IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
This document discusses performance evaluation of Spanning Tree Protocol (STP) across Layer 2 VLANs. It begins with an introduction to STP and VLANs, explaining how STP prevents switching loops and VLANs logically segment networks. The document then details an experiment conducted using real networking devices to analyze STP performance under different STP modes (PVST, MST, RPVST), with a focus on security and loop prevention. Results are evaluated to determine the best STP mode for a given network configuration.
This document discusses detecting sequence number collector problems in black hole attacks in AODV-based mobile ad hoc networks. It begins with background on mobile ad hoc networks (MANETs) and characteristics such as dynamically changing topologies. It then discusses the AODV routing protocol and describes black hole attacks, where a malicious node advertises itself as having the shortest path. The problem is that a malicious node can act as a sequence number collector to obtain numbers from many nodes. The proposed solution classifies nodes into categories based on behavior and isolates malicious nodes from routing and forwarding. Associations between nodes are then used for route selection to increase security while encouraging cooperation.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
This document discusses performance evaluation of Spanning Tree Protocol (STP) across Layer 2 VLANs. It begins with an introduction to STP and VLANs, explaining how STP prevents switching loops and VLANs logically segment networks. The document then details an experiment conducted using real networking devices to analyze STP performance under different STP modes (PVST, MST, RPVST), with a focus on security and loop prevention. Results are evaluated to determine the best STP mode for a given network configuration.
This document discusses detecting sequence number collector problems in black hole attacks in AODV-based mobile ad hoc networks. It begins with background on mobile ad hoc networks (MANETs) and characteristics such as dynamically changing topologies. It then discusses the AODV routing protocol and describes black hole attacks, where a malicious node advertises itself as having the shortest path. The problem is that a malicious node can act as a sequence number collector to obtain numbers from many nodes. The proposed solution classifies nodes into categories based on behavior and isolates malicious nodes from routing and forwarding. Associations between nodes are then used for route selection to increase security while encouraging cooperation.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
This document discusses minimizing the Gray-Hole attack in mobile ad-hoc networks. It proposes a method called Denial Contradictions with Fictitious Node Mechanism (DCFM) which uses internal network knowledge to identify potential malicious nodes trying to falsify routing information without relying on external trusted parties. DCFM works by checking for logical inconsistencies between a node's routing messages and the actual network topology to detect attacks. The paper analyzes how DCFM can help detect Gray-Hole attacks under the Optimized Link State Routing protocol and reduce packet dropping compared to other approaches through early identification of malicious nodes. Simulation experiments demonstrate the effectiveness of DCFM at minimizing the Gray-Hole attack in ad-hoc
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
This document summarizes and compares several application-independent multicast routing protocols for mobile ad hoc networks (MANETs). It discusses the key challenges in designing multicast routing protocols for MANETs, including robustness, efficiency, control overhead, and dependency on unicast routing. It also presents a reference model architecture for multicast routing protocols and classifications based on topology (tree-based vs. mesh-based) and approach (reactive vs. proactive). Several specific multicast routing protocols are described, including AMRoute, AMRIS, and ODMRP, focusing on their mechanisms for group management, tree/mesh construction, and maintenance in dynamic network conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document proposes a Tiered Authentication scheme called TAM for multicast traffic in ad-hoc networks. TAM exploits network clustering to reduce overhead and ensure scalability. Within a cluster, one-way hash chains authenticate message sources by appending an authentication code to messages. Between clusters, messages include multiple authentication codes based on different keys from the source to authenticate it. TAM aims to securely deliver multicast traffic while addressing challenges like resource constraints and packet loss in ad-hoc networks.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
This document analyzes the performance of the AODV routing protocol under wormhole attacks in a mobile ad hoc network (MANET) simulation using NS2. It first provides background on MANETs, AODV, and wormhole attacks. It then describes the NS2 simulation setup of 16 nodes using the AODV protocol with and without two malicious nodes creating a wormhole. The results show that without a wormhole, packets are successfully delivered to the destination, but with the wormhole, zero throughput is achieved as the malicious nodes drop all packets, preventing delivery to the destination. Therefore, wormhole attacks significantly disrupt routing in AODV-based MANETs.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that analyzed attribute association in heart disease using data mining techniques. The paper proposed a new measure called AA(I) to quantify the strength of association among attributes in a dataset. The measure was applied to both frequent and infrequent itemsets. The dataset contained 1897 subjects characterized by 21 attributes related to demographics, medical history, and lab tests. Analysis found that risk of cardiovascular disease was higher in males aged 56-65. The proposed association measure could help predict diseases like heart attacks by identifying relationships between comorbid attributes. Future work aims to test the measure on larger health datasets and compare its performance to other algorithms.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
