Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The document discusses security challenges in wireless ad-hoc networks and potential solutions. It outlines that ad-hoc networks have no infrastructure, are self-organizing, and use multi-hop wireless communication. This introduces security vulnerabilities like eavesdropping, fake messages, and dynamic topology changes. The document then covers common attacks, why security is needed, challenges, and proposes solutions like using a trusted third party, secure routing protocols, and packet leashes to address issues like black holes and wormholes.
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
this ppt is useful for both b.e/b.tech students as well as for mca students. in this ppt u will find different types of security issues in manet and their countermeasures.
Various Security Attacks in mobile ad hoc networksKishan Patel
The document outlines various security attacks in mobile ad-hoc networks. It discusses the different types of routing protocols used in MANETs including proactive, reactive, and hybrid protocols. It then classifies security attacks into two categories: data traffic attacks and control traffic attacks. Specific attacks described include black hole, gray hole, jellyfish, worm hole, hello flood, bogus registration, man in middle, rushing, cache poisoning, and Sybil attacks. The document provides details on how each attack is carried out and its impact on the network.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The document discusses security challenges in wireless ad-hoc networks and potential solutions. It outlines that ad-hoc networks have no infrastructure, are self-organizing, and use multi-hop wireless communication. This introduces security vulnerabilities like eavesdropping, fake messages, and dynamic topology changes. The document then covers common attacks, why security is needed, challenges, and proposes solutions like using a trusted third party, secure routing protocols, and packet leashes to address issues like black holes and wormholes.
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
this ppt is useful for both b.e/b.tech students as well as for mca students. in this ppt u will find different types of security issues in manet and their countermeasures.
Various Security Attacks in mobile ad hoc networksKishan Patel
The document outlines various security attacks in mobile ad-hoc networks. It discusses the different types of routing protocols used in MANETs including proactive, reactive, and hybrid protocols. It then classifies security attacks into two categories: data traffic attacks and control traffic attacks. Specific attacks described include black hole, gray hole, jellyfish, worm hole, hello flood, bogus registration, man in middle, rushing, cache poisoning, and Sybil attacks. The document provides details on how each attack is carried out and its impact on the network.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
The document discusses security issues in mobile ad hoc networks (MANETs). It begins by introducing MANETs and noting their vulnerability to attacks due to lack of centralized authority. It then covers security goals, types of attacks (passive vs. active; internal vs. external), examples of passive attacks like eavesdropping and active attacks like jamming and wormholes. The document also discusses security schemes like intrusion detection and secure routing techniques. It concludes by identifying research issues around improving MANET security.
This document discusses security issues and attacks in mobile ad hoc networks (MANETs). It provides an introduction to MANETs and their characteristics. It outlines the general objectives of analyzing flooding attacks on MANETs and preventing such attacks for networks with high node mobility. It describes common attacks on MANETs such as flooding attacks, blackhole attacks, wormhole attacks, and Byzantine attacks. The document also discusses security mechanisms for MANETs including preventive cryptography-based approaches and reactive intrusion detection system approaches. It stresses the need for comprehensive security solutions to deal with the diverse attacks that are facilitated by the open and dynamic nature of MANETs.
This document summarizes a survey on attacks against mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their unique characteristics and vulnerabilities. It then categorizes the different types of attacks that can occur in MANETs based on their nature (active vs passive), location (external vs internal), and which layer of the protocol stack they target (physical, data link, network, transport, etc.). Specific attacks are defined at each level. The document aims to provide an overview of the security issues in MANETs and different classifications of attacks.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
This document discusses secure routing in ad hoc networks and various attacks. It begins with an abstract that introduces the need for secure and efficient communication protocols in ad hoc wireless networks. It then discusses types of attacks like external vs internal and passive vs active attacks. It reviews various routing protocols for mobile ad hoc networks like proactive, reactive, and hybrid protocols. It also discusses security issues in ad hoc networks and security requirements like confidentiality, authentication, integrity, availability, and non-repudiation. Finally, it discusses security mechanisms needed to address these security requirements.
