Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks Yayah Zakaria
The explosion in wireless telecommunication technologies has lead to a huge increase in the number of mobile users. The greater dependency on the mobile devices has raised the user’s expectations to always remain best connected. In the process, the user is always desiringgood signal strength even at certain black spots and indoors. Moreover, the exponential growth of
the number of mobile devices has overloaded macrocells. Femtocells have emerged out as a good promising solution for complete coverage indoors and for offloading macrocell. Therefore, a new handover strategy between femtocells and macrocell is proposed in this paper. The proposed handover
algorithm is mainly based on calculating equivalent received signal strength along with dynamic margin for performing handover. The simulation results of proposed algorithm are compared with the traditional algorithm. The proposed strategy shows improvement in two major performance parameters
namely reduction in unnecessary handovers and Packet Loss Ratio. The quantitative analysis further shows 55.27% and 23.03% reduction in packet loss ratio and 61.85% and 36.78% reduction in unnecessary handovers at a speed of 120kmph and 30kmph respectively. Moreover, the proposed algorithm proves to be an efficient solution for both slow and fast moving vehicles.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks Yayah Zakaria
The explosion in wireless telecommunication technologies has lead to a huge increase in the number of mobile users. The greater dependency on the mobile devices has raised the user’s expectations to always remain best connected. In the process, the user is always desiringgood signal strength even at certain black spots and indoors. Moreover, the exponential growth of
the number of mobile devices has overloaded macrocells. Femtocells have emerged out as a good promising solution for complete coverage indoors and for offloading macrocell. Therefore, a new handover strategy between femtocells and macrocell is proposed in this paper. The proposed handover
algorithm is mainly based on calculating equivalent received signal strength along with dynamic margin for performing handover. The simulation results of proposed algorithm are compared with the traditional algorithm. The proposed strategy shows improvement in two major performance parameters
namely reduction in unnecessary handovers and Packet Loss Ratio. The quantitative analysis further shows 55.27% and 23.03% reduction in packet loss ratio and 61.85% and 36.78% reduction in unnecessary handovers at a speed of 120kmph and 30kmph respectively. Moreover, the proposed algorithm proves to be an efficient solution for both slow and fast moving vehicles.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable
security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police
Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have
been identified and implemented. Aggregates are prepared and the summary of information is gathered
and stored in a repository. The above defined approaches are integrated in police patrol applications and
preliminary results are obtained.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
Radio frequency identification (RFID) and wireless sensor networks are two important wireless technologies which have a wide variety of applications in current and in future systems. By integration of these technologies, it is
feasible to improve the operating functionalities. In the heterogeneous network, the need to apply the balancing of
energy consumption across all nodes is very important to prevent the death of those nodes and thereafter increase the lifetime of the network .The most part of the network energy is consumed in the localization and in the communication stages, when nodes are sending HELLO packet, this energy can be recovered by implementing a passive RFID circuit in each node. This approach extends the network lifetime and increase the number of packet messages sent to the base station. Computer simulation in MATLAB with different scenarios comparison shows that the proposed method presents an efficient solution to enhance the energy network performance.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable
security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police
Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have
been identified and implemented. Aggregates are prepared and the summary of information is gathered
and stored in a repository. The above defined approaches are integrated in police patrol applications and
preliminary results are obtained.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
Radio frequency identification (RFID) and wireless sensor networks are two important wireless technologies which have a wide variety of applications in current and in future systems. By integration of these technologies, it is
feasible to improve the operating functionalities. In the heterogeneous network, the need to apply the balancing of
energy consumption across all nodes is very important to prevent the death of those nodes and thereafter increase the lifetime of the network .The most part of the network energy is consumed in the localization and in the communication stages, when nodes are sending HELLO packet, this energy can be recovered by implementing a passive RFID circuit in each node. This approach extends the network lifetime and increase the number of packet messages sent to the base station. Computer simulation in MATLAB with different scenarios comparison shows that the proposed method presents an efficient solution to enhance the energy network performance.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
