Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on
MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing
paths on MANET. In this paper, MLDW- a multilayered Intrusion Detection Prevention System approach is
proposed to detect and isolate wormhole attack on MANET. The routing protocol used is Adhoc On Demand
Distance Vector (AODV). MLDW has a layered framework consisting of link latency estimator, intermediate
neighbor node discovery mechanism, packet drop calculator, node energy degrade estimator followed by
isolation technique. MLDW effectiveness is evaluated using ns2 network simulator.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
An Ad hoc Network is a pool of wireless mobile node
s energetically forming a network without the use o
f
any pre-accessible network infrastructure or centra
lized administrator. These nodes communicate with
each other by hop-to-hop communication. This dynami
c topology of mobile ad-hoc networks (MANETs)
allows nodes to get attached and leave the network
at any second of time. Thus MANET can be used in a
variety of fields. Current MANETs are designed prim
ary for military utility. This generic characterist
ic of
MANET has rendered its vulnerability to security at
tacks. Due to which unprotected attacks of the
malicious nodes can occur at any time. This paper f
ocuses on one such attack known as “Black hole
attack” and the routing protocol being used here is
AODV
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
IMAGE GENERATION FROM CAPTION
1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
DOI : 10.5121/ijsptm.2018.7201 1
PERUSAL OF INTRUSION DETECTION AND
PREVENTION SYSTEM ON A MANET WITH BLACK
HOLE ATTACK: ISSUES AND CHALLENGES
Marepalli Radha1
and C.V.Guru Rao2
1
Department of computer science and engineering, Adam‟s college, Paloncha, Telangana,
India
2
SR Enginnering College, Warangal, Telangana, India
ABSTRACT:
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
KEYWORDS :
AODV, BLACKHOLE ATTACK, IDPS, MANET, RWM IMAGE PROCESSING.
1. INTRODUCTION
MANET is a infrastructure less computing network. It is having freedom to act independently
,self ruling self configuring network ,arrange network of mobile nodes without method
indiscriminately and formed without the need of a single authority[1].The increase of inexpensive
small and having great powerful devices make MANET a fastest growing network. The uses of
MANET are Military battlefield, Collaborative work, personal area network etc. The most
demanding part of MANET is maintaining the routing information without loss of data. Routing
is the method of selecting a path for traffic from source to destination. Routing Protocol is a
principle or norm ,that controls how nodes select which path to send packets between computing
devices in mobile Adhoc network. The movement of nodes in MANET is random. Hence, routing
protocols are officially compulsory to manage routing information of nodes. MANET routing
protocol is classified into three i.e. reactive protocol which is on demand and proactive protocol
which is table driven and hybrid protocol. [2][3] Due to the absence of central cooperative effort
for security on shared wireless medium makes MANET more exposed to digital/cyber attacks
than wire line network. Attacks can be classified into two types:
1. Passive Attacks: Passive attacks does not disturb proper operation of network. Attackers
snoop data exchanged in network without modifying the data. Confidentiality can be violated
if an attacker is also able to interpret. This attack is difficult to be detected since the operation
of network itself does not get affected.
2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
2
2. Active Attacks: Active attacks are performed by the malicious nodes that carry some
energy cost in order to perform the attacks. They involve some manipulation of data
stream or creation of false stream.
3. Due to the Blackhole attack in Manet there are certain problems which need to be
addressed [1]. There is a loss of energy at every node and excess consumption of
bandwidth resource for which proposing a IDPS frame work with image processing
technique to detect and prevent the blackhole attack. AODV protocol is used by the
nodes to find routing between nodes. Generally there are three types of mobility models.
RANDOM WAY MOBILITY MODEL:
This model was first described by Einstein in 1926 to mimic irregular movements of particles in
nature [5] which is known as Brownian Motion. It is a simple mobility model in which mobile
node moves with zero pause time in a random directions and speeds. Random direction mobility
model: In this mobility model mobile node chooses any random direction to travel until the
boundary of edge is found. The Random Direction Mobility Model was created to overcome
density waves in the average number of neighbors produced by the Random Waypoint Mobility
Model.
The Random waypoint mobility model is chosen because it models the movement of nodes with
maximum velocity. It is a baseline mobility model to evaluate the protocols in MANET.
Therefore Random waypoint model is used in research work. [6, 7]
2. RELATED WORK
In [4] this section, related work of the proposed intrusion detection and prevention system
literature reviewed.