This document discusses minimizing the Gray-Hole attack in mobile ad-hoc networks. It proposes a method called Denial Contradictions with Fictitious Node Mechanism (DCFM) which uses internal network knowledge to identify potential malicious nodes trying to falsify routing information without relying on external trusted parties. DCFM works by checking for logical inconsistencies between a node's routing messages and the actual network topology to detect attacks. The paper analyzes how DCFM can help detect Gray-Hole attacks under the Optimized Link State Routing protocol and reduce packet dropping compared to other approaches through early identification of malicious nodes. Simulation experiments demonstrate the effectiveness of DCFM at minimizing the Gray-Hole attack in ad-hoc
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
This document summarizes and compares several application-independent multicast routing protocols for mobile ad hoc networks (MANETs). It discusses the key challenges in designing multicast routing protocols for MANETs, including robustness, efficiency, control overhead, and dependency on unicast routing. It also presents a reference model architecture for multicast routing protocols and classifications based on topology (tree-based vs. mesh-based) and approach (reactive vs. proactive). Several specific multicast routing protocols are described, including AMRoute, AMRIS, and ODMRP, focusing on their mechanisms for group management, tree/mesh construction, and maintenance in dynamic network conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document proposes a Tiered Authentication scheme called TAM for multicast traffic in ad-hoc networks. TAM exploits network clustering to reduce overhead and ensure scalability. Within a cluster, one-way hash chains authenticate message sources by appending an authentication code to messages. Between clusters, messages include multiple authentication codes based on different keys from the source to authenticate it. TAM aims to securely deliver multicast traffic while addressing challenges like resource constraints and packet loss in ad-hoc networks.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
This document analyzes the performance of the AODV routing protocol under wormhole attacks in a mobile ad hoc network (MANET) simulation using NS2. It first provides background on MANETs, AODV, and wormhole attacks. It then describes the NS2 simulation setup of 16 nodes using the AODV protocol with and without two malicious nodes creating a wormhole. The results show that without a wormhole, packets are successfully delivered to the destination, but with the wormhole, zero throughput is achieved as the malicious nodes drop all packets, preventing delivery to the destination. Therefore, wormhole attacks significantly disrupt routing in AODV-based MANETs.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that analyzed attribute association in heart disease using data mining techniques. The paper proposed a new measure called AA(I) to quantify the strength of association among attributes in a dataset. The measure was applied to both frequent and infrequent itemsets. The dataset contained 1897 subjects characterized by 21 attributes related to demographics, medical history, and lab tests. Analysis found that risk of cardiovascular disease was higher in males aged 56-65. The proposed association measure could help predict diseases like heart attacks by identifying relationships between comorbid attributes. Future work aims to test the measure on larger health datasets and compare its performance to other algorithms.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document proposes a new negative edge triggered flip-flop circuit called the Switching Transistor Based D Flip-Flop (STDFF) that reduces power consumption and area compared to conventional D flip-flops. The STDFF uses only 8 transistors compared to other designs, reducing power usage by 85% and area by 40%. Simulations show the STDFF operates correctly as a negative edge triggered flip-flop with reduced delay. It is proposed that this low power design is suitable for battery-powered mobile devices.
This document describes the design of a low power multiserial to Ethernet gateway for unmanned aerial vehicle data acquisition systems. The gateway uses an FPGA and Ethernet controller chip to interface with multiple serial devices and transmit the data over Ethernet. The FPGA implements UART modules to interface with sensors and an ADC. It collects data from the serial devices and sends it to the Ethernet module packed in Ethernet frames. This simplifies wiring and allows the data to be transmitted to the ground station computer over Ethernet for processing and storage.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a study on the effects of elevated temperatures on the compressive and splitting tensile strengths of ultra-high strength concrete. Cubes and cylinders of M100 grade concrete were exposed to temperatures between 50-250°C for durations of 1-4 hours. Testing found that compressive and splitting tensile strengths initially increased with temperature up to 100°C but then decreased with further increases in temperature. The maximum strengths were observed when specimens were heated to 100°C for 1 hour. Understanding how high-strength concrete properties change after fire exposure can help determine the load capacity of damaged structures.