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
This document reviews secure routing techniques for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their decentralized nature and infrastructureless architecture. It then describes different routing protocols for MANETs including proactive, reactive, and hybrid protocols. The document outlines various attacks possible in MANETs such as active and passive attacks. It provides details about the jellyfish attack, which aims to reduce network performance by disrupting TCP connections. The literature survey presented summarizes several papers analyzing and comparing the performance of various MANET routing protocols under different attacks such as the jellyfish attack. The conclusion is that secure and efficient routing techniques are needed to detect and isolate malicious nodes in MANETs.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as infrastructureless, self-configuring networks of mobile devices connected via wireless links. The document outlines the history and working of MANETs, describes types like VANETs, and discusses challenges, applications, advantages, and disadvantages of MANETs. It concludes that MANETs allow flexible communication between mobile nodes in a dynamically changing network topology.
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
This document summarizes an intrusion detection system called EAACK that detects malicious nodes in mobile ad hoc networks (MANETs). It begins by providing background on MANETs and challenges related to their decentralized structure and dynamic topology. It then discusses common attacks on MANETs like packet dropping, and the need for intrusion detection systems to increase network security. Existing IDS methods are outlined along with their limitations. The document proposes a new IDS called EAACK that aims to more accurately detect malicious behaviors without impacting network performance. Key concepts of trust values and monitoring nodes are incorporated into EAACK to reduce false detections.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document analyzes the performance of 802.11 wireless LANs. It summarizes methods for calculating throughput and delay. Throughput is determined by the conditional collision probability, which depends on the number of contending nodes. Delay is modeled using a generalized state transition diagram and Mason's formula to determine MAC layer service time as a function of the number of saturated nodes. The analysis considers both non-saturated and saturated network conditions to understand optimal and maximum throughput.
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
This document summarizes a study on developing an energy efficient centralized routing protocol for wireless sensor networks based on LEACH-C. It proposes a new protocol that uses a modified parallel simulated annealing algorithm to select cluster heads in a way that distributes energy usage more evenly among sensor nodes. The protocol aims to maximize network lifetime and minimize energy dissipation. Initial simulation results show it performs better than LEACH and LEACH-C in terms of increasing the number of nodes alive over time. Further work could improve its performance even more.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
Dynamic Source Routing uses route discovery to find routes between nodes. When a node receives a route request (RREQ) message, if it is the destination it returns a route reply (RREP) with the accumulated route record to the sender. If it is an intermediate node, it discards the RREQ if it has the same ID or finds its own address in the route, otherwise it appends its address to the route record and propagates the RREQ to neighbors to continue finding a path to the destination.
This document presents a hierarchical clustering algorithm for wireless sensor networks. It begins with introductions to wireless sensor networks and their architecture. It then discusses routing protocols, applications, quality of service aspects, and types of clustering for wireless sensor networks. The main body of the document describes the evolution of hierarchical clustering, and presents the hierarchical clustering algorithm and a dynamic energy efficient hierarchical routing algorithm. It provides details on the simulation methods and concludes that hierarchical clustering and routing algorithms can efficiently reduce energy consumption in sensor nodes.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
The document discusses security issues in mobile ad hoc networks (MANETs). It begins by introducing MANETs and noting their vulnerability to attacks due to lack of centralized authority. It then covers security goals, types of attacks (passive vs. active; internal vs. external), examples of passive attacks like eavesdropping and active attacks like jamming and wormholes. The document also discusses security schemes like intrusion detection and secure routing techniques. It concludes by identifying research issues around improving MANET security.
This document discusses security issues and attacks in mobile ad hoc networks (MANETs). It provides an introduction to MANETs and their characteristics. It outlines the general objectives of analyzing flooding attacks on MANETs and preventing such attacks for networks with high node mobility. It describes common attacks on MANETs such as flooding attacks, blackhole attacks, wormhole attacks, and Byzantine attacks. The document also discusses security mechanisms for MANETs including preventive cryptography-based approaches and reactive intrusion detection system approaches. It stresses the need for comprehensive security solutions to deal with the diverse attacks that are facilitated by the open and dynamic nature of MANETs.