2.1 MANET
MANET is a infrastructure less network which has no central organization Each and every node
can be involved directly with every other node, hence it is difficult to discover and manage the
faults. In MANET, the mobile nodes can move individually and in unfamiliar way. This dynamic
network topology results in route changes, so frequent occurring network replacements and
possibly packet losses [9].In MANET, every node acts as a router and it will forward the packets
to the other nodes in the network. The nodes can be connected to other nodes without central
point. It is a self organizing capability which helps in finding the next hope neighbor to send the
packets. The various applications of MANET such as defense, military, health care, agriculture
etc. has made the researchers to analyze the routing protocols as data transmission is more
effected due to mobile nodes. In MANET routing is challenging .The routing protocols define
some rules to follow in order to communicate with other nodes. Routers in the network collect
information about the topology by sharing the information among neighbors [1].
2.2 MANET ROUTING PROTOCOL - AODV
The Ad Hoc on-Demand Distance Vector Routing (AODV) [10] is also a reactive routing
protocol which has two steps establishing and updating the routes. It keeps, a routing table to
prevent the attack by comparing a sequence number. Whenever node wants to begin route
discovery process, it includes its sequence number and fresh sequence number it has for
destination. The intermediate nodes which receive the RREQ packet, will playback if it finds the
sequence number higher then it will playback. A reverse route is setup from intermediate node to
3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
3
the source by updating node‟s address from RREQ hence, in the bidirectional route is setup at the
end of the request-response cycle between source and destination.. As long as the route is active
when the packets are travelling in that path.. Once the source stops sending data packets, the links
will be deactivated and deleted from the intermediate node routing tables. . After implementing
this approach, there is vast decrease in packet drop and increase in throughput under black hole
attack. But the delivery ratio of ADOV under attack is less. [6].
2.3 BLACKHOLE ATTACK
The functioning of MANET depends on partnership based mutual agreement and understanding
among the nodes in the network, however some nodes may become malice and misbehave later.
Black hole attack is one damaging attack which is caused by the malicious node [11].It will take
advantage of the process of finding routes in reactive routing protocols. Whenever the source
node broadcasts a route request a malicious node will respond claiming to have best path to the
destination without checking the routing table, thereby redirecting the data packets through it and
just discarding the packets without forwarding [12]. A malicious node can work independently to
launch the attack, and this is referred as single blackhole attack or malicious can work as group
then it is referred as cooperative black hole attack [13]
2.3.1BLACK HOLE ATTACK CATEGORIES
The black hole attack can also be classified into two categories based on the cause of the attack:
Black hole attack caused by RREP and that caused by RREQ [14] as illustrated in Figure1. In
Figure1, the black hole sends a forged RREP message pretending to have a fresh and short path to
the destination. This means the black hole always returns a positive RREP even when it has no
valid route to the destination. The data packets that are transmitted to the destination will
therefore pass through a malicious node which will silently absorb or discard them. In Figure
1,the black hole sends a forged RREQ message to attack a target node in the network. This black
hole pretends to be re broadcasting the RREQ packet that originated from a target node in the
network. It then adds itself as the next hop in the route record, so the entire messages destined to
the target node will pass through it and it will discard the messages.
Figure 2 : Black hole attack via RREP
4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
4
2.4 RANDOM WAYPOINT MOBILITY MODEL[5]
The Random Waypoint model is most commonly used mobility model in research community.
The implementation of this mobility model is as follows: at every instant, a node randomly
chooses a destination and moves towards it with a velocity chosen uniformly randomly from
[0,V_max], where V_max is the maximum allowable velocity for every mobile node. After
reaching the destination, the node stops for a duration defined by the 'pause time' parameter. After
this duration, it again chooses a random destination and repeats the whole process again until the
simulation ends. This model is used in MANET as there are random changes in topology
because of the random mobility of nodes will take place due to no central management and No
boundaries.[1] The RPW model is the simplest and easiest to use. It is most commonly used
model in research community. In Random way point mobility model, mobile nodes select the
direction and speed randomly and independently to reach at the destination[16] .
2.5 INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) [4,17,16]
In today‟s world the whole system is going digital, it means everyone„s data is being stored in
digital machines instead of traditional way. Thus when digital communities are depending on
computer technology to store valuable data/ secret information of a person in any counter of the
world or nearby, it is necessary to keep the network safe from intruders/hackers/attackers .In
order to keep it safe the data from these intruders, there emerged a mechanism called Intrusion
Detection And Prevention System (IDPS).As the existing IDPS is not scalable a light weight
IDPS may be developed, so as to decrease the overhead created by existing IDPS and a more
scalable routing protocol might be used.