Now a day the technology is improving day by day. The wired network has been changed to wireless network. There are many advantages of wireless network over wired network. One of the main advantage is we can walk around freely in a network area and accesses internet. Security is one of the challenging issues. Intrusion Detection System is one of the systematic ways to detect malicious node in a mobile ad hoc network MANET and it is driven by battery power. This paper gives a survey on various intrusion detection systems in MANET. Praveen Mourya | Prof. Avinash Sharma ""Review on Intrusion Detection in MANETs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29970.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/29970/review-on-intrusion-detection-in-manets/praveen-mourya
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
In this proposed work a trust-based routing protocol is developed to route messages through the
highly trusted nodes to minimize the probability of dropping the messages. Thus improve the network
performance in terms of throughput and packet delivery ratio. The proposed design contains a novel secure
reactive routing protocol for Mobile ad hoc networks (MANETs), called TRIUMF (Trust-Based Routing
Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack). In the
proposed protocol trust among nodes is represented by trust value, which consists of cooperation score, direct
trust and indirect trust. The proposed trust routing allows controlled degree of selfishness to give an incentive to
the selfish nodes to declare its selfishness behavior to its neighbor nodes, which reduce the searching time of
misbehaving nodes to search for the malicious nodes only. In the proposed routing protocol two node-disjoint
routes between the source and destination nodes are selected based on their path trust values, one marked as
primary and the other as secondary. In this work both DLL-ACK and end- to-end TCP-ACK as monitoring
tools to monitor the behavior of routing path nodes: if the data packet successfully transmitted, then the path
nodes trust value are updated positively; otherwise, if a malicious behavior is detected then the path searching
tool starts to identify the malicious nodes and isolate them from the routing path and the network. Finally this
scheme reduces the searching time of malicious nodes, and the routing protocol avoids the isolated misbehaving
node from sharing in all future routes, which improves the overall network throughput.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
Similar to Intelligent black hole detection in mobile AdHoc networks (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Intelligent black hole detection in mobile AdHoc networks (Yaser Khamayseh)
1969
Networks employ several mechanisms to protect themselves from attacks. Unfortunately,
these measures do not guarantee full protection from attacks. Hence, a second line of defence that has the
ability to detect emerging vulnerabilities is needed. Many systems have been developed for this purpose,
most notably intrusion detection systems (IDSs). However, these network-based IDSs cannot deal easily with
the huge amount of data passing through the network. Therefore, a focused feature selection strategy for
deciding on the most important features might be beneficial. Then, these selected features can be fed into a
learning model to build an effective detection mechanism. The use of a focused dataset will improve the
accuracy and speed of detections [3], [15], [16].
Several techniques have been proposed for the detection and the prevention of such attacks.
Generally, these techniques are divided into two categories: securing existing protocol or using intrusion
detection systems (IDS) [8]. P. Raj et al. [17] proposed a secure AODV routing protocol known as the
Detection, Prevention and Reactive AODV (DPRAODV). In addition to the basic AODV operation, the
proposed protocol developed introduced the dynamic threshold value. According to the proposed protocol,
the dynamic threshold value is calculated and updated when the RREP packet is received from the replying
node the first time. The main drawback of this technique is that it is only based on a high destination
sequence number feature to differentiate a malicious node from a normal node. In addition to that,
the network overhead will be increased due to the exchange of ALARM messages. Moreover, in large
networks, the use of this technique will require a lot of time as all the nodes in the network will have to be
notified. Mistry et al. [18] proposed a solution to black hole attacks based on the original AODV. Their
approach depends mainly on modifying the functionality of the source node. This technique increases the
end-to-end delay.
Khamayseh et al. [11] proposed a MI-AODV protocol, which is built on top of the original AODV
protocol. According to the proposed protocol, the original AODV is extended to have extra structures, where
each node has a Trust Table containing the addresses of the trust nodes. In addition to that, the RREP is
extended to have an additional field (trust field), which is used to indicate if the replying node is reliable or
not. The authors in [8] proposed an improvement to the original AODV protocol to enhance its security
against black hole attacks. In the proposed protocol, each node in the MANET has two tables, namely a
Suspect Table and a Black Table. These tables are designed to contain the addresses of the intermediate
nodes which failed to send the data through them. In addition to that, there is an additional acknowledgement
packet. Khare et al. [19] proposed a Secure Ad-hoc On-Demand Distance Vector routing (SAODV) protocol.