This document summarizes a research paper on color image enhancement using an adaptive filter. It proposes a new algorithm that uses an adaptive filter to obtain the background image from a video based on color information. It then performs adaptive adjustment on the luminance image to get a locally enhanced image. Finally, it applies color restoration to obtain the enhanced color image. The algorithm aims to better preserve color information and reduce halo effects compared to techniques using discrete wavelet transforms. Experimental results show the adaptive filter produces clearer details and more natural colors in enhanced images and video frames.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document discusses using video compression techniques to compress multichannel neural signals. It proposes using a multiwavelet transform to decorrelate the signals, followed by vector quantization to exploit correlations between electrodes. Motion estimation and compensation are also used to reduce redundancy between successive neural frames by determining motion vectors, similar to how video compression analyzes frame-to-frame motion. The goal is to significantly reduce the large amounts of neural data for easier wireless transmission without degrading quality.
This document summarizes a research paper that proposes a secure communal verification and key exchange scheme for mobile communications. The scheme uses nested one-time secrets, with an outer secret shared between a user and the home location register, and an inner secret shared between a user and the current visited location register. This allows for efficient verification when a user does not change locations, reducing computation costs. The scheme aims to improve security and performance over existing verification schemes for mobile networks. It uses different verification mechanisms like timestamps, one-time secrets, and nonces depending on the situation to optimize efficiency.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document discusses using the Expectation Maximization clustering algorithm for text summarization. It begins with an introduction to text summarization and natural language processing. It then describes implementing Expectation Maximization clustering on text that has undergone natural language processing steps like splitting, tokenization, part-of-speech tagging, and parsing. This clusters similar sentences based on their similarity values from the distance matrix. The clustered sentences can then be used to generate a summary by selecting the most representative sentences.
El documento describe varias fotos de la familia y amigos del autor, incluyendo fotos con su familia, una amiga, en el cerro, su hermana de bebé, con amigos en Semana Santa y en el estadio, asi como fotos de su mascota Rocky el perro. El trabajo fue presentado por Carlos José Hernández.
Tracking gratuito de tiempo para freelance y emprendedores toggl - solucion...Soluciona Facil
Este documento presenta una herramienta gratuita para el seguimiento de tiempo para freelancers que permite registrar tareas, proyectos y clientes de forma sencilla en diferentes sistemas operativos e incluye una versión web con gráficas e informes. La herramienta sincroniza la información en todos los dispositivos.
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
The document summarizes research on secure routing protocols for data transmission in ad hoc networks. It discusses five main points:
1) It examines security threats to ad hoc routing protocols like AODV and proposes ARAN, an authenticated routing protocol that detects malicious actions through authentication, integrity checks, and non-repudiation.
2) It discusses implementing end-to-end security on mobile devices using the TLS protocol to secure transmissions.
3) It proposes OLSR, an optimized link-state routing protocol for large, dense ad hoc networks that reduces control packet sizes and flooding.
4) It develops a security mechanism using digital signatures and hash chains to secure AODV routing messages and
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
The document discusses secure data communication protocols for mobile ad-hoc networks (MANETs). It proposes two protocols: Secure Message Transfer (SMT) and Secure Single-Path Protocol (SSP). SMT transmits data over multiple paths simultaneously using redundancy to ensure delivery even if some paths fail. SSP has lower overhead by using a single path but provides reliability comparable to SMT. The protocols provide end-to-end security without trusting intermediate nodes and can maintain reliable low-latency communication even when many nodes disrupt data transfers maliciously or unintentionally. Evaluation shows SMT delivers over 93% of messages without retransmission, even with 50% of nodes failing, and over 98% with limited retransmissions if
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
This document proposes a system to optimize routing and prevent denial of service attacks in wireless networks. It aims to detect distributed denial of service (DDoS) attacks using a classifier system called CS_DDoS that classifies packets as malicious or normal. Malicious packets will be blocked and their IP addresses blacklisted. It also aims to use a hybrid optimization system (HOS) for efficient, quality routing to increase network lifetime and user communication. The system is designed to differentiate between genuine and malicious traffic, transfer data via alternative paths if attacks are detected, and balance network load for stable data transfer while improving packet delivery and throughput.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
This document proposes a multipath routing protocol for wireless mesh networks that uses a parallel layer-based approach and breadth-first search algorithm to discover multiple paths between a source and destination. It organizes nodes into layers based on distance from the destination and performs iterative breadth-first searches to find partial paths connecting nodes in lower layers, storing the partial paths. This process repeats until reaching the destination to find all possible paths. The primary path is then elected using an Expected Forwarding Counter metric to select the most reliable path. The protocol was evaluated in NS-2 and showed improved throughput, delivery ratio, and reduced delay compared to other protocols.