2.6 EXISTING INTRUSION DETECTION AND PREVENTION SYSTEM FOR MANET WITH
BLACKHOLE ATTACKS
2.6.1. DETECTING AND PREVENTING BLACKHOLE ATTACK IN MANET ON AODV USING
THRESHOLD VALUE[19]
The problem of Blackhole attack is discovered and solution is proposed to detect and prevent as
follows: The method to find and prevent is by using the sequence numbers of source node and
destination node investigating the difference between the nodes and verifying if the difference is
higher then as a threshold value. Threshold value is the average of difference between the
sequence number s in the routing table in each time slot. If sequence number is greater than
threshold then it is to be throw away by joining it to the blacklist .when any node receives the
RREP packet. It examines over the blacklist and no processing is done for the same. By
simulation the results in referred paper are when the number of malice nodes increased then
delivery ratio decreased and packet loss increased.[19] .Every time if any node receives the RREP
packet, it has to look over the list, if the reply is from the blacklisted node; no processing is done
for the same. It simply fails to consider the node and does not receive. Calculation of threshold
overhead for every timeslot frequent checking of blacklist should be done.
2.6.2 PERFORMANCE ANALYSIS OF BLACKHOLE ATTACK PREVENTION AND DETECTION
ALGORITHM IN MANETS[9,19]
The technique is given to identify multiple black holes cooperating with each other and discover
the safe route by avoiding the attacks. It was assumed in the solution that nodes are already
authenticated and therefore can participate in the communication. It uses Fidelity table where
every node that is participating is given a fidelity level that will provide reliability to that node.
5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
5
Any node having 0 values is considered as malicious node and is eliminated. [20]In future we can
determine the effect of Black Hole attack on other routing protocol such as Dynamic source
routing(DSR), Optimized Link State Routing(OLSR) and measure the performance of the
network To implement any detection techniques we need also consideration performance factor
such as Average Delay and Routing Overhead
3. LITERATURE SURVEY
3.1 USING IMAGE PROCESSING PROVIDING BIOMETRIC –BASED USER
AUTHENTICATION IN MANET
Biometric is an automatic identification verification system of an individual by his or her
physiological or behavioral characteristics[21] .This system gives a solution to authentication in
MANET‟s but it has its own quality and faults . We have Unimodal biometric and Multimodal
biometric systems which provide more reliable authentication method due to the combination of
statistics biometric traits.[23]. Unimodal biometrics has to face several challenges such as noise in
sensed data, intra-class variations, inter-class similarities, etc. [22].
There are three different modes of system operation in multimodal biometrics system: serial
mode, parallel mode, and hierarchical mode [22]. In serial mode of operation, one output of a
biosensor will be used at one time. Therefore, multimodal biometric traits do not need to be
acquired simultaneously, and the decision could be made before all biometric traits are received.
The overall recognition time can be reduced, which is important for MANETs. In the parallel
mode of operation, multimodal biometric traits have to be used simultaneously. The hierarchical
mode of operation is suitable for the system using a large number of biometric traits. This paper
will consider the serial mode of operation since it is suitable for continuous authentication in
MANETs.
3.2 NORMAL OR BODY TEXT CONTINUOUS VERIFICATION USING MULTIMODAL
BIOMETRICS
The goal is to have T. Sim et. al. [28] proposed a continuous biometric authentication. The system
was a multimodal biometric verification system which continuously verifies the presence of a
logged-in user. But the system gives extra overhead on the resources required for multimodal
fusion then compared to the conventional verification systems. The integration scheme used in
this system is shown in Fig.2.
This has a security system in which resources need to be monitored continuously [29] .This
method is used for biometric based continuous authentication for phone mobile communication
system..This system gave access to e-signing, m-contracts in a secured authenticated approach.
Based on various test using the fusion techniques for biometric evidence combination, an
efficient multi-modal biometric authentication was achieved on the Secure Phone PDA. The
weighted error rate for the fusion technique is also calculated. Many existing IDS solutions are
proposed for MANET‟s but they have their own significant limitations and weaknesses.
Detecting all types of attacks is also not possible. Reducing the computational complexity is a
challenging issue of all detection methods.
