay, Feed forward lag-lead first-order
compensator, compensator tuning, MATLAB optimization toolbox, Control system performance.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSpijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by
explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the
method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
Cloud computing is the one of the emerging techniques to process the big data. Large collection of set or large
volume of data is known as big data. Processing of big data (MRI images and DICOM images) normally takes
more time compare with other data. The main tasks such as handling big data can be solved by using the concepts
of hadoop. Enhancing the hadoop concept it will help the user to process the large set of images or data. The
Advanced Hadoop Distributed File System (AHDF) and MapReduce are the two default main functions which
are used to enhance hadoop. HDF method is a hadoop file storing system, which is used for storing and retrieving
the data. MapReduce is the combinations of two functions namely maps and reduce. Map is the process of
splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, in medical fields
the experienced problems like machine failure and fault tolerance while processing the result for the scanned
data. A unique optimized time scheduling algorithm, called Advanced Dynamic Handover Reduce Function
(ADHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud introduction of
ADHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in
error percentage of the output image
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Colorectal cancer (CRC) has potential to spread within the peritoneal cavity, and this transcoelomic
dissemination is termed “peritoneal metastases” (PM).The aim of this article was to summarise the current
evidence regarding CRC patients at high risk of PM. Colorectal cancer is the second most common cause of cancer
death in the UK. Prompt investigation of suspicious symptoms is important, but there is increasing evidence that
screening for the disease can produce significant reductions in mortality.High quality surgery is of paramount
importance in achieving good outcomes, particularly in rectal cancer, but adjuvant radiotherapy and chemotherapy
have important parts to play. The treatment of advanced disease is still essentially palliative, although surgery for
limited hepatic metastases may be curative in a small proportion of patients.
Heat transfer in pipes is a distinctive kind of procedure employed in heat exchanger which transfers great
deal of heat because of the impact of capillary action and phase change heat transfer principle. Late improvement
in the heat pipe incorporates high thermal conductivity liquids like Nano liquids, fixed inside to extricate the most
extreme heat. This paper audits, impact of different factors, for example, thermal pipe tilt edge, charged measure
of working liquid, nano particles sort, size, and mass/volume part and its impact on the change of thermal
proficiency, thermal exchange limit and decrease in thermal protection. The Nano liquid arrangement and the
examination of its thermal attributes likewise have been investigated. The retained sun oriented vitality is
exchanged to the working liquid streaming in the pipe. The execution of the framework is affected by thermal
exchange from tube to working liquid, with least convective misfortunes, which must be considered as one of the
essential plan factor. In tube and channel streams, to improve the rate of heat exchange to the working liquid,
detached enlargement methods, for example, contorted tapes and swirl generators are employed from the fluid
flow path. The variation of heat transfer coefficient and pressure drop in the pipe flow for water and water based
Al2O3 Nano fluids at different volume concentrations and twisted tapes are studied.
Now-a-day’s pedal powered grinding machine is used only for grinding purpose. Also, it requires lots of efforts
and limited for single application use. Another problem in existing model is that it consumed more time and also has
lower efficiency. Our aim is to design a human powered grinding machine which can also be used for many purposes
like pumping, grinding, washing, cutting, etc. it can carry water to a height 8 meter and produces 4 ampere of electricity
in most effective way. The system is also useful for the health conscious work out purpose. The purpose of this technical
study is to increase the performance and output capacity of pedal powered grinding machine.
This project proposes a distributed control approach to coordinate multiple energy storage units
(ESUs) to avoid violation of voltage and network load constraints ESU as a buffer can be a promising
solution which can store surplus power during the peak generation periods and use it in peak load
periods.In ESU converters both active and reactive power are used to deal with the power quality
issues in distribution network ESU’s reactive power is proposed to be used for voltage support, while
the active power is to be utilized in managing network loading.
The steady increase in non-linear loads on the power supply network such as, AC variable speed drives,
DC variable Speed drives, UPS, Inverter and SMPS raises issues about power quality and reliability. In this
subject, attention has been focused on harmonics . Harmonics overload the power system network and cause
reliability problems on equipment and system and also waste energy. Passive and active harmonic filters are
used to mitigate harmonic problems. The use of both active and passive filter is justified to mitigate the
harmonics. The difficulty for practicing engineers is to select and deploy correct harmonic filters , This paper
explains which solutions are suitable when it comes to choosing active and passive harmonic filters and also
explains the mistakes need to be avoided.
This Paper is aimed at analyzing the few important Power System equipment failures generally
occurring in the Industrial Power Distribution system. Many such general problems if not resolved it may
lead to huge production stoppage and unforeseen equipment damages. We can improve the reliability of
Power system by simply applying the problem solving tool for every case study and finding out the root cause
of the problem, validation of root cause and elimination by corrective measures. This problem solving
approach to be practiced by every day to improve the power system reliability. This paper will throw the light
and will be a guide for the Practicing Electrical Engineers to find out the solution for every problem which
they come across in their day to day maintenance activity.