As in the original AODV, the source node in the proposed protocol tries to discover the route to the
destination node by flooding the RREQ message across the network. The neighbouring nodes receive the
RREQ and send the RREP back to the source node if they have a valid route in their routing table. According
to the SAODV protocol, the source node does not select the route from the first reply. The main drawback of
using this technique is that it increases the end-to-end delay.
Intrusion Detection Systems (IDSs) can be classified into two main types: anomaly-based and
signature-based (Misuse detection model) [20]. An IDS depends heavily on the existence and availability of
good and representative datasets. For this purpose, in 1999, a special dataset, known as the KDDCUP’99,
was collected from real network traces [21]. Feature reduction is used to reduce the complexity and
computation time of the model, where using one of the feature reduction techniques will lead to an increase
in the performance of the IDS. In [20], Wa’el et al. proposed the Rough Set Classification Parallel Genetic
Algorithm (RSC-PGA), which is a hybrid model for feature reduction. This model was tested using the
KDDCUP’99 dataset. The authors in [22] employs rough theory to deal with vagueness and uncertainty in
decision systems. This tool is used to identify the relevant features from all decision system features, thereby
contributing to the building of an efficient rule set for classification. In the proposed model, the features are
selected according to the calculation of both the discernibility matrix and information gain, where the
classification produced using the selected features of both methods gives better and more accurate results
than the use of the selected features using each method individually.
In order to compare the performances of different classifiers in intrusion detection, the authors in
[23] analysed the C4.5 and Naïve Bayes (NB) classifiers using the KDDCUP’99 dataset. The authors reduced
the 41 KDD features to 11 features and 7 features using the information gain measure. The NB and C4.5
classifiers were evaluated on the dataset using all the features, the selected 11 features and the selected 7
features. The results of the experiments showed that, in general, the overall performance of the C4.5 was
better than that of the NB, where the C4.5 had the lowest error rate and the highest classification accuracy.
On the other hand, the C4.5 increased the true positive rate and achieved better detection rates. Moreover,
the results for both classifiers showed that their performance became more efficient when the information
gain technique was used to select the relevant features. Results show that the information gain is a successful
measure for selecting the most relevant features [24], [25].
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1968 - 1977
1970
Researchers in [20] proposed a set of relevant features that contribute to the detection of DoS
attacks. For this purpose, they applied the NSL KDD dataset to the C4.5 algorithm with a 6-fold cross
validation using the Orange canvas data mining tool to analyse this dataset. The performance was measured
in terms of the accuracy and classification time. The obtained results showed that the increase in the relevant
features set reduced the classification time and increased the classification accuracy.
The authors in [26] proposed a detection technique for selected black hole attacks by deploying
several IDS nodes in MANET. The IDS nodes perform an anti-black hole function that estimates a suspicious
value of the node. This is calculated based on the abnormal difference between the RREP and RREQ
messages transmitted from the node. In [27], the authors proposed the IDAD technique, which is based on
both Intrusion Detection and Anomaly Detection. This technique assumes that the activities of any node in
the network is monitored. In addition, it assumes that the anomalous activities of an intruder can be identified
from the normal activities of the normal nodes. The audit data, which is a pre-collected set of anomalous
activities, should be available to the IDAD system, where this system compares every activity in the network
with the audit data to detect the black hole node.
From the previous works, it was noted that many of the proposed techniques for securing an existing
protocol against black hole attacks lacked a full understanding of the behaviour of the network with regards
to black hole attacks. Moreover, most of the IDS-based techniques use either the KDDCUP’99 dataset or the
NSL KDD dataset. The latter is a subset of the original KDD dataset. Both datasets are out-dated and were
collected for wired domain attacks. A new MANET-oriented dataset with a focused and effective feature
selection mechanism was created by [28]. This dataset is utilized to design two techniques to secure the
AODV protocol against black hole attacks.
This paper is divided into 4 sections; Section 1 presents an overview of MANETS and black hole
attacks. Moreover, it presents and discusses previous studies in relation to this research. Section 3 describes
the proposed schemes: the BDD-AODV protocol, and Hybrid protocol. The results of the proposed solution
are presented in Section 4. Finally, Section 5 concludes this work and suggests some ideas for future work.