6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
6
3.3 UNIMODAL BIOMETRIC ENCRYPTION KEY
To provide confidentiality, integrity and authentication, Hiteishi Diwanji and J.S. Shah [30]
proposed Unimodal biometric encryption key method. In Unimodal biometric fingerprint DES
algorithm is used and the encryption key is 48 bit for symmetric key. The feature set is created
from fingerprint and 2*16 matrix is generated. And Crossover operation is performed on both the
rows to produce a 48 bit key which is difficult to break for any cryptanalysis which ensures
confidentiality and also integrity. In this for authentication can be done by using digital signature
In scheme suggests generation of key on both sides (sender and receiver) is done using same
formula, so stealing cannot be possible.. This scheme withstands all the cryptanalysis attack
because every time different feature set is used so cryptanalysis will not be able to find out the
key even if intruder has got cipher text-plaintext pair. But still these models are not too much
efficient and robust so they can be applied on real conditions effectively. Fingerprints can be
forged and collecting and matching face prints is time consuming and complex. Veins and Vein
patterns are not yet explored too much for MANETs. Some areas like pattern recognition in
MANETs, securing and maintaining the biometric database in MANET, combining secure
routing with authentication process, designing efficient cryptographic algorithms for MANETs
and secure collection and maintenance of up to date audit data in intrusion detection system are
still to be explored efficiently.
4. CONCLUSION & FUTURE WORK
The various techniques are studied for detection of blackhole attack in AODV routing protocol.
By studying the various techniques, new methodology IDPS frame work will be proposed for
prevention of attack. In proposed IDPS the focus is on prevention of blackhole attack by
providing authentication and confidentiality security services. The proposed framework for IDPS
smartly uses image processing techniques like Biometric technique for authentication and
7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
7
Unimodal biometric encryption key provide confidentiality to save the bandwidth of the network
and battery of genuine node. simulation results for the same would be captured and analyzed to
show the effectiveness of the proposed prevention mechanism Without knowledge of the identity
of intermediate nodes in operation, it is difficult to decide which nodes are trustworthy in
MANET network . To provide the security in the MANET by identifying nodes using image
processing technique as mentioned above are deployed to provide authentication of nodes and
confidentiality in future enhancement.
REFERENCES
[1] Ankur O. Bangand Prabhakar L. Ramteke. 2013. MANET: History,Challenges And Application
International Journal of Application or Innovation in Engineering & Management Vol.2 Issue 9.
[2] V.G.Muralishankar and Dr. E. George Dharma Prakash Raj. 2014 Routing Protocols for MANET: A
Literature Survey. International Journal of Computer Science and Mobile Applications Vol.2 Issue
pg. 18-24
[3] parvinder Kaur, Dr. Dalveer Kaur & Dr. Rajiv Mahajan. 2015. The Literature Survey on Manet
Routing Protocols and Metrics. Global Journal of Computer Science and Technology Volume 15
Issue 1 Version 1.0
[4] Bilal Maqbool Beigh , Uzair Bashir and Manzoor Chachoo . 2013. Intrusion Detection and Prevention
System: Issues and Challenges.International Journal of Computer Applications (0975 – 8887)
Volume76 No.17.
[5] Muhammad Amir Nisar, Amir Mehmood and Adnan Nadeem. 2013 A Review and Performance
Analysis of Mobility Models for MANETs: A Case Study. Federal Urdu University of Arts Science
& Technology, Karachi, Pakistan, Conference Paper.
[6] M. Sandhya Rani, R .Rekha, K.V.N.Sunitha, Performance Evaluation of MANET Routing Protocols
Using Random Waypoint Mobility Model. International Journal of Advanced Research in Computer
Science and Software Engineering 4(4), April - 2014, pp. 1293-1299
[7] AnuBala, Jagpreet Singh and MunishBansal “Performance Analysis of MANET under Blackhole
Attack” First International Conference on Network and Communication 2009
[8] Bilal Maqbool Beigh , Uzair Bashir and Manzoor Chachoo . 2013. Intrusion Detection and Prevention
System: Issues and Challenges.International Journal of Computer Applications (0975 – 8887)
Volume76 No.17.
[9] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “ An Overview of Mobile ad hoc
Netwroks: Applications &Challenges .“
[10] C.E. Perkins, E.M. Royer, S.R. Das, Ad hoc on demand distance vector (AODV) routing, in: IEEE
WMCSA, 1999
[11] M. Medadian, A. Mebadi and E. Shahri: "Combat with black hole attack in AODV routing
protocol",Proceedings of the 9th IEEE Malaysia International Conference on Communications
(MICC), pp. 530-535, 2009
[12] Vani and D. S. Rao: "Removal of blackhole attack in ad hoc wireless networks to provide
confidentiality security service", International Journal of Engineering Science and Technology,Vol. 3,
pp.2377-2384, 2011.
[13] P. K. Singh and G. Sharma: "An efficient prevention of black hole problem in AODV routing
protocol in MANET", Proceedings of the 11th IEEE International Conference on Trust, Security and
Privacy in Computing and Communications(TrustCom), pp. 902-906, 2012.