This document summarizes a survey on attacks against mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their unique characteristics and vulnerabilities. It then categorizes the different types of attacks that can occur in MANETs based on their nature (active vs passive), location (external vs internal), and which layer of the protocol stack they target (physical, data link, network, transport, etc.). Specific attacks are defined at each level. The document aims to provide an overview of the security issues in MANETs and different classifications of attacks.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
This document discusses secure routing in ad hoc networks and various attacks. It begins with an abstract that introduces the need for secure and efficient communication protocols in ad hoc wireless networks. It then discusses types of attacks like external vs internal and passive vs active attacks. It reviews various routing protocols for mobile ad hoc networks like proactive, reactive, and hybrid protocols. It also discusses security issues in ad hoc networks and security requirements like confidentiality, authentication, integrity, availability, and non-repudiation. Finally, it discusses security mechanisms needed to address these security requirements.
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
This document reviews secure routing techniques for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their decentralized nature and infrastructureless architecture. It then describes different routing protocols for MANETs including proactive, reactive, and hybrid protocols. The document outlines various attacks possible in MANETs such as active and passive attacks. It provides details about the jellyfish attack, which aims to reduce network performance by disrupting TCP connections. The literature survey presented summarizes several papers analyzing and comparing the performance of various MANET routing protocols under different attacks such as the jellyfish attack. The conclusion is that secure and efficient routing techniques are needed to detect and isolate malicious nodes in MANETs.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as infrastructureless, self-configuring networks of mobile devices connected via wireless links. The document outlines the history and working of MANETs, describes types like VANETs, and discusses challenges, applications, advantages, and disadvantages of MANETs. It concludes that MANETs allow flexible communication between mobile nodes in a dynamically changing network topology.
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
This document summarizes an intrusion detection system called EAACK that detects malicious nodes in mobile ad hoc networks (MANETs). It begins by providing background on MANETs and challenges related to their decentralized structure and dynamic topology. It then discusses common attacks on MANETs like packet dropping, and the need for intrusion detection systems to increase network security. Existing IDS methods are outlined along with their limitations. The document proposes a new IDS called EAACK that aims to more accurately detect malicious behaviors without impacting network performance. Key concepts of trust values and monitoring nodes are incorporated into EAACK to reduce false detections.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document analyzes the performance of 802.11 wireless LANs. It summarizes methods for calculating throughput and delay. Throughput is determined by the conditional collision probability, which depends on the number of contending nodes. Delay is modeled using a generalized state transition diagram and Mason's formula to determine MAC layer service time as a function of the number of saturated nodes. The analysis considers both non-saturated and saturated network conditions to understand optimal and maximum throughput.
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
This document summarizes a study on developing an energy efficient centralized routing protocol for wireless sensor networks based on LEACH-C. It proposes a new protocol that uses a modified parallel simulated annealing algorithm to select cluster heads in a way that distributes energy usage more evenly among sensor nodes. The protocol aims to maximize network lifetime and minimize energy dissipation. Initial simulation results show it performs better than LEACH and LEACH-C in terms of increasing the number of nodes alive over time. Further work could improve its performance even more.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
Dynamic Source Routing uses route discovery to find routes between nodes. When a node receives a route request (RREQ) message, if it is the destination it returns a route reply (RREP) with the accumulated route record to the sender. If it is an intermediate node, it discards the RREQ if it has the same ID or finds its own address in the route, otherwise it appends its address to the route record and propagates the RREQ to neighbors to continue finding a path to the destination.
This document presents a hierarchical clustering algorithm for wireless sensor networks. It begins with introductions to wireless sensor networks and their architecture. It then discusses routing protocols, applications, quality of service aspects, and types of clustering for wireless sensor networks. The main body of the document describes the evolution of hierarchical clustering, and presents the hierarchical clustering algorithm and a dynamic energy efficient hierarchical routing algorithm. It provides details on the simulation methods and concludes that hierarchical clustering and routing algorithms can efficiently reduce energy consumption in sensor nodes.
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
The document summarizes work done on improving the LEACH routing protocol for wireless sensor networks. It provides background on WSNs and discusses limitations of the original LEACH protocol. The work done section describes an algorithm that tracks "perfect clusters" based on distances between a cluster head and nodes, and adjusts node thresholds to promote repetition of such clusters while limiting energy depletion. Simulation conditions consider 100 homogeneous nodes randomly placed to transmit data to a base station.