More from IJET - International Journal of Engineering and Techniques (20)
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
1. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 1
Dynamic High Secure Protocol for Mobile Adhoc
Network
Aravindan B1
, Dhivakar A2
, Shreehari V.V.3
1,2,3
(Computer Science and Engineering, Dhanalakshmi College Of Engineering, Chennai)
I. INTRODUCTION
With advances in wireless technologies and
mobile devices, mobile ad hoc networks (MANETs)
[1], [2] have become popular as a communication
technology in military environments such as the
establishment of communication networks used for
cordinating the military deployment among the
soldiers, vehicles, and operational command centers
[3]. There are many risks in these environments that
need to be considered seriously due to the
distinctive features of MANETs, including open
wireless transmission medium, distributed nature,
and lack of centralized infrastructure of security
protection [4]–[6]. Therefore, security in MANETs
is a challenging research topic [7]. There are two
classes of approaches that can safeguard MANETs:
prevention-based and detection-based approaches
[8]. The Prevention-based approaches are studied
comprehensively in MANETs [9]–[12]. One issue
of this approach is that the need of a centralized key
management infrastructure , which may not be
realistic in distributed networks such as MANETs.
In addition, this infrastructure will be the main
target of rivals in battlefields. If the infrastructure is
destroyed, then the whole network may be
paralyzed [13]. Although the
prevention-based approaches can prevent
misbehavior, there are still chances for a malicious
nodes to participate in the routing and disturb the
proper routing establishment. From the study of
design of security in wired networks,we can surely
say that multilevel security mechanisms are needed.
In MANETs, this is particularly true because of the
low physical security of mobile devices [14], [15].
Serving as the second wall of protection, detection-
based approaches can effectively help in identifying
the malicious activities [16]–[18]. Although there
has been research done on detectionbased
approaches based on trust in MANETs, most of the
existing approaches do not exploit the direct and
indirect observations (also called as the secondhand
information that is obtained from third-party nodes)
at the same time evaluating the trust of an observed
node. Moreover, indirect observation in most of the
approaches is only used to assess the worthiness of
the nodes, which are not in the range of the
observer node [19]. Therefore, inaccurate trust
values may also be derived. In addition, most
methods of trust evaluation from direct observation
[19], [20], do not differentiate data packets and
control packets. However, in MANETs, control
packets usually are more important than data
packets. In this paper, we interpret the trust as a
degree of belief that a node performs as expected.
We also recognize uncertainty in trust evaluation.
RESEARCH ARTICLE OPEN ACCESS
Abstract:
The working of MANET protocol, may compromise the security in it. In this paper, we propose a new key
exchange method to improve the security of MANETs. In this proposed mechanism we send the key through the
control packets instead data packets. By using this mechanism we can ensure that even if the intruder gets access to
the data packet he cannot decrypt it because there is no key associated with the packet. Brute force attack also
becomes infeasible because the packet is alive in the network for a less time.
Keywords—Mobile ad hoc networks (MANETs), security, trust management, uncertain reasoning.
2. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 2
Based on this understanding, we propose a trust
management scheme to enhance the security of
MANETs. The difference between our’s and
existing schemes is that we use uncertain reasoning
to derive trust values. It was initially proposed from
the artificial intelligence field to solve the problems
in expert systems, which had frequent
counterfactual results. The elasticity and flexibility
of uncertain reasoning make it successful in many
fields, such as expert systems and data fusion. The
contributions of this paper are outlined as follows.
We propose a key exchange scheme that enhances
the security in MANETs.In our proposed scheme,
the trust model has two fields: trust from direct
observation and trust from indirect observation. In
direct observation from an observer node, the trust
value is obtained using Bayesian inference, which is
a type of a uncertain reasoning when the full
probability model can be defined. Whereas, with
indirect observation from neighbor nodes of the
observer node, the trust value can be derived using
the Dempster–Shafer theory (DST), which is
another type of uncertain reasoning when the
proposition of interest can be obtained by an
indirect method.
• The proposed scheme differentiates control
packets and data packets and excludes the
other causes that result in dropping packets,
such as unreliable wireless connections and
buffer overflows.
• We evaluate the proposed scheme in a
MANET routing protocol, i.e., the Ad hoc
On Demand Distance Vector Routing
(AODV), with the Qualnet simulator.
Extensive simulation results show the
effectiveness of our proposed scheme.
Throughput and packet delivery ratio (PDR)
can be improved significantly, with slight
increase in average end-to-end delay and
overhead of messages.