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Kw2418391845
1. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
Similarities & Differences of Mobile Adhoc Network Routing
Protocols
*Santhoshkumar.H.P,
Under the Guidance of Prof.Sameena Banu
*M.Tech (CSE) K.B.N.C.E., Gulbarga, Affiliated to VTU, Belgaum, Karnataka
ABSTRACT
The advantage of Mobile Ad-hoc which require a protocol with reasonable
Networks (MANETs) is to form a wireless security and reasonable resistance to DOS, a
network in the absence of fixed infrastructure. kind of middle-ground. It has been suggested
Early stages of routing protocols of MANETs that various trust mechanisms could be used to
were, incapable of handling security issues but develop new protocols with unique security
by the introduction of newer techniques like assurances at different levels in this trade- off
cryptographic techniques enabled them to [5,27]. However, the arguments for this have
handle the routing information securely. The been purely theoretical or simulation-based.
present paper details the newly proposed Determining the actual span of this trade-off
SAODV and TAODV and further compares the inreal world implementations is of utmost
same with the existing MANET routing protocols importance in directing future research and
protocol design.
Keywords - Mobility, Ad-hoc, Security, Routing, In this paper considers two proposed protocol
Cryptography, TAODV, SAODV Performance. extensions to secure MANET routing. The first,
SAODV [25], uses cryptographic methods to
I. INTRODUCTION secure the routing information in the AODV
In traditional wireless networks, a base protocol. The second, TAODV [15], uses trust
station or access point facilitate communications metrics to allow for better routing decisions and
between nodes with in the network and penalize uncooperative nodes. While some
communications with destinations outside the applications may be able to accept SAODV’s
network. In contrast, MANETs forms a vulnerability to DoS or TAODV’s preventative
network in the absence of fixed infrastructures. security, most will require an intermediate
The requirement of these networks is only nodes protocol tailored to the specific point on the
that can interact with radio hard wares so as to DoS/security trade-off that fits the application. The
route the traffic using the routing protocol. Thus tailored protocols for these applications will also
the reduced essential requirement s of such require performance that falls between that of
networks, along with their adoptability into tiny SAODV and TAODV. Understanding how the
resource-limited devices made them more popular SAODV and TAODV protocols (which are on
and is much preferred for several applications in the boundaries of the DoS/security trade-off)
the area of communications. Routing protocols perform on real hardware, and to what extent there
determines the nature of data forwardness as exists a performance gap is a prerequisite for being
well as its adaptability to topology changes that able to develop the intermediate protocols. Such
results by mobility. Initial MANET routing evaluation is not only required for
protocol like AODV [18], was not designed to developing intermediate protocols, but also for
withstand malicious nodes within the network or determining the direction for development of new
outside attackers near by with malicious intent. trust metrics for ad- hoc networks. In this
Subsequent protocols and protocol extensions paper we provide the first performance
have been proposed to address the issue of evaluations for these protocols on real world
security [1,2,8,14,20,24,25,26]. Many of these hardware
protocols seek to apply cryptographic methods
to the existing protocols in order to secure the II. RELATED WORK
information in the routing packets. This attack is Several different protocols have been
very effective in MANETs as the devices often proposed for ad-hoc routing. The earliest protocols
have limited battery power in addition to the such as DSDV [19], DSR [11], and AODV [18]
limited computational power. The trade-off focused on problems that mobility presented to
between strong cryptographic security and DOS the accurate determination of routing
(Denial of service) has become increasingly information. DSDV is a proactive protocol
important as MANET applications are developed requiring periodic updates of all the routing
information. In contrast, DSR and AODV are
1839 | P a g e
2. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
reactive protocols, only used when new implemented each of them on real hardware
destinations are sought, a route breaks, or a route is and measured their performance. In this section
no longer in use. As more applications were we detail the setup for the experiments used to
developed to take advantage of the unique acquire these measurements. We first describe the
properties of ad-hoc networks, it soon became supporting hardware and software setup for our
obvious that security of routing information was implementations. We then present details on the
an issue not addressed in the existing protocols. actual implementation for each of the three
In [13], Lundberg presents several potential protocols. Finally we detail the design of
problems including node compromise, the experiments used to evaluate the protocols and
computational overload attacks, energy explain why these tests are more relevant than
consumption attacks, and black hole attacks. Deng other more common metrics.