DSR is a source routing protocol for wireless ad hoc networks. It uses source routing whereby the source specifies the complete path to the destination in the packet header. Route discovery is done through route request broadcasts, and routes are cached for future use. Route maintenance is done through acknowledgements; if a link breaks, a route error is sent back to the source. Simulation results showed high packet delivery ratios even with high node mobility. DSR performs well for dynamic wireless networks.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
This document discusses security challenges in mobile ad hoc networks (MANETs) and provides an overview of several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to their dynamic topology. It then discusses common security goals for routing protocols, such as confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to summarize several existing secure routing protocols for MANETs, such as DSDV, SAODV, SRP, and TORA, focusing on how each protocol aims to provide routing security. It concludes
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
This document summarizes research on injecting black hole and wormhole attacks in mobile ad hoc networks (MANETs). It provides background on MANETs and discusses their vulnerabilities to security attacks due to open wireless medium and dynamic topology. The document then describes how the researchers implemented black hole and wormhole attacks against the Ad Hoc On-Demand Distance Vector (AODV) routing protocol using the NS-2 network simulator. The simulation results showed that both attacks decreased network performance by reducing throughput and increasing packet loss. The research highlighted security as an ongoing challenge for MANET routing protocols.
This document summarizes research on injecting black hole and wormhole attacks in mobile ad hoc networks (MANETs). It provides background on MANETs and discusses their vulnerabilities to security attacks due to open wireless medium and dynamic topology. The document then describes how the researchers implemented black hole and wormhole attacks against the Ad Hoc On-Demand Distance Vector (AODV) routing protocol using the NS-2 network simulator. The simulation results showed that both attacks reduced network performance by decreasing throughput and increasing packet loss over time compared to a normal network without attacks.
Mobile ad-hoc networks (MANETs) are wireless networks formed by mobile nodes without any preexisting infrastructure. Nodes are mobile and connected dynamically in an arbitrary manner. Routing protocols in MANETs can be proactive, reactive, or hybrid. Proactive protocols maintain routing tables through periodic exchanges while reactive protocols find routes on demand. MANETs are vulnerable to both passive and active attacks due to the lack of centralized coordination. Security goals for MANETs include confidentiality, integrity, availability, and authentication. Potential applications include military operations, sensor networks, emergency response, campus networks, and conferences.
This document summarizes a research paper that proposes a hybrid routing protocol for mobile ad hoc networks (MANETs) that combines proactive and reactive routing approaches. The goal is to provide fast and secure routing in MANETs. The key aspects are:
1) A traffic monitor node manages network traffic and checks if new nodes are malicious. Reactive routing finds paths through new nodes, while proactive routing is used otherwise.
2) The traffic monitor periodically checks node responses to identify malicious nodes and informs the network.
3) Nodes maintain a trust list from the traffic monitor to identify paths that avoid malicious nodes during route discovery.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
The apt identification and blocking through ids in manetijctet
This document summarizes research on detecting and blocking advanced persistent threats (APTs) in mobile ad hoc networks (MANETs) through an intrusion detection system (IDS). The research proposes applying an IDS to identify and prevent APT attacks from malware like viruses, worms, and trojan horses that could spread in the dynamic MANET topology and degrade network performance. The IDS would monitor nodes, identify suspicious activity based on differences from normal behavior patterns, and block identified attackers to secure the MANET from unauthorized access and data theft or modification by APTs.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
The document provides an overview of routing protocols in mobile ad-hoc networks (MANETs) and enhancements to reactive protocols. It discusses the key features of MANETs and challenges like security. It describes different routing strategies including proactive, reactive, and hybrid protocols. It provides details on reactive protocols like DSR and AODV. It focuses on enhancements to DSR including the watchdog and pathrater mechanisms to detect misbehaving nodes and select more reliable routes. The document is a technical paper that evaluates routing protocols and security issues in MANETs.
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
This document discusses evaluating trust and reputation using uncertain reasoning in mobile ad hoc networks (MANETs). It first defines trust, reputation, and uncertain reasoning. It then discusses different routing protocols used in MANETs like AODV, OLSR, and DSR. It also discusses security attacks in MANETs and how trust and reputation models can be used to address these issues. Finally, it discusses probabilistic reasoning and Dempster-Shafer theory as ways to handle uncertainty in evaluating trust and reputation.