2. PROPOSED SCHEMES
A host-based IDS was used by the nodes in the MANET, with each node being equipped with an
IDS to collect the audit data. Meanwhile, an anomaly-based detection scheme was used for the detection task.
This work proposed two techniques to detect and prevent black hole attacks. These techniques use the dataset
developed by [28]. The general framework considered in this paper is shown in Figure 1. The detection phase
is considered in this work.
Figure 1. Proposed Intrusion Detection Model
To examine the ability of the dataset in [28] to detect black hole attacks, two routing protocols were
proposed, namely: the BDD-AODV protocol and the Hybrid protocol, where these protocols depend on the
BDD features. The following subsections demonstrate the working mechanisms of the BDD-AODV protocol
and the Hybrid protocol.
2.1. BDD-AODV protocol
The BDD-AODV protocol modifies the behaviour of the original AODV, where each node is
required to have three tables: a Trust Table, a Black Table, and a Count Table. The Trust Table includes a list
of trusted nodes in the network, while the Black Table contains a list of the nodes marked as black nodes.
The Count Table maintains the following statistics about the on-going activities of the network for the reply
node: count of RREP from this node, count of maximum destination sequence number from the RREP of this
node, and count of the low hop count reply from the RREP of this node. Moreover, the RREP in the BDD-
AODV protocol has two extra fields, namely, the replying node and the replying hop count. Figure 2 depicts
the BDD-AODV algorithm.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Intelligent black hole detection in mobile AdHoc networks (Yaser Khamayseh)
1971
Handle RREQ Message Handle RREP Message by Source node
If (source node of the RREQ is not exist in TT)
Insert source node of the RREQ to TT
If (destination node of the RREQ is not in TT)
Insert destination node of the RREQ to TT
If (last node that sends the RREQ is not in TT)
Insert last node of the RREQ to TT
If (Intermediate node doesn’t have valid route to
destination)
Re-broadcast RREQ
If (RREQ is received by destination node,
intermediate has a valid rout or malicious node)
Unicast RREP to the source node
If (destination node of the RREP is not in TT) Insert destination node of the
RREP to TT
If (RREP sender! = Replying node)
Add RREP sender to the TT
If (Replying node is not in CT)
Add Replying node to the CT
Count of RRER from the Replying
node =1
If (dst sequence number > 6292)
Max high sequence =1
Else max high sequence = 0
If (1 < replying hop count <= 2)
Low replying count =1
Else low replying count =0
Else If (Replying node in CT) ++
Count of RRER
If (destination sequence number >
6292) Max high sequence
destination ++
If (replying hop count > 1 and <= 2)
Low replying hop count hop ++
If (replying node exists in TT)
Send data packet
Else If (replying node exist in BT)
Discard RREP and wait another
RREP
Else If (Count of RRER from the
Replying node = max high
sequence destination = replying
ho count and Count of RRER from
the Replying node>=1)
Add Replying node to the BT
If (replying node exists in BT)
Discard RREP and wait another
RREP
Else send data packet
Handle RREP Message by Intermediate node
If (source node of the RREP is not exist in TT)
Insert source node of the RREP to TT
If (destination node of the RREP is not exist in TT)
Insert destination node of the RREP to TT
If (RREP sender! = Replying node) Add RREP
sender to TT
Figure 2. BDD-AODV algorithm
2.2. Hybrid protocol
The Hybrid protocol combines both BDD-AODV and MI-AODV [11] protocols to derive a more
realistic and effective detection mechanism. In the MI-AODV protocol, the trust field is used to indicate if
the replying node is reliable or not. It is given a value of either 0, 1 or 2. In the Hybrid protocol, each node is
provided with two tables, namely, a Trust Table and a Black Table. In addition to that, every source node in
the network is provided with a Count Table. The processes for the handling of the RREQ in the BDD-AODV
protocol and Hybrid protocol are similar. Figure 3 shows the algorithm for the handling of the RREQ
messages.
Figure 3. Handling of RREQ Messages in Hybrid Protocol
Figure 4 shows the algorithm for the handling of the RREP by the source node.