et al. further discuss energy consumption and
black hole attacks along with impersonation Our AODV implementation is the result
and routing information disclosure in [3]. of previous paper in this area. The implementation
Jakobsson et al. categorize attacks as is designed to run on the Linux/windows x
manipulation of routing information and operating system. As with many other AODV
exhaustive power consumption, and provide implementations for Linux/winX, it separates
detailed treatments of many characteristic attacks in functionality into a kernel module and a user space
[10]. daemon. The kernel module uses hooks in the net
filter interface to send packet headers from the
While research has focused on wireless interface to the user space daemon. The
“lightweight” security mechanisms, some daemon then determines how to handle the packet.
proposed protocols use more expensive If the packet is a routing control packet, then the
asymmetric cryptography. In [26], Zhou and Haas daemon processes the packet in accordance with the
present a multi-path protocol extension that AODV specification. If instead the packet is a
uses threshold cryptography to implement the data packet, the daemon determines whether or
key management system. It requires some nodes not a route exists to the necessary destination. If
to function as servers and an authority to initialize there is a suitable route, the packet is flagged and
these servers. Zapata and Asokan propose the kernel module queues it to be sent out. If no
SAODV [25], a secure version of AODV, route exists, the daemon begins route discovery.
which uses digital signatures and hash chains Once a route is found, the daemon enters the route
to secure the routing messages. into the kernels routing table. It then flags the
packet (and any additional packets arriving
In [22], Pissinou et al. propose a trust- during discovery) to be queued for
based version of AODV using static trust levels. transmission. The implementation is written
The same authors then extend this protocol in completely in Java.
[7] to thwart multiple colluding nodes. Neither
of these adress securing the trust exchanges, or the
overhead involved. Li et al.introduce a trust-
based variant of AODV in [12] that secures the
trust information. However, their protocol
requires an intrusion detection system in the
network. Finally, Meka et al. propose a third
trusted AODV with a simple method of
evaluating trust even without source routing [15].
Our work in this paper considers Figure-1 : Network setup for round trip
the asymmetric cryptography and trust-based timings
extensions to AODV presented in [25] and
[15] respectively and shows a real world In order to implement SAODV, it was
comparison of the performance of the two necessary to have a library of cryptographic
protocols. Our results suggest that new protocols operations. We used Open SSL for this purpose,
can be developed which take advantage of the and we developed a security library which
best features of both types of protocols, and which wrapped much of Open SSL’s
share aspects of each security model. functionality into components appropriate for ad-
hoc routing purposes. One particularly useful
III. IMPLEMENTATION feature of the security library is that it allows
In order to get an understanding for easy use of several different OpenSSL contexts
the real world performance of the AODV, at once. For SAODV, this was useful as nodes
SAODV, and TAODV protocols, we have must switch between signing, verifying, and
1840 | P a g e
3. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
hash chain operations rapidly to both send and Implementing TAODV required many
receive routing messages. New data structures additions similar to those involved in SAODV.
were added for SAODV’s single signature New data structures were used for the NTT as
extension and the necessary code was added to the well as the extended messages and the new R
message processing functions for RREQ, ACK message. Similarly, message handling
RREP, HELLO, and RERR messages. The functions were updated to use the extensions and
design of the AODV implementation allowed take the appropriate actions. One challenge in
SAODV functionality to be implemented while implementing TAODV was counting packets
maintaining one binary with the ability to sent, forwarded, or received for a particular
run both protocols. route. While it intuitively seems to be something
that should be implemented in the kernel
module that is already tied into the net filter
framework, this would require extra data
exchange between the kernel module and the
daemon. Since our implementation already
passes packet headers to the daemon for route
discovery initiation and flagging, it was simply
necessary to place the counting mechanism in
the daemon.
Keeping track of the additional
routing information required significant extension
Fig 2: Trusted center for Both the protocols of our AODV implementation. The original
implementation does not support any multi-
path entries in the routing table. Modifying
it to support such a setup for TAODV would
have required rewriting significant amounts of
the base AODV code. Instead, we implemented a
multi-path capable routing table for use
exclusively by the TAODV protocol. When a
node initially discovers a route, or changes the
active route to a particular destination, it merely
copies the necessary entry to the daemon’s
local routing table and marks it as having been
Fig 3: Using the TAODV send the message altered so that it is updated in the kernel’s
routing table at the next sync. This simplified
the implementation using only a negligible
amount of extra memory.
3.1 Testing
There were two performance factors we
were interested in for the purposes of this
comparison. The first is the per- packet processing
overhead. It is important to note that only CPU time
Fig 4: Using the TAODV receive the message was measured. Therefore this overhead reflects
use of the processor by each protocol. In these tests
we use AODV as a baseline. Thus, for SAODV
we measure the time it takes to generate an SSE
for RREQ, RREP, and HELLO messages. We
also measure the time it takes for a node to verify
an SSE for those same messages. For
TAODV we measure how long it takes a node to
generate or process and update RREP and R ACK
messages. Due to the fact that some of the
operations we measure have a runtime less than
the resolution of our timer (5ms as per the Linux
kernel), we perform a large number of operations
back-to-back per measurement. We then make
Fig 5: Using the SAODV send the message multiple measurements.