This document analyzes the performance of three routing protocols - AODV, OLSR, and ZRP - under a blackhole security attack in a mobile ad hoc network (MANET). It defines the blackhole attack and describes how each protocol functions. Simulations are run in OPNET with 40 nodes using various performance metrics like network load, end-to-end delay, and packet delivery ratio. The results show that while all protocols are negatively impacted by blackhole nodes, AODV maintains the most consistent performance under attack compared to OLSR and ZRP.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Surveyijsrd.com
A Mobile Ad Hoc Network (MANET) is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Similar to A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.64-69
64
A Survey on Securing TORA for Detecting and Protecting
Against Sybil Attack in MANETs
Suraj Thawani1
, Hardik Upadhyay2
1
GTU PG School, Research Scholar, Ahmedabad, India.
2
GPERI, Assistant Professor, Ahmedabad, India.
Abstract:- Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Keywords: - Mobile Ad-hoc Networks, TORA, Security, Sybil Attack.
I. INTRODUCTION
A mobile ad-hoc network (MANET) is a non-aligned system of mobile routers and hosts connected by
wireless links [1]
. These nodes includes laptop, computer and wireless phones etc., have a limited conveyance
range. The routers are free to move randomly because it is a self-configuring infrastructure less network of
mobile device connected by wireless. Thus, the network is wireless topology that may change rapidly and
randomly. These networks are erect, work and maintained by its own because each node performs two role, one
for router and one for host. In MANET, each node search for the support of its neighbouring nodes to forward
packets in a peer-to-peer fashion with no cluster architecture. Because of this, most of protocol except that other
nodes are trustable reliable, so they do not consider the security and attack issues. In this, it is hard to determine
which node has really leaved the network, location changed or it has been blocked or intercepted.
A. MANET challenges [1]
1) Power Awareness:
In MANET, the node are run on batteries so there are limited power for processing.
2) Dynamic Topology:
In this, the network is self-organizing because nodes are mobile. Thus, the network keeps changing ever time in
the topology.
3) Quality of Service:
In environment, the constant QoS for different multimedia services is frequently changing.
4) Multicast Routing:
In multicast routing protocol, it is constantly changing the MANET environment.
5) Security:
Security is extremely important in scenarios such as a theatre. Security has main goals that are – availability,
confidentiality and integrity.
2. A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
65
B. Classification of Routing Protocols in MANETs
Routing protocols for mobile ad-hoc networks (MANETs) can be broadly classified into Reactive (on-
demand) routing protocol, Proactive routing protocol and Hybrid protocols. A routing protocol are used to
discover routing path between all the nodes [2]
.
Figure 1: MANETs Routing Protocols
In proactive routing protocol every node in the network has one or more routes to any possible
destination in its routing table at any given time. Proactive routing protocols includes Optimized Link State
Routing (OLSR), Destination Sequence Distance Vector (DSDV) and there are also other protocols like
Wireless Routing Protocol (WRP). Its main advantage is that it gives regular updates of data traffic.
In reactive routing protocol every node in the network obtains a route to a destination on a demand
fashion. Reactive protocols do not maintain up-to-date routes to any destination in the network and do not
generally exchange any periodic control messages. In this reactive routing protocol includes Ad-hoc On
Demand Distance Vector (AODV) routing and Dynamic Source Routing (DSR).
In hybrid routing protocol every node acts reactively in the region close to its proximity and
proactively outside of that region or zone. In this hybrid routing protocol includes Temporarily Ordered Routing
Protocols (TORA) and Zone Routing Protocol (ZRP).
C. Types of Attack in MANETs [8]
The security attacks in MANET can be classified into two major categories, i.e.; internal attacks and
external attacks.
-Internal Attacks:
In this type of attack, it initiated by the authorized node in the networks. It direct attacks on the node in
the specific working network. This type of attack broadcast the wrong information to the other nodes, then that
can be a misbehaving node or compromised node.
-External Attacks:
In this type of attack, it initiated from outside source, it doesn’t belong to the network. The attacker
attempts to cause network congestion, denying access to the specific network, or destroy the whole networks.
Many possible attacks in MANET that can be compromise the security of TORA in mobile ad-hoc
networks. They are
1) Impersonation:
This type of attacker can act as an original node and join the network, then after they control the full
network and conduct malicious behaviour. They spread fake routing information and they collect the secret
information from the nodes. If network doesn’t keep the proper authentication mechanism then it is vulnerable
to the networks.