The remainder of this paper is organized as
follows. Related work is presented in Section II.
The trust model and its two components are
presented in Section III. The performance and
effectiveness of our scheme are evaluated and
discussed in Section V. Finally, we conclude this
paper in Section VI.
II. RELATED WORK
Trust-based security schemes are one of the
important detection-based methods in MANETs,
which have been studied recently [8], [19]. In [19]
and [20], the trust value of a node based on direct
observation is derived using Bayesian methodology.
Sun et al. regard trust as uncertainty that the
observed node performs a task correctly, and
entropy is used to formulate a trust model and
evaluate trust values by direct examination.
Compared with direct observation in trust
evaluation, indirect observation can be important to
assess the trust of observed nodes. For example, the
collection of testimonies from neighbor nodes can
be used to detect the situation where a hostile node
performs well to one observer, while performing
poorly in accordance to another node. The DST is
regarded as a useful mechanism in uncertain
reasoning and is most widely used in expert systems
and multiagent systems. In, the DST is used in
sensor fusion. Intrusion detection systems (IDSs)
[8],apply the DST to assess unreliable information
from IDS sensors.
In this paper, we use the uncertain reasoning
theory from the field of artificial intelligence to
evaluate the trust of nodes in MANETs. Uncertainty
is an old setback from the gambler’s world. This
problem can be handled by probability theory.
Reasoning is an-other vital behavior in day to day
life. A lot of researchers, even Aristotle (384 BCE–
322 BCE) (Greek Philosopher), have tried to
understand and formulate it. Reasoning based on
uncertainty has been prosperous in the artificial
intelligence community due to the development of
probability theory and symbolic logic.
Probabilistic reasoning is introduced to intelligence
systems, which is used to tackle the exceptions in
automatic reasoning. To surmount the drawbacks of
traditional rule-based systems, which are based on
truth tables with no exceptions, probabilistic
reasoning is proposed, which describes the
uncertainty of knowledge is considered and
described as subsets of “possible worlds.”
Probabilistic reasoning can be used in different
areas, from artificial intelligence to philosophy,
cognitive psychology, and management science. In
the field of security in MANETs, we find that this
3. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 3
theory is very suitable for trust evaluation based on
the trust interpretation in this paper. Bayesian
inference and Dempster–Shafer evidence theory are
two approaches in uncertain reasoning. We adopt
them to assess the trust of nodes by direct and
indirect observations. Trust-based security systems
are also considered in different network
architectures, e.g., wireless sensor networks,
vehicular ad hoc networks, cooperative wireless
networks, etc. Although different types of networks
have different specific characteristics, the planned
trust model based on direct and indirect
observations is general enough and can be
customized to a particular network. To make it
easier to apprehend the proposed trust model, we
present an overview of AODV and its
vulnerabilities. AODV is a reactive routing protocol.
It has four types of control messages for route
maintenance, i.e., a HELLO message , RREQ ,
RREP and RERR . Neighborhood discovery is used
to facilitate a node’s detection of its onehop
neighbors in radio range. HELLO messages, which
can carry link status such as symmetric, asymmetric,
or multipoint relay, are used in the neighborhood
discovery procedure. Through periodically sending
HELLO messages , a node can thus establish the
bidirectional (symmetric) links with its one-hop
neighbors . RREQ - A route request message is
transmitted by a node requiring a route to a node.As
an optimization AODV uses an expanding ring
technique when flooding these messages. Every
RREQ carries a time to live (TTL) value that states
for how many hops this message should be
forwarded. This value is set to a predefined value at
the first transmission and increased at
retransmissions. Retransmissions occur if no replies
are received.Data packets waiting to be transmitted
(i.e. the packets that initiated the RREQ) should be
buffered locally and transmitted by a FIFO
principal when a route is set. RREP - A route reply
message is unicasted back to the originator of a
RREQ if the receiver is either the node using the
requested address, or it has a valid route to the
requested address. The reason one can unicast the
message back, is that every route forwarding a
RREQ caches a route back to the originator.RERR -
Nodes monitor the link status of next hops in active
routes. When a link breakage in an active route is
detected, a RERR message is used to notify other
nodes of the loss of the link. In order to enable this
reporting mechanism, each node keeps a ``precursor
list'', containing the IP address for each its
neighbors that are likely to use it as a next hop
towards each destination.
Consequently, AODV is vulnerable to various
attacks such as wormhole attacks, blackhole attacks,
spoofing, jamming, etc. In this paper, our scheme is
a security mechanism that mainly protects AODV
against two types of misbehavior: dropping of
packets and modification of packets. The packet
dropping attack is also called a blackhole attack,
which is a type of denial-of-service attacks.
Modification of packets may have a significant
impact on a topology map [9]. By the use of trust
evaluation in our scheme, malicious nodes that
intentionally drop or modify packets can be
detected and kept away.