Handle RREP Message by Source node
If (destination node of the RREP does not exist in the TT) Insert destination node of the RREP to TT
If (RREP sender! = Replying node) Add RREP sender to the TT
If (Replying node does not exist in CT) { Add Replying node to the CT
Count of RRER from the Replying node =1
If (destination sequence number > 6292) Max high sequence
destination =1
Else max high sequence destination =0
If (replying hop count > 1 and <= 2) Low replying hop count hop
=1}
Else low replying hop count hop =0}
Else If (Replying node exists in the CT) { Count of RRER from the
Replying node ++
If (destination sequence number > 6292) max high sequence ++
If (replying hop count > 1 and <= 2) low replying hop count ++}
If (Trust field value = 1 or 2)
If (Replying node does not exist in TT)
Insert Replying node to TT and Send data packet
Else If (Trust field value = 0)
If (Count of RRER from the Replying node = max high
sequence destination = replying to count and Count of RRER
from the Replying node > = 1) Add Replying node to the
BT
Else If (Trust field value equal -1)
If (Replying node does not in BT) Insert Replying node
to BT
If (Replying node does not exist in BT) S sends the data
packet
Else Discard RREP and wait for another RREP}
Figure 4. Algorithm for the handling of the RREP by the source node
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1968 - 1977
1972
3. SIMULATION AND ANALYSIS OF RESULTS
To evaluate the performance of the proposed protocols, simulation experiments were conducted.
GloMoSim simulator was used to evaluate the performance of four different protocols, namely, the Hybrid
protocol, BDD-AODV protocol, MI-AODV protocol, and original AODV protocol. Table 1 summarizes the
simulation parameters.
Table 1. Simulation Parameters
Parameter Value Parameter Value
Simulator GloMoSim 2.03 Minimum nodes’ velocity 0.5 meter/second
Simulation duration 1200 seconds Maximum nodes’ velocity 2 meter/second
Number of nodes 20, 25, 30, 35,40 Radio range 250m
Mobility Model Random waypoint Bandwidth 2 Mb/s
Pause time 0, 10 Traffic Type CBR
Simulation area 1000 m * 1000 m CBR packet size 512 tes
Four performance matrices were measured: Packet Delivery Ratio (PDR), Dropped Packets Ratio,
Average End-to-End Delay and Overhead. Eight different scenarios that were simulated in this research.
These scenarios were simulated with different parameters, where these parameters had a direct impact on the
black hole attack. These parameters are: the total number of nodes, the number of black hole nodes, and the
pause time (2 pause time values were tested: 0 and 10. A pause time of 0 indicates a high mobility, while a
pause time of 10 indicates a slow mobility).
3.1. High mobility scenarios
In all the following figures, the blue line represents the original AODV protocol, the red line
represents the MI-AODV protocol, the green line represents the BDD-AODV protocol, and the orange line
represents the Hybrid protocol.
Figure 5 shows an improvement in the Packets Delivery Ratio (PDR) for all the 4 protocols for a
network that was being attacked by 1 and 2 black hole(s). The obtained results show that the Hybrid protocol
in the network, which was attacked by one black hole node, had the highest packet delivery ratio. As shown
in Figure 5, the PDR increased when the number of nodes increased. As a result of increasing the number of
normal nodes in the network, the source node had a better chance of receiving the RREP messages from the
normal and reliable nodes. It was noted that the existence of a second black hole node caused a slight
decrease in the packet delivery ratio.
(a) (b)
Figure 5. Packet Delivery Ratio with Pause Time 0, (a) 1 Black Hole, (b) 2 Black Holes
Figure 6 shows that the BDD-AODV and Hybrid protocols contributed to a decrease in the number
of dropped packets compared to the original AODV and MI-AODV protocols for a network that was attacked
by 1 and 2 black holes.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Intelligent black hole detection in mobile AdHoc networks (Yaser Khamayseh)
1973
(a) (b)
Figure 6. Packet Drop Ratio with Pause Time 0, (a) 1 Black Hole, (b) 2 Black Hole
As shown in Figure 6, the number of dropped packets decreased as the number of nodes increased
from 20 to 40. Within this interval, each source node was surrounded by more normal neighbors, while the
number of black hole nodes in the network was fixed at 2. Therefore, the source nodes in the network had the
chance to receive more alternative active routes to the destination from the normal and reliable nodes.