3. A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
66
2) Denial of Service:
In denial of service, attacker first checks the specific node, if the node is not in the service then it
attacks in the entire network. So this type of attack may disturb the entire service of network.
3) Eavesdropping:
In this type of attack, the main goal of the attacker is to get some private information. Then it is being
transferred from one node to the other. This attack is very much complex, which finds the secret information of
the nodes and get compromised due to this attack.
4) Black Hole Attack:
In this, opponent traps the traffic at the main centre of the network close to a compromised. In this type
of attack, attacker offers an attractive path to the neighbouring nodes. A black hole attack is also paired with
other attacks like packets dropping, denial of service and etc.
5) Wormhole Attack:
In this, opponent connects two distant parts of the network and convey messages received in different
part of the network to the other. A lower latency link is used to pass the messages in this type of network.
6) Sybil Attack:
In this type of an attack, a particular node in the network makes a several different fake identities to get
the specific information about the network. Because of the malicious attack there is great decrease in the
multipath topology in routing, distributed storage, maintenance etc.
II. TEMPORALLY ORDERED ROUTING PROTOCOL ALGORITHM (TORA)
The author Park et.al. Presents TORA. Temporally Ordered Routing Protocol Algorithm (TORA) is a
highly modified, scalable and efficient distributed routing algorithm based on the concept of link reversal [4]
. It
uses mixture of reactive and proactive routing. TORA is able to provide multi-hop wireless network, which
routes freely to any destination originated on-demand routing protocol by modelling the entire network as a
Directed Acyclic Graph (DAG). Each nodes of links flow from higher height to lower height which is associated
with height [5]
. All the nodes will route to the destination. DAG is separately constructed for each destination. In
TORA, links between nodes are bi-directional, nodes are always aware of their neighbouring nodes. Packets are
received reliably in the correct order and then broadcasting is used. TORA has the main feature that very small
set of nodes are localized by control messages near the instance of topological change. Through the routing
information, nodes need to maintain the adjacent nodes. It has three basic functions [7]
:
-Route Creation
-Route Maintenance
-Route Erasure
A. Route Creation:
In route creation, all nodes start off with null height and links between the nodes are unassigned. It
initiates route creation when a node requires a route to a destination. A QRY (query) packet contains the
destination id of the node and the reply to the query is called update (UPD) packet. When a node get the
notification from the receiver as an update packet, then it makes the direct link to the sender. From this link,
route required is set, whenever packet wants to send the message it will directly send the message because route
is set to the destination. If link is break then it rebroadcast the query to find the node and sends the message.
B. Route Maintenance:
In route maintenance, it occurs only when all outgoing links breaks from the node which routes to a
destination. The detection of a link failure or link reversal can be affect by the update packet. When a node loses
its entire outgoing links through the detection of link failure then the node propagates an update packet which
reverses the links to all of its neighbouring node. When the nodes receive an update packet then it reverses the
links to their neighbouring nodes. In this route maintenance, links are reversed only for neighbouring nodes.
They do not have any out-going links and not performed any link reversal recently. Links are reversal repeated
till each of the node has at least one out-going link. In this process it ensures that the directed acyclic graph is
maintained to all nodes that routes at the destination. In route maintenance function of TORA, it has the main
problem that it produces a large amount of routing overhead. Because of large amount of routing overhead it
causes the network to reach the destinations. In route maintenance, our aim is to restrict the large amount of data
packet which are continues participating in data communication. From restricting the large amount data packet
in the network, it reduces routing overhead and allowing them for delivery of data packets.
4. A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
67
C. Route Erasure:
In route erasure, the packets are automatically clears because the node is participating in the network
without a route to the destination. Because of link failure in route maintenance, the nodes are undertaken to
check all of its out-going links. During the route maintenance, the update packet are sent by the node to reverse
the links of all its neighbouring nodes. In the maintenance, network do the partition in the nodes to find out the
route to the destination. If update packet is send back by another node then that node is route to the destination.
And, if the node is not found in the partition part of network then the route erasure is performed. Route erasure
clear packets in the network and its neighbour’s links are unassigned. Through the clear packets all the routes
are erase in the network which are unreachable to the destination.
Advantages:
In TORA multiple routes are supported between sources to destination. If the node fails or removes that
node is quickly resolved without source involvement by switching to an alternate route to improve
blockage.