III. TRUST MODEL IN MOBILE AD HOC
NETWORK
Here, we intend to describe the definition and
properties of trust in MANETs. Based on the
definition, we represent the trust model that is used
to devise the trust between two nodes in MANETs
and present a framework of the proposed scheme.
A. Definition and Properties of Trust
Trust has different interpretations in different
disciplines from psychology to economy. The
description of trust in MANETs is similar to the
explanation in sociology, where trust is explained as
degrees of the belief that a node in a network will
carry out tasks that it should. Due to the specific
characteristics of MANETs, trust in MANETs has
the following five essential properties: subjectivity,
dynamicity, nontransitivity, asymmetry, and context
dependence. Subjectivity implies that an observer
node has a right to determine the trust of an
observed node. Different observer nodes may have
dissimilar trust values of the same observed node.
Dynamicity means that the trust of a node should be
altered depending on its behaviors. Nontransitivity
means that, if node A trusts node B and node B
trusts node C, then node A may not essentially trust
node C. Asymmetry means that if node A trusts
node B, then node B does not automatically trust
4. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 4
node A. Context dependence means that trust
assessment is commonly based on the activities of a
node. Different aspects of events can be evaluated
by different trust. For example, if a node has less
amount of power, then it may not be able to forward
the messages to its neighbors. In this situation, the
trust of power in this node will reduce, but the trust
of security in this node will not be changed due to
its state. Reputation is another essential model in
trust evaluation. Reputation reflects the public
opinions from members in a community. In
MANETs, reputation can be a compilation of trust
from nodes in the network. Reputation is more
global than trust from the perspective of the whole
network .
B. Trust Model
Based on the meaning and features of trust in
MANETs, we evaluate trust in the proposed scheme
by a real number T with a continuous value ranging
between 0 and 1. Although the trust and
trustworthiness may be different in contexts, in
which the trustor needs to consider the risk, trust
and trustworthiness are treated as same for
simplicity in the proposed model. In this, the trust is
made up of two components namely, direct
observation trust and indirect observation trust. In
former, an observer estimates the trust of his one-
hop neighbor based on its own judgment. Therefore,
the trust value is the anticipation of a subjective
probability that a trustor uses to decide whether a
trustee is reliable or not. It is similar to firsthand
information defined in [19] and [20]. If we only
consider direct observation, there would be
unfairness in trust value calculation. To obtain less
biased trust value, we also consider other observers’
opinions in this paper. Al-though opinions of
neighbors are introduced in, the method that simply
takes arithmetic mean of all trust values is not
suffice to reflect the real meaning of other
unreliable observers’ opinions because there are
mainly two situations that may severely disturb the
effective evidence from neighbors: unreliable
neighbors and unreliable observation. Unreliable
neighbors themselves are prime suspects. Even
though neighbors are trustworthy, they may also in
turn provide unreliable evidence due to observation
conditions. The DST is a good candidate to aid in
this situation, in which evidence is collected from
neighbors that may be unreliable.
C. Framework of the Proposed Scheme
Based upon the trust model, the framework of the
proposed scheme is shown in Figure. 1. In the
trust scheme component, the module of trust
evaluation and update can obtain verification from
the direct and indirect observation modules and
then utilize these approaches, i.e., Bayesian
inference and DST, for calculating and updating the
trust values. Next, the trust values are stored in the
module of trust repository. Routing schemes in the
networking module can establish secure routing
paths between sources and destinations based on the
trust repository module. Then the application
component can send data through secure routing
paths.
Fig. 1 Framework of the proposed scheme.
Fig. 2 Example mobile ad hoc network
To explain the basic operation of trust evaluation
in our scenario, an example network is shown in
Figure. 2. In this example we have taken, node 1 is
an observer node, and node 3 as an observed node.
5. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 5
Node 1 sends data messages to node 5 through the
node 3. When node 3 receives data messages and
forwards it to node 5, node 1 can overhear it. Then,
node 1 can calculate the trust value
of node 3 based on the data messages. The same
idea is applied to the control message situation.
Meanwhile, node 1 can gather information from
nodes 2 and 4, which have interactions with node 3
to evaluate the trust value of node 3. This
information gathered from third-party nodes is
called as the indirection observation. In another
situation, node 7 sends the data messages to node 3,
which is the destination node. Node 1 cannot
overhear the data messages sent to node 3 in this
situation.
IV. SECURE ROUTING BASED ON TRUST
The original AODV protocol does not provide
security measurements in the protocol. AODV
assumes that every node in the network is
cooperative and helping. However, this assumption
is inappropriate in a military environment.