[14] M. K. J. Kumar and R. S. Rajesh: "Performance Analysis of MANET Routing Protocols in Different
Mobility Models", IJCSNS International Journal of Computer Science and Network Security, Vol. 9
No.2, pp. 22-29, 2009.
[15] Muhammad Amir Nisar, Amir Mehmood and Adnan Nadeem. 2013 A Review and Performance
Analysis of Mobility Models for MANETs: A Case Study. Federal Urdu
[16] Dr. A. Francis Saviour Devaraj , Mr. Akalu Assefa , TO PROPOSE A FRAMEWORK – IDPS FOR
A MANET UNDER FLOODING ATTACK, JournalOf Advanced Research in Engineering &
Management (IJAREM)ISSN: 2456-2033 || PP. 34-44
[17] B. Zhang H.T. Mouftah "QoS Routing for Wireless Ad Hoc Networks: Problems Algorithms and
Protocols" <em>IEEE Communications Magazine</em> vol. 43 no. 10 pp. 110-117 Oct. 2005.
8. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 7, No 2, May 2018
8
[18] Ravi Kant, Sunil Gupta, A Literature Survey on Black Hole Attacks on AODV Protocol in MANET,
International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013
[19] SaritaBadiwal, AishwaryKulshrestha, NeerajGarg, Analysis of Black Hole Attack in MANET using
AODV Routing Protocol, International Journal of Computer Applications (0975 –8887)Volume 168 –
No.8, June 2017
[20] Prof.M.B.Lonare1, Anil Choudhary2, Chehel Sharma3, Ershad Mulani4, Harish Yadav5, Prevention
and Detection of Blackhole Attack in MANET using Modified AODV Protocol, International Journal
of Advance Engineering and Research Development Volume 4, Issue 4, April -2017
[21] Q. Xiao, “A biometric authentication approach for high security ad-hocnetworks,” in Proc. IEEE Info.
Assurance Workshop, West Point, NY,June 2004.
[22] Ross and A. K. Jain, “Multimodal biometrics: an overview,” in Proc.12th European Signal Proc.
Conf., Vienna, Austria, 2004.
[23] Ross and A. K. Jain, “Information fusion in biometrics,” Pattern Recognition Lett., vol. 24, pp. 2115-
2225, Sept. 2003.
[24] C.E. Perkins, E. M. Belding-Royer, and S. R.Das, “AdHoc On-Demand Distance Vector Routing”,
IETF RFC 3561,July 2003.
[25] M.Ambika , R.V.Natraj Intrusion Detection and Continuous Authentication using Multimodal
Biometrics in MANETS – A Survey, International Journal of Computer Applications (0975 – 8887)
International Conference on Innovations In Intelligent Instrumentation, Optimization And Signal
Processing “ICIIIOSP-2013”
[26] S. Bu, F. Yu, X. Liu, P. Mason and H. Tang, “Distributedcombined authentication and intrusion
detection with data fusionin high-security mobile ad hoc networks,” IEEE Transactions onVehicular
Technology, vol 60 no.3 pp. 1025–1036, March 2011.
[27] H.Nakayama, S.Kurosawa, A.Jamalipour, Y. Nemoto, N.Kato, "A Dynamic Anomaly Detection
Scheme for AODVBasedMobile Ad Hoc Networks," IEEE Transactions onVehicular Technology,
vol.58, no.5, pp.2471-2481, Jun 2009.
[28] Sim T, Zhang S, R.Janakiraman and S.Kumar, “Continuous verification using multimodal
biometrics,” IEEE Trans. Pattern Anal. Mach. Intell.2007; vol. 29, pp. 687-700.
[29] Korman J, A C Morris, D Wu and S.A.Jassim, “Multi-modal biometrics authentication on the secure
phone PDA,” in Proc. 2nd Workshop Multimo
[30] Hiteishi Diwanji and J.S. Shah. “Enhancing Security in MANET through Unimodal Biometric
Encryption Key” in IEEE, December 2011.
AUTHORS DETAILS:
M.Radha is currently Working as a Associate professor for 15 years She
received her B.Tech degree from Swami Ramanadha institute of scince and
technology ,Nalgonda and M.Tech degree from Karshak Engineering college
,Hyderabad in 2009.Her research lies in the field of wireless networking
especially in MANET.
Dr.C.V.Guru Rao working as a professor Director over a period of 32 years in
his Service. He was awarded Ph.D degree in Computer science and
Engineering from Indian InstituteofTechnology,Kharagpur,west Bengal,India.