In TORA communication overhead and bandwidth utilization is minimized because it does not require a
periodic update.
Link status sensing and neighbour delivery, dependable, order packet delivery and security
authentication are the support of TORA.
Disadvantages:
In ad-hoc network, nodes are depended on the synchronized clocks.
The link status sensing, neighbour discovery, order packet delivery and address resolution are used to run
IMEP (Internet MANET Encapsulation Protocol) on the intermediate lower layer below the TORA.
It’s difficult to separate from the lower layer because this has makes the protocol overhead.
Characteristics:
Distributed
Loop-free routing
Multi-path routing
Minimization of communication overhead via localization of algorithmic reaction to topological changes
III. SYBIL ATTACK
The author Gong Jun Yan et.al. Presents Sybil attack. In present, Sybil attack is the serious threat in ad-
hoc networks. In Sybil attack, attacker makes the multiple identities in the network as a malicious node with the
several address. Each nodes in the network has given unique address. It make fake identities in the network to
collect the private information from the nodes. It only occurs when one node is connected to other node to
breaks the link and collects the information from the nodes. This type of attack behaves like an original node as
a malicious node and it affect the network because it makes infinite number of fake identities on one physical
device. Because of fake identities it harms the environment and damages the many application in the network [3]
.
A. Three taxonomies for Sybil Attack [9]
:
1) Direct and Indirect Communication:
In the direct communication, the Sybil node and the authentic node communicate with each other
directly. This means, when authentic node sends the message to the Sybil node then malicious node listen to this
node. When any message sent from the Sybil node it is actually from the malicious node device to collect the
particular information the network. In this direct validation, it test the node directly whether the other node is
valid or not.
In the indirect communication, Sybil node is not communicating directly with the authentication node
they actually communicate with one or more malicious node to reach the Sybil node at the destination. In this
indirect validation, in which nodes that have already been verified are allowed as invalidate for other nodes.
2) Fabricated and Stolen Identities:
In Sybil node, there are two different ways to get the identity. It can be fabricated identity or it can steal
an identity from one of the authentic nodes.
In fabricated identities, if there is no restricted identity or some way to verify that an identity is
authentic, then malicious node simply identify random node and join the network.
In stolen identities, if there is possibilities of joining the network through the fake identities, then the
attacker try to assign authentic identities to the Sybil nodes. Then this identity theft may be ignored through the
disabling the fraud nodes.
5. A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
68
3) Simultaneity:
In simultaneous attack, the attacker tries to participate all the Sybil nodes in the network once at the
same time.
In non-simultaneous attack, the attacker tries to participate all the Sybil nodes in the network, but at the
given time only several identities can participate in network. The attacker detects the identity, which identity is
going and which one is entering in the network.
In Sybil attack, it is serious impact of detecting the Sybil attack in network and protect the network
from the attackers.
B. Forms of Sybil Attacks [6]
:
1) Routing:
In ad-hoc network, Sybil attack can disrupt the routing protocol by participating in network, especially
in location-based or multipath routing mechanism. This multipath routing attacks as a single attacker, but there
is also another routing protocol which makes more than one identity of malicious node at same places and at
same time i.e.; geographical routing.
2) Distributed Storage:
In this type of attack, it makes multiple identities of node on the network to collect the data from the
system. It uses peer-to-peer communication, in which malicious node behaves as an original node to collect the
data from the file storage system
3) Data Aggregation:
A few network protocol use the same value of data aggregate instant of other value in network. It
harms the reading of aggregation by using the same aggregation value.
4) Fair-Resource Allocation:
In this type of attack, it shares the unfair resource to the nodes from malicious nodes through different
identities in the network. While sharing the resource through the malicious node is attack to the nodes.
5) Voting:
In this environment, when the voting scheme is place for reporting or identifying the node, it make
several node of multiple identities in the network. Sybil attack is done by making multiple identities for voting
in this system.
IV. COUNTERMEASURES AGAINST SYBIL ATTACK
Sybil attack is the fundamental problem in many systems. In a wired context, peer-to-peer applications
is done. Away from the attacker, detection and protection is done below [9]
:
A. Trusted Certification:
In the trusted certification, it is common solution due to its potential to completely remove Sybil
attacks. In this each node has its own identity through which it indicates guarantees the certificate. There is no
method for ensuring uniqueness, it is performed by manual configuration. This configuration can be costly and
there is large-scale of restriction in systems. But it guarantees the existence to detect and protect against the fake
identities which are stolen or lost. It is difficult to implement in ad-hoc networks because it requires lack of
infrastructure.