Malicious nodes can even attack the nodes that are
not protected. Based on trust values, a secure route
can be established. Modifications of AODV
consists of two important parts: route selection
process based on link metrics and trust-value
calculation algorithms. Although the AODV
provides new attributes such as link metrics and
extensible message formats, which may be
efficiently used to improve the security of the
protocol, AODV implementation still attempts to
use the hop count method when the shortest routing
path is calculated. To implement the route
selection process based on link metrics, there are
three components that need to be changed, i.e.,
HELLO messages, protocol information bases, and
the shortest path algorithm. The message format is
also extensible and flexible in AODV. Thus, the
information on link metrics can also be added to
messages as the type length value (TLV) blocks.
Modification of protocol information bases,
including the local information base, neighbor
information base, and topology information base, is
used to record link metrics for each node. Based on
these valuable information bases, a route processing
set can update the shortest routing path with link
metrics. In the ad hoc on demand vector routing
protocol (AODV) [43], the trust management
scheme can also differentiate the control messages,
e.g., route requests and route replies in AODV, by
message type checking when a trust evaluation
procedure is performed. We assume that each node
works in the promiscuous mode implemented by
the medium-accesscontrol layer. We also assume
that, in a particular time slot, the observed node
(sender) does not move out of the transmission
range. As the time of packets processing in a node
is very short, our assumptions are very realistic in
practical networks. This implies that the observer
can detect whether the neighboring node sends the
received packets before the observed node moves
out the transmission range.
Each node needs to record its one-hop neighbors,
how many data packets each neighbor received, the
number of control packets each neighbor received,
how many data packets each neighbor forwards
correctly, and the number of control packets each
neighbor forwards correctly. When a particular
node receives a packet, the number of received
packets, according to the kind, will increase one. If
the node forwards the received packet correctly,
then the number of forwarded packets will in turn
increase by one. There are three scenarios under
which the number of received packets will not
increase. First, if the packet is dropped because of
time to live (TTL), then the number of received
packets cannot increase. The second scenario is
that , if a node that receives a packet drops it due to
the overflow of buffers. Third, a packet is dropped
by a node because the condition of wireless
connection is appalling. Considering these stated
significant factors, we improve the accuracy of trust
calculation. In this paper, we consider the
condition that packets are dropped due to the
unreliable wireless connections. During the trust
evaluation with direct observation, the model can
remove the number of packets dropped by this
condition (see Algorithm 1). We suppose that there
is a probability that packets are dropped because of
unreliable wireless connections. Algorithm 1
describes the details of each iteration. Algorithm 2
describes that an observer node collects evidence
from its one-hop neighbors linking the observer
node and the observed node. Then, the trust values
from indirect observation are evaluated by (18).
6. International Journal of Engineering and Techniques
ISSN: 2395-1303
After T S and T N are obtained, we can get the total
trust value of the observed node by (1). In reactive
routing protocols, such as AODV, an observer node
can obtain the information from its neighbor nodes
periodically by the use of control messages (e.g.,
HELLO), which can be used to carry the trust
values
Algorithm 1 Trust Calculation with Direct Observation
1: if node A, which is an observer, finds that its one
neighbor, Node B that is a trustee, receives a packet
2: the number of packets received increases one
3: if node A finds that node B forwards the packet suc
cessfully then
4: the number of packets forwarded increases one
5: else
6: if TTL of the packet becomes zero or overflow of
buffers in node B or the state of wireless connection
of node B is bad then
7: the number of packets received decreases one
8: end if
9: end if
10: end if
11: calculate the trust value T S
from (8) and update the old
one.
Algorithm 2 Trust Calculation with Indirect Observation
if node A, which is an observer, has more than one one
hop neighbors between it and the trustee, node B
2: calculates the trust value T N
from (18)
else
4: set T N
to 0
set λ to 1
6: end if
TABLE I
SIMULATION PARAMETERS
International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar –
http://www.ijetjournal.org
ter T S and T N are obtained, we can get the total
trust value of the observed node by (1). In reactive
routing protocols, such as AODV, an observer node
can obtain the information from its neighbor nodes
periodically by the use of control messages (e.g.,
HELLO), which can be used to carry the trust
Trust Calculation with Direct Observation
node A, which is an observer, finds that its one-hop
neighbor, Node B that is a trustee, receives a packet then
the number of packets received increases one
node A finds that node B forwards the packet suc-
the number of packets forwarded increases one
TTL of the packet becomes zero or overflow of
buffers in node B or the state of wireless connection
the number of packets received decreases one
from (8) and update the old
Indirect Observation
node A, which is an observer, has more than one one-
hop neighbors between it and the trustee, node B then
from (18)
TABLE I
SIMULATION PARAMETERS
minimization is used in the Dijkstra’ algorithm
(e.g., to find the shortest path with the minimal hop
count in traditional AODV), we need to convert the
trust value to untrustworthy value. Then, we can
minimize the untrustworthy value of a path using
the Dijkstra’ algorithm. To this end, we define the
untrustworthy value between nodes A and B as
UAB , which can be calculated as UAB = 1
The sum of untrustworthy values of a path is
Upath=∑ U n−1 i−1 kiki + 1=∑(1
(19) where Tkiki+1 is the trust value between node
ki and its one-hop neighbor node ki+1. Nodes k1,
k2, . . . , kn
belong to the path with n − 1 hops. The best
routing path satisfies the minimum of U path. The
trust values and routing table of each node can be
stored in the Trusted Platform Module (TPM),
which provides additional security protection in
open environments with the combination of
software and hardware. Since the trust values in
each node are the key facilities to detect malicious
nodes, the TPM is able to
protection to secure routing and avoid malicious
attacks by enemies in battlefields.