The agreement between the results of the dropped packets and packet delivery ratio could be observed.
Moreover, increasing the number of black holes led to increase in the number of dropped packets.
Figure 7 shows the end-to-end delay results for the Hybrid, BDD-AODV, MI-AODV and orginal
AODV protocols when the network was attacked by 1 and 2 black holes. On the other hand, Figure 7 shows
the end-to-end delay results when the network was attacked by two black hole nodes. According to the results
in both figures, the Hybrid and BDD-AODV protocols increased the end-to-end delay compared to both the
MI-AODV and original AODV protocols. For a network attacked by one black hole, the original AODV
achieved the best end-to-end delay result, while the Hybrid protocol acheived the highest end-to-end delay
result.
(a) (b)
Figure 7. Delay with Pause Time 0. (a) 1 Black Hole, (b) 2 Black Hole
As shown in Figure 7, the end-to-end delay increased for all the protocols when the number of nodes
increased. This increase in the number of nodes decreased the chances of the destination node becoming the
neighbour of the source node. Therefore, the packets were transmitted over several hops in order to reach the
destination node. Moreover, the Hybrid and BDD-AODV protocols were required to perform more
operations to detect and avoid the black hole node, and hence, increased the delay. A similar pattern was
obtained in the case of a network being attacked by two black hole nodes. The original AODV achieved the
best end-to-end delay compared to the other three protocols, while the Hybrid protocol achieved the highest
end-to-end delay result.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1968 - 1977
1974
As shown in Figure 8(a), the overhead increased as the number of nodes increased from 20 to 40
nodes. This could be interpreted to mean that the increase in the number of nodes in the network led to an
increase in the number of control packets (e.g. RREQ and RREP) that were exchanged through the network.
The original AODV achieved a significantly higher overhead against all the other protocols due to the
existence of the black hole and the lack of any detection and prevention mechanism.
(a) (b)
Figure 8. Overhead with Pause Time 0, (a) 1 Black Hole, (b) 2 Black Hole
3.2. Low Mobility Scenarios
The performance of the tested protocols was evaluated under the assumption of low mobility.
As shown in Figure 9, for networks attacked by one black hole and two black hole nodes, the Hybrid and the
BDD-AODV protocols outperformed both the MI-AODV and the original AODV protocols in terms of the
packet delivery ratio.
(a) (b)
Figure 9. Packet Delivery Ratio with Pause Time 10, (a) 1 Black Hole, (b) 2 Black Holes
Figure 9(a) shows the packet delivery ratio results for a network that was being attacked by one
black node. The packet delivery ratio increased when the number of nodes in the network increased from 20
to 40 nodes. Within this interval, increasing the number of nodes in the network led to a decrease in the
chances of the black hole nodes to obtain RREQ messages. Thus, the chances of the black hole nodes
dropping data packets also decreased. Moreover, increasing the number of normal nodes in the network
increased the possible number of node neighbours, hence increasing its chances of getting to the destination
node(s) successfully. Figure 9(b) shows that the packet delivary ratio increased when the number of nodes
increased from 20 to 40 nodes. The addition of a second black hole had a negative effect on the packet
delivery ratio.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Intelligent black hole detection in mobile AdHoc networks (Yaser Khamayseh)
1975
Figure 10 shows that the dropped packets ratio for all the protocols decreased as the number of
nodes increased from 20 to 40 nodes. Again, adding a second black hole increased the number of dropped
packets for both cases. From Figure 9 to Figure 10, the agreement between the dropped packets results and
packet delivery ratio results can be observed, where the protocol which had a high dropped packets ratio was
the protocol with a low delivery ratio.
(a) (b)
Figure 10. Dropped Packets Ratio with Pause Time 10, (a) 1 Black Hole, (b) 2 Black Holes
Figure 11 shows the end-to-end delay results for a network being attacked by one and two black
hole nodes. The Hybrid and BDD-AODV protocols worked properly with a pause time of 10, where these
two protocols increased the end-to-end delay compared to the MI-AODV and original AODV protocols.