B. Trusted Devices:
This device combined with the trusted certifications to make one hardware device in one network entity.
There is main issue that from multiple hardware device it cannot prevent one entity, it can only make one entity
in network through manual intervention.
C. Domain Specific:
In domain specific, there are some countermeasures that are applications. For example, detection of
each node is based on the location in the mobile ad-hoc networks. In the Sybil attack, all the identities move
together with single device. In mobile networks there is no defense applicable.
D. Resource Testing:
In resource testing, there is limited bandwidth for each physical entity of a resource. All the resources
of identities are independent with each other. In this verifier tests the identities, that all the physical entities are
6. A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs
69
different with the independent physical device. This checks computing power, storage ability and network
bandwidth. This technique is done by SybilGaurd, which relies limited availability of nodes.
E. Recurring Costs and Fees:
In this technique, testing is done in the limited number of Sybil nodes and given a time of period. In
Sybil attack, charging a fee for each identity is more effective but one time fees suffer only a constant cost.
F. Computational Resource Testing:
In this testing, nodes in the network uses limited computational power. Nodes have a limit power on
the number of crypto-puzzles at the time period. This crypto-puzzles is solved by the cryptographic problem by
the calculation in the certain amount of time.
G. Radio Resource Testing:
In this radio resource testing, nodes only possess one radio device with the limitation of devices. Take
the example of limitation, that incapability of a radio simultaneously transmitting in two different frequencies.
V. CONCLUSIONS
Mobile Ad hoc Networks (MANETs) have received growing research attention in recent years. Mobile
ad hoc networks are wireless networks that use multi-hop routing alternatively of constant networks base to
provide network connectivity. The work is done towards to securing TORA in MANET. Temporarily Ordered
Routing Protocol (TORA) is a distributed routing algorithm that is based on a family of link reversal algorithms.
Sybil attack is an injurious attack in MANETs, attacker makes the multiple identities in the network as a
malicious node with the several address. Each nodes in the network has given unique address. It make fake
identities in the network to collect the private information from the nodes. The method to detect and protect
against Sybil attack is testing the resource certificate authority.
REFERENCES
[1]. H. Ehsan, F. A. Khan, “Malicious AODV: Implementation and Analysis of Routing Attacks in
MANETs”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and
Communications, 2012.
[2]. Rajeswari M., Dr. P. U. Maheswairi, Bhuvaneshwari S., Gowri S., “Performance analysis of AODV,
DSR, TORA and OLSR to achieve group communication in MANET”, IEEE 4th International
Conference on Advanced Computing, December 2012.
[3]. S. Abbas, M. Merabti, D. Llewellyn-Jones, K. Kifayat “Lightweight Sybil Attack Detection in
MANETs” IEEE System Journal, June 2013.
[4]. A. K. Gupta, Dr. H. Sadawarti, Dr. A. K. Verma “Performance analysis of AODV, DSR & TORA
Routing Protocols” IACSIT International Journal of Engineering and Technology, April 2010.
[5]. K. H. Lim and A. Datta “An In-depth Analysis of the Effects of IMEP on TORA Protocol” IEEE
Wireless Communications and Networking Conference: Mobile and Wireless Networks, 2012.
[6]. Sowmya P., V. Anitha “Defence Mechanism for Sybil Attacks in MANETS using ABR Protocol”
International Journal of Advanced Computer Research, June-2014.
[7]. K. H. Lim and A. Datta “Enhancing the TORA Protocol using Network Localization and Selective Node
Participation” IEEE 23rd International Symposium on Personal Indoor and Mobile Radio
Communication (PIMRC), 2012.
[8]. M. Pandya, A. Shrivastava and R. Gandhi “Improvising the Performance with Security of AODV
Routing Protocol in MANETs” Nirma University International Conference on Engineering (NUiCONE),
2013.
[9]. D. Monica “Thwarting the Sybil Attack in Wireless Ad-hoc Networks” INSTITUTO SUPERIOR
TECNICO (IST), July 2009.