V. SIMULATION RESULTS AND
DISCUSSIONS
The proposed mechanism is implemented as
simulation on the Qualnet platform with the AODV
protocol. In the simulations, the effectiveness of the
mechanism is evaluated in an not safety
environment. We compare the performance of the
proposed scheme with that of AODV without
security methods.
A. Environment Settings
We randomly place nodes in the defined area. Each
scene has two nodes as the source and destination
with constant bit rate (CBR) traffic. The simulation
parameters are listed in Table II. In our
– Apr 2016
Page 6
minimization is used in the Dijkstra’ algorithm
(e.g., to find the shortest path with the minimal hop
count in traditional AODV), we need to convert the
trust value to untrustworthy value. Then, we can
minimize the untrustworthy value of a path using
ijkstra’ algorithm. To this end, we define the
untrustworthy value between nodes A and B as
UAB , which can be calculated as UAB = 1 − TAB .
of untrustworthy values of a path is
(1−Tkiki + 1) n−1 i−1
ki+1 is the trust value between node
hop neighbor node ki+1. Nodes k1,
− 1 hops. The best
routing path satisfies the minimum of U path. The
trust values and routing table of each node can be
n the Trusted Platform Module (TPM),
which provides additional security protection in
open environments with the combination of
software and hardware. Since the trust values in
each node are the key facilities to detect malicious
nodes, the TPM is able to provide effective
protection to secure routing and avoid malicious
attacks by enemies in battlefields.
AND
The proposed mechanism is implemented as
simulation on the Qualnet platform with the AODV
ns, the effectiveness of the
mechanism is evaluated in an not safety
environment. We compare the performance of the
proposed scheme with that of AODV without
We randomly place nodes in the defined area. Each
scene has two nodes as the source and destination
with constant bit rate (CBR) traffic. The simulation
parameters are listed in Table II. In our
7. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 7
implementation through simulations , we assume
that there are two types of nodes in the network:
normal nodes, which follow the path of routing
rules, and compromised nodes, which drop or
modify packets maliciously. We also assume that
the number of compromised nodes is less compared
with the total number of nodes in the network. In
this adversary mode, the proposed scheme is
Fig. 3 Example of the network setup
Fig. 4 PDR versus the number of nodes in the network
corrected and compared with the original AODV
protocol. We have simulated networks with
different numbers of nodes. Figure. 3 is an example
of the network setup where node 1 is the source
node that generates the CBR traffic, node 3 is the
destination node, and node 2 is compromised by an
adversary. For node mobility, the random waypoint
mobility model is adopted and used in a 30-node
MANET. The maximum velocity of each node is
set from 0 to 10 m/s. The pause time is 30 s. There
are five types of performance metrics considered in
the simulations: 1) PDR, which is the ratio of the
number of data packets received by a destination
node and the number of data packets generated by a
source node; 2) throughput, which is the overall
size of data packets correctly received by a
destination node ev-ery second; 3) average end-to-
end delay, which is the mean of end-to-end delay
between a source node and a destination node with
CBR traffic; 4) message overflow, which is the size
of TLV blocks in total messages that are used to
carry trust values; and 5) routing load, which is the
ratio of the number of control packets transmitted
by nodes to the number of data packets received
successfully to the respective destinations during
the simulation.
B. Performance Improvement
The original AODV and our proposed
mechanism are evaluated in the simulations, where
some nodes misbehave through dropping or
modifying packets. In Figure. 4, we compare our
scheme with and without indirect observation and
original AODV in scenarios
Fig. 5 Throughput versus the number of nodes in the network
under which a source node sends data packets to a
destination node in the network, which includes
nodes from 5 to 30. In Figure. 4, it is shown that the
proposed scheme has a much higher PDR than the
existing scheme because the trust-based routing
calculation can detect the malfunctioning of
malicious nodes. The results also demonstrate that
the proposed scheme with indirect observation has
the greater PDR among these three schemes. In
Figure. 4, we can also find that the PDR of three
mechanisms decreases gradually when the number
8. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 8
of nodes grows. This is because the collision of
sending messages becomes more often as the
number of nodes increases in the MANET.