(a) (b)
Figure 11. Delay with Pause Time 10, (a) 1 Black Hole, (b) 2 Black Holes
As shown in Figure 11(a), the end-to-end delay increased for all the protocols when the number of
nodes increased from 20 to 40 nodes. The Hybrid protocol achieved the highest end-to-end delay results
compared to the other three protocols, while the original AODV achieved the lowest end-to-end delay results.
This difference in the results was due to the difference in the packets delivery ratio obtained from each
protocol, where increasing the packets delivery ratio required more time, thereby increasing the end-to-end
delay results.
For a network attacked by two black hole nodes, the original AODV showed the best end-to-end
delay compared with the other protocols. The Hybrid protocol showed the highest end-to-end delay results.
Figure 11(b) shows the end-to-end delay results for a network being attacked by two black hole nodes.
Any increase in the PDR resulted in an increase in the end-to-end delay. As the Hybrid protocol had the
highest PDR, hence it had the highest end-to-end delay.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1968 - 1977
1976
For a pause time of 10, the Hybrid and BDD-AODV protocols outperformed the MI-AODV and the
original AODV protocols with respect to the overhead. Figure 12 shows the overhead results for networks
being attacked by one black hole and two black holes.
(a) (b)
Figure 12. Overhead with Pause Time 10, (a) 1 Black Hole, (b) 2 Black Holes
As shown by Figure 12, the overhead increased as the number of nodes increased from 20 to 40
nodes. This indicated that increasing the number of nodes in the network will lead to an increase in the
number of control packets (e.g. RREQ and RREP) exchanged through the network. Figure 12(b) shows that
the overhead results for the original AODV was significantly higher than the overhead for the other three
protocols. This was due to the impact of black hole nodes in the original AODV and the absence of any
detection and prevention mechanism. Decreasing the impact of black hole in the network led to a decrease in
the network overhead.
4. CONCLUSION AND FUTURE WORK
A common threat to MANETs is black hole attacks. This paper was built on top of the work done in
[28] to enhance the security level in MANETS. To fully utilize the BDD dataset, a BDD-AODV protocol
was proposed, which depends on the features of the BDD dataset to build its prevention and detection
mechanisms. The BDD-AODV protocol modifies the behaviour of the original AODV, making it more
secure against black hole attacks, where it checks the reliability of the node that sends the RREP message.
The Hybrid protocol was created by combining the MI-AODV and BDD-AODV protocols, including all the
features of the BDD dataset. In other words, the working mechanism of the MI-AODV protocol was
combined with the working mechanism of the BDD-AODV protocol in order to create a Hybrid protocol.
As in the BDD-AODV protocol, each node in the MANET has a Trust Table, a Black Table, and a Count
Table. Simulation results showed that the BDD-AODV and the Hybrid protocols reduced the impact of black
hole attacks and outperformed both the original AODV and MI-AODV protocols in terms of the PDR,
dropped packets ratio, and overhead, while the end-to-end delay was maintained in some intervals.
The cooperative and selective black hole nodes were not considered in this work. The cooperative
black hole problem occurs when more than one black hole cooperates together. On the other hand,
the selective black hole attacks select a set of data packets to be dropped, delivered to the destination node, or
modified. It is proposed that the behaviour of cooperative and selective black holes be studied and the BDD
dataset be expanded to include the relevant features that contribute to the detection of these attacks.
Moreover, it is proposed that the BDD-AODV and Hybrid protocols be enhanced with certain mechanisms to
solve these two problems. In addition, the experimental results showed that the end-to-end delay in the
Hybrid and BDD-AODV protocols was higher than the delay in the original AODV. Therefore, there is a
need for further improvements in order to reduce the delay values.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Intelligent black hole detection in mobile AdHoc networks (Yaser Khamayseh)
1977
REFERENCES
[1] Ochola E. O. and Eloff M. M., “A Review of Black Hole attack on AODV Routing in MANET,” ISSA, 2011.
[2] T. Kaur and A. Singh, “Performance Evaluation of MANET with Black Hole Attack Using Routing Protocols,”
International Journal of Engineering Research and Applications (IJERA), vol/issue: 3(4), 2013.
[3] S. Kumar, et al., “An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET,”
International Journal of Electrical and Computer Engineering (IJECE), vol/issue: 5(5), pp. 1102-1110, 2015.