1841 | P a g e
4. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
Obviously, this can place a significant burden on
Operation Processin Std.Devation each node.
g
SSE 25.8
Time(ms) 0.18 Operation Processin Std.Devati
Generatio g Time on
SSE
n 2.6 0.06 RReq/Hello Send
Validatio 0.354 0.019
n
RReq/ Hello
Our second performance metric is round Processing 0.3545 0.019
trip time for route discovery. The justification for
R Ack Send 0.193 0.003
this metric lies in the fact that we are looking at
securing the routing control packets. Once a route
is established, data is forwarded with the same RAck Proces
efficiency regardless of the routing protocol. 0.210 0.004
Therefore, it is important to see how the per- Since SAODV requires that each message with
packet overhead along with the increased packet a SSE is validated before any further processing
size affect the time for route discovery. For this takes place, each RREQ and RREP gets delayed
test, we measure the performance of AODV in 3.8 milliseconds at each hop which forwards it. In
addition to that of SAODV and TAODV. This is addition, HELLO messages take the same
necessary because both AODV and TAODV will amount of time to be validated. While nodes are
generate RREPs after fewer hops when the supposed to let ALLOWED HELLO LOSS *
destination’s neighbor responds, while SAODV HELLO INTERVAL milliseconds pass before
requires that the destination itself responds. For deciding a link is broken and a neighbor should
our experiments, we used a five node be removed from its routing table, it is
network consisting of one laptop and four conceivable that on a node with several
Zauruses as illustrated in Figure 1. We used the neighbors and a large amount of data to
network sniffer ethereal [6] running on the laptop forward, route status may ßuctuate for some
to measure the time elapsed from the sending of neighbors whose HELLO packets get delayed in
the RREQ to the receipt of the RREP. validation.
VI. RESULTS In TAODV, we measure the per-packet
For the per-packet overhead tests, we overhead for RREP, HELLO, and R ACK
measured the amount of processing time a node messages. The system-wide parameters discussed
spends above and beyond that required for in [15] do not influence the overhead of TAODV
conventional AODV. All tests were performed on for any of the tests we performed. However, it was
the Zauruses with only the necessary software necessary to fix these values to allow for
running (i.e., no graphical login manager, no X the calculation of RSV. For all TAODV tests
server, etc.). In the SAODV tests, we measure we used the following system-wide parameter
generation and validation of the SSE which values: i = 0.8, p= 0.6, ph = 0.4, pc = 0.2, α1= 0.4,
requires hash computation and a digital α2= 0.4, and α3= 0.2. Due to the very small
signature/verification. The hash function used for running time of the operations, one million
these tests was MD5 and the digital operations were performed per measurement and
signature/verification was performed using a 5000 measurements were taken. Table 2 shows the
256-bit RSA key pair. There were 1000 operations results for the TAODV tests.
run per measurement and 1000 measurements
overall. Table 1shows the results of our SAODV As the results show, there is much less
tests. per-packet overhead for TAODV when compared
to SAODV. The main source of overhead involved
Consequently, in order to send a RREQ, the R ACK packets. Since the R ACK
RREP, or HELLO message, the node spends packets are new packets rather than packet
30.8 milliseconds generating the SSE. The extensions, it was necessary to allocate a packet
significant impact on performance occurs in buffer in the message sending system of our
generating the SSE for HELLO messages since implementation each time a R ACK packet was to
they are sent periodically. According the to be sent. With other messages that were extended,
AODV specification, a node should send a HELLO the packet buffer was already allocated and the
message every HELLO INTERVAL milliseconds extension was simply written into free space at
unless it has broadcast any messages during the the end. This difference contributed
previous interval. This means that only RREQ and significantly to the 0.193ms overhead for sending
RERR messages could prevent sending a HELLO the R ACK message.
message, as all other messages are unicast.
1842 | P a g e
5. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
These results show that SAODV is
indeed a significantly more expensive protocol.
Table 4: Performance of SAODV
Specifically, SAODV takes 2.35 times as long as
conventional AODV to get a RREP back to a
RREQ originator. This is due, in part, to the
added cryptography and increased message size.