Although the PDR declines in three schemes, the
proposed mechanism is apparently better than the
existing scheme. In Figure. 5, we evaluate
throughput in our scheme and the exact and original
one. Although the number of packets received
correctly decreases as long as the number of nodes
increases, the performance of our mechanism has a
big improvement. Figures. 4 and 5 both reveal that
the trust-based routing algorithm can improve the
performance of AODV. Figures. 6 and 7 show the
impact of node mobility in a 30node MANET. We
can able to see that, as the node velocity increases,
PDR and throughput decrease gradually. This is
because the greater speed of a node may improve
the probability of packets lost. Nevertheless, the
proposed scheme performs better than the existing
one.
Fig. 6 PDRatio versus node velocity
Fig. 7 Throughput versus node velocity
The number of malicious nodes in the MANET
also has a significant impact on the throughput of
the network. Here, we assume the attackers are
independent. Hence, there is no collusion attack in
the MANET. We investigate the throughput with
malicious nodes, from 2 to 10, in a 30node MANET
environment. The basic parameter is the same as
that given earlier. Figure. 8 shows that, as the
number of malicious nodes increases, the
throughput drops dramatically. When the number of
malicious nodes reaches to one third of the total
number of nodes in the network, the throughput
decreases to about half of the throughput in the
network with two malicious nodes. From this
figures, we can see that the proposed scheme is
affected deeply by the number of malicious nodes.
Compared with the proposed scheme, the existing
scheme has a very low throughput, even if the
number of malicious nodes is very small.
Fig. 8 Throughput versus the number of malicious nodes in the network.
From these three figures, we can observe that our
proposed scheme based on trust outperforms the
existing scheme significantly in terms of both PDR
and throughput. Our scheme takes
Fig. 9 Average end-to-end delay versus the number of nodes in the
network
advantage of trust evaluation of nodes in the
network so that more reliable routing paths can be
9. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 9
established. The existing scheme is severely
affected by malicious nodes that drop or modify
packets. We can observe that the proposed scheme
with trust can steer clear of malicious nodes
dynamically. Therefore, the PDR and throughput of
our scheme are better than those of the existing
scheme.
Fig. 10 Average end-to-end delay versus node velocities.
C. Cost
The cost of security enhancement in AODV mainly
includes the increased average end-to-end delay and
overhead of messages that are used to carry trust
values of nodes. Figure. 9 shows that the proposed
scheme has a slightly higher average end-to-end
delay than
the existing
mechanism
in the
malicious
environment.
In Figure. 10,
we can see
that, as the
node velocity
improves, the
average end-
to-end delay
becomes
longer. The reason is that trust-based routing path is
usually a longer route from a source node to a
destination node. Therefore, there is a trivial delay
introduced by the proposed scheme. Nevertheless,
greater security is guaranteed in the proposed
scheme.
Fig. 11 Total bytes of messages sent versus the number of nodes in the
network
Fig. 12 Percentage of overhead in message versus the number of nodes in the
network.
Compared with local computing capacity,
sending and receiving message is an important issue
in MANETs because message transmission is
energy consuming. Thus, we study how much
overhead of messages is imported when the trust
value is calculated in the AODV protocol. Since the
metric link value is introduced in AODV, one new
address block TLV, which occupies 12 B, is added
to the message format described in Section VI.
Figure. 11 shows how much the overhead of
messages is imported compared with the original
10. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 10
version of AODV. Because trust values are
embedded in the HELLO messages, there is no
more messages that need to be sent. The overhead is
not very high. However, as the number of nodes
increases, the percentage of overhead in messages
drops dramatically, as shown in Figure. 12. This is
because, when the number of nodes increases, the
total message becomes large. Then, the 12-B
overhead is trivial compared with the size of
messages. The results also demonstrate that the
proposed mechanism has a lower routing load
because of the higher number of packets received
correctly by the destination node. As the number of
nodes increases, the routing path load of the
existing and proposed schemes climb up due to the
nature of the reactive routing protocol: time interval
generation of control messages in every node.
VI. CONCLUSION AND FUTURE WORK
In this paper, we have proposed a new key
exchange mechanism in which the key is sent
through the control packets instead of the data
packets, by this the intruder cannot decrypt the data
because the key sent with the
control packets is alive for a very less time in the
network and the data packet which contains the
encrypted data cannot be decrypted because due to
in availability of key associated with the packet.
Brute force attack also becomes infeasible because
is alive for a very less time in the network. This key
exchange scheme can implemented with any
protocol to enhance the security of it and can be
used for normal use and exclusively for the defence
communication and any other situation which
requires high security.