[4] Aarti and S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks,”
International Journal of Advanced Research in Computer Science and Software Engineering, vol/issue: 3(5), 2013.
[5] R. M. Desai, et al., “Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis,” Indonesian Journal
of Electrical Engineering and Computer Science, vol/issue: 7(3), pp. 795-801, 2017.
[6] A. P. Murdan and A. Bhowon, “Mobile Ad Hoc Networks in Presence of Black Hole Attack,” Indonesian Journal
of Electrical Engineering and Computer Science, vol/issue: 7(2), pp. 577-582, 2017.
[7] Goyal, et al., “MANET: Vulnerabilities, Challenges, Attacks, Application,” International Journal of
Computational Engineering & Management (IJCEM), vol.11, 2011.
[8] B. Nawafleh, et al., “Improved AODV Protocol to Detect and Avoid Black Hole Nodes in MANETs,”
Master Thesis in Computer Science, Dept.of Comp.Sci., JUST Univ., 2012.
[9] Baadache, et al., “Avoiding Black hole and Cooperative Black hole Attacks in Wireless Ad hoc Networks,”
International Journal of Computer Science and Information Security (IJCSIS), vol/issue: 7(1), 2010.
[10] Saini, et al., “Comparison between Various Black Hole Detection Techniques in MANET,” National Conference
on Computational Instrumentation, 2010.
[11] Y. Khamayseh, et al., “A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks,” International
Journal of Communication Networks and Information Security (IJCNIS), vol/issue: 3(1), 2011.
[12] Battula, et al., “Mixed signal based transmission in mixed layers for high throughput wireless network,”
Elixir International Journal, 2011.
[13] Taneja, et al., “A Survey of Routing Protocols in Mobile Ad Hoc Networks,” International Journal of Innovation
Management and Technology, vol/issue: 1(3), 2010.
[14] Singh, et al., “Security Issues And Link Expiration In Secure Routing Protocols In Manet: A Review,” Network,
vol/issue: 3(7), 2014.
[15] Liu, et al., “Toward Integrating Feature Selection Algorithms for Classification and Clustering,” Knowledge and
Data Engineering, IEEE Transactions, vol/issue: 17(4), 2005.
[16] John, et al., “Irrelevant Features and The Subset Selection Problem,” ICML, vol. 94, 1994.
[17] Raj, et al., “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET,”
International Journal of Computer Science Issues (IJCSI), vol. 2, 2009.
[18] Mistry, et al., “Improving AODV Protocol Against Attacks,” International Multi Conference of Engineers and
Computer Scientists (IMECS), vol. 2, 2010.
[19] Khara, et al., “Security in Routing Protocol to Avoid Threat of Black Hole Attack in MANET,” International
journal of Electrical, Electronics & Communication Engineering, vol. 2, 2012.
[20] Bhoria, et al., “Determining Feature Set of DOS Attacks,” International Journal of Advanced Research in
Computer Science and Software Engineering, vol. 3, 2013.
[21] KDDCUP, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
[22] Rissino, et al., “Rough Set Theory–Fundamental Concepts, Principals, Data Extraction, and Applications,”
Data Mining and Knowledge Discovery in Real Life Applications, 2009.
[23] Upendra, “An Efficient Feature Reduction Comparison of Machine Learning Algorithms for Intrusion Detection
System,” International Journal of Emerging Trends & Technology in Computer Science, vol. 2, 2013.
[24] M. Tavallaee, et al., “A detailed analysis of the KDD CUP 99 data set,” Proceedings of the Second IEEE
international conference on Computational intelligence for security and defense applications (CISDA'09).
IEEE Press, Piscataway, NJ, USA, pp. 53-58, 2009.
[25] J. Mchugh, “Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection
System Evaluations as Performed by Lincoln Laboratory,” ACM Transactions on Information and System Security,
vol. 3, 2000.
[26] M. Y. Su, “Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks through Intrusion Detection
Systems,” Computer Communications, vol/issue: 34(1), 2011.
[27] Alem, et al., “Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection,” IEEE, vol. 3,
2010.
[28] M. B. Yassein, et al., “Feature Selection for Black Hole Attacks,” Journal Of Universal Computer Science,
vol/issue: 22(4), pp. 521-536, 2016.