This is also due to the inability of intermediate
nodes to respond to RREQs. Traversing the
additional hop in both directions adds to the
latency.
The results also show that the use of
SAODV will require adjustments to the
Table 5: Comparison of SAODV & TAODV recommendations for configurable parameters
in AODV. This is missing from the current draft
The overhead for processing the R ACK standard for SAODV. For example, the current
message was almost completely due to the suggested NODE TRAVERSAL TIME is 40ms
recalculation of the OTV and RSV values. The which results in NET TRAVERSAL TIME being
TAODV implementation used double primitives set to 1400ms. The value of NET
for all calculations in order to keep with the TRAVERSAL TIME serves as the timeout for
protocol description in [15]. RREQ messages. Consequently, as per the
results above, if these parameters were not
4.1 Comparison results adjusted, nodes would have problems discovering
The round trip tests for route discovery routes of length greater than ten hops.
were performed for all three protocols. This was
particularly important due to the differences in In some applications this may not
which node sends the RREP as described in Section cause problems. However, in certain
4.1. Due to the nature of the measurements, only applications such as large area sensor networks,
one route discovery operation could be routes of this length or greater would not be
executed per measurement. Overall 5000 unreasonable to expect. TAODV, on the other
of these individual measurements were hand, takes only 1.11 times as long as AODV.
performed. Table 3 shows the results of the tests. This shows that the trust- based calculations and
additional information exchange can be used
without incurring the overhead of SAODV.
Protocol Round Std.Deviation While there is some expense for the trust
Trip time calculations, it is not nearly as expensive as
AODV 138.772 0.765 the cryptographic operations. The results show
SAODV 124.341 0.543 that TAODV is indeed at the opposite end of the
TAODV 172.553 0.832 trade-off from SAODV. This is due to the fact
that the TAODV information itself in each packet
Table 3 Round Trip Time is not secured.
Overall, the results show that there is
indeed a wide spectrum in the tradeoff between
cryptographic security and DoS. By adding an
appropriate lightweight security mechanism to
secure the trust information in the routing
packets, a hybrid protocol can be created
which is less expensive than SAODV and more
1843 | P a g e
6. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
secure than TAODV. Future protocol designs
should seek to use various new combinations [7]. Y. Hu, D. Johnson, and A. Perrig.
of smarter, trust-based metrics and SEAD: Secure efficient distance vector
lightweight security mechanisms in order to routing for mobile wireless ad hoc
develop hybrid protocols across this spectrum networks. Ad Hoc Networks, I:175–192,
2003.
V. CONCLUSION
In this paper, we have compared the [8]. M. Jakobsson, S. Wetzel, and B. Yener.
SAODV and TAODV protocols for securing Stealth attacks on ad hoc wireless
ad-hoc network routing. We presented the networks. In Proceedings of VTC,
results of implementation and evaluation of both 2003, 2003.
protocols. The expected difference between the
two protocols was shown to be consistent with [9]. D. B. Johnson and D. A. Maltz.
this real world scenario. These experiments Dynamic source routing in ad hoc
showed that there is significant room between the wireless networks. In Imielinski and
two protocols for a secure hybrid protocol to Korth, editors, Mobile Computing,
be developed which takes advantage of the volume 353. Kluwer Academic
strongest points of both. Publishers, 1996.
REFERENCES [10]. X. Li, M. Lyu, and J. Liu. A trust model
based routing protocol for secure ad hoc
[1]. C. N.-R. Baruch Awerbuch, David networks. In Proceedings of the
Holmer and H. Rubens. An on-demand Aerospace Conference, 2004.
secure routing protocol resilient to
byzantine failures. In ACM Workshop [11]. J. Lundberg. Routing security in ad
on Wireless Security (WiSe), September hoc networks, 2000.
2002.
[12]. S. Marti, T. J. Giuli, K. Lai, and M.
[2]. S. Buchegger and J.-Y. L. Boudec. Baker. Mitigating routing misbehavior in
Nodes Bearing Grudges: Towards
mobile ad hoc networks. In Mobile
Routing Security, Fairness, and Computing and Networking, 2000.
Robustness in Mobile Ad Hoc
Networks. In Proceedings of the Tenth
[13]. K. Meka, M. Virendra, and S. Upadhyaya.
Euromicro Workshop on Parallel,
Trust based routing decisions in mobile
Distributed and Network-based
ad-hoc networks. In Proceedings of the
Processing. IEEE Computer Society,
Workshop on Secure Knowledge
January 2002.
Management (SKM 2006), 2006.