REFERENCES
1. S.CorsonandJ.Macker,MobileAdHocNetworking(MAN
ET):Routing protocol performance issues and evaluation
considerations, Jan. 1999, IETF RFC 2501.
2. F. R. Yu, Cognitive Radio Mobile Ad Hoc Networks. New
York, NY, USA: Springer-Verlag, 2011.
3. J.Loo,J.Lloret,andJ.H.Ortiz,MobileAdHocNetworks:
CurrentStatus and Future Trends. Boca Raton, FL, USA:
CRC, 2011.
4. Q. Guan, F. R. Yu, S. Jiang, and V. Leung, “Joint
topology control and authentication design in mobile ad
hoc networks with cooperative communications,” IEEE
Trans. Veh. Tech., vol. 61, no. 6, pp. 2674–2685, Jul. 2012.
5. F. R. Yu, H. Tang, S. Bu, and D. Zheng, “Security and
Quality of Service (QoS) co-design in cooperative mobile
ad hoc networks,” EURASIP J. Wireless Commun. Netw.,
vol. 2013, pp. 188–190, Jul. 2013.
6. Y. Wang, F. R. Yu, H. Tang, and M. Huang, “A mean field
game theoretic approach for security enhancements in
mobile ad hoc networks,” IEEE Trans. Wireless Commun.,
vol. 13, no. 3, pp. 1616–1627, Mar. 2014.
7. J.ChapinandV.W.Chan,“Thenext10yearsofDoDwireless
networking research,” in Proc. IEEE Milcom, Nov. 2011,
pp. 2155–2245.
8. S. Bu, F. R. Yu, P. Liu, P. Manson, and H. Tang,
“Distributed combined authentication and intrusion
detection with data fusion in high-security mobile ad hoc
networks,” IEEE Trans. Veh. Technol., vol. 60, no. 3, pp.
1025–1036, Mar. 2011.
9. C. Adjih, D. Raffo, and P. Muhlethaler, “Attacks against
OLSR: Distributed key management for security,”
presented at the 2nd OLSR Interop/Workshop, Palaiseau,
France, Dec., 2005.
10. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Securing mobile
ad hoc networks with certificateless public keys,” IEEE
Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386–
399, Oct.–Dec. 2006.
11. Y. Fang, X. Zhu, and Y. Zhang, “Securing
resourceconstrained wireless ad hoc networks,” IEEE
Wireless Comm., vol. 16, no. 2, pp. 24–30, Apr. 2009.
12. F. R. Yu, H. Tang, P. Mason, and F. Wang, “A
hierarchical identity based
keymanagementschemeintacticalmobileadhocnetworks,”I
EEETrans. Netw. Serv. Manag., vol. 7, no. 4, pp. 258– 267,
Dec. 2010.
13. S. Marti, T. Giuli, K. Lai, and M. Maker, “Mitigating
routing misbehavior in mobile ad hoc networks,” in Proc.
ACM MobiCom, Aug. 2000, pp. 255–265.
14. W. Lou, W. Liu, Y. Zhang, and Y. Fang, “SPREAD:
Improving network security by multipath routing in mobile
ad hoc networks,” ACM Wireless Netw., vol. 15, no. 3, pp.
279–294, Apr. 2009.
15. R. Zhang, Y. Zhang, and Y. Fang, “AOS: An anonymous
overlay system
formobileadhocnetworks,”ACMWirelessNetw.,vol.17,no.
4,pp.843– 859, May 2011.
16. P. Albers, O. Camp, J.-M. Percher, B. Jouga, and L. M.
R. S. Puttini, “Security in ad hoc networks: A general
11. International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar – Apr 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 11
intrusion detection architecture enhancing trust based
approaches,” presented at the 1st Int. Workshop Wireless
Inf. Syst., Ciudad Real, Spain, Apr. 2002.
17. A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion
detection in wireless ad hoc networks,” IEEE Wireless
Comm., vol. 11, no. 1, pp. 48–60, Feb. 2004.
18. S. Bu, F. R. Yu, X. P. Liu, and H. Tang, “Structural
results for combined continuous user authentication and
intrusion detection in high security mobile ad-hoc
networks,” IEEE Trans. Wireless Commun., vol. 10, no. 9,
pp. 3064–3073, Sep. 2011.
19. S. Buchegger and J.-Y. L. Boudec, “A robust reputation
system for P2P and mobile ad-hoc networks,” in Proc. 2nd
Workshop Econom. Peer-toPeer Syst., Nov. 2004, pp. 1–6.
20. C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas,
“A quantitative trust establishment framework for reliable
data packet delivery in MANETs,” in Proc. 3rd ACM
Workshop SASN, Nov. 2005, pp. 1–10.