[3]. H. Deng. Routing security in wireless ad
[14]. C. Perkins, E. Belding-Royer, and S.
hoc networks, 2002.
Das. Ad hoc on-demand distance vector
(aodv) routing. July 2003.
[4]. L. Eschenauer, V. Gligor, and J.
Baras. On trust establishment in mobile
ad-hoc networks.Technical Report MS [15]. C. Perkins and P. Bhagwat.
2002-10, Institute for Systems Research, Highly dynamic destination-sequenced
University of Maryland, MD, USA, distance-vector routing (DSDV) for
October 2002. mobile computers. In ACM
SIGCOMM’94 Conference on
[5]. Ethereal - A Network Communications Architectures,
Protocol Analyzer. Protocols and Applications, pages 234–
http://www.ethereal.com/. 244, 1994.
[6]. T. Ghosh, N. Pissinou, and K. [16]. A. Perrig, R. Szewczyk, V. Wen, D. E.
Makki.Collaborative trust-based secure Culler, and J. D. Tygar. SPINS:
routing against colluding malicious nodes security protocols for sensor
in multi-hop ad hoc networks. In LCN netowrks. In Mobile Computing and
’04: Proceedings of the 29th Annual Networking, 2001.
IEEE International Conference on Local
Computer Networks (LCN’04). IEEE [17]. N. Pissinou, T. Ghosh, and K. Makki.
Computer Society, 2004. Collaborative trust-based secure routing
1844 | P a g e
7. Santhoshkumar.H.P, Prof.Sameena Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 4, July-August 2012, pp.1839-1845
in multihop ad hoc networks. In credential services”, in 3rd International
NETWORKING 2004, Networking conference ICACCT-
Technologies, Services, and Protocols; 2008,www.apiitindia.org/icacct2008.
Performance of Computer and
Communication Networks; Mobile
and Wireless Communications, 2004. [26]. R.Balakrishna, M.V.Panduranga Rao,
Dr.K.C.Shet,” Development of
[18]. S. Yi, P. Naldurg, and R. Kravets. Scheduler for Real Time and
Security-aware ad hoc routing for Embedded System Domain”, in digital
wireless networks. In MobiHoc ’01: library at IEEE AINA-2008 International
Proceedings of the 2nd ACM Conference, JAPAN,. The details
international symposium on Mobile ad about the conference is available
hoc networking & computing, pages at http://www.aina-conference.org/2008/
299–302, New York, NY, USA, 2001.
ACM Press. [27]. R.Balakrishna, Dr.U.Rajeswar Rao,
Dr.G.A. Ramachandra “Reliability in
[19]. M. G. Zapata and N. Asokan. Securing MANETS USING Enhanced double
ad hoc routing protocols. In WiSE ’02: coverage broad casting algorithm”,In.J.of
Proceedings of the ACM workshop on Advanced Network Applications, Vol.3
Wireless security. ACM Press, 2002. and Issue 3. Page No 147 to 154
[20]. L. Zhou and Z. J. Haas. Securing ad
hoc networks. IEEE Network, 13(6):24–
30, 1999.
[21]. C. Zouridaki, B. L. Mark, M.
Hejmo, and R. K. Thomas. A
quantitative trust establishment
framework for reliable data packet
delivery in manets. In SASN ’05:
Proceedings of the 3rd ACM *Santhoshkumar.H.P,
workshop on Security of ad hoc and
sensor networks, pages 1–10, New York, *M.Tech(CSE) ,K.B.N.C.E.,Gulbarga,
NY, USA, 2005. ACM Press. Affiliated to VTU, Belgaum,
Karnataka
[22]. R.Balakrishna,M.Murali Mohan Reddy
Dr.U.RajeswarRao,Dr.G.A.Ramachandra
, “Routing Misbehavior Detection in
MANET Using 2ACK”, in IEEE
Advanced Computing Conference,
Thapur University, Patala,2008.
[23]. R.Balakrishna, M.Murali Mohan
Reddy, Dr.U.Rajeswar Rao,
Dr.G.A.Ramachandra,” detection of
routing misbehavior in mobile ad hoc
networks using enhanced 2ack (e-
2ack)”,in IEEE Advanced Computing
Conference in at , Thapur
University, Patal,2008.
[24]. R.Balakrishna, Dr.U.Rajeswara Rao,
Dr.N.Geethanjali, “Secure Key Exchage
protocol for Credential Services”,
Published in Defence science Jounal
in May 2009.
[25]. R.Balakrishna, Dr.U.Rajeswara Rao,
Dr.N.Geethanjali “A secured
authenticated key exchange protocol for
1845 | P a g e