A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
Distributed-Denial of Service (DDoS) is a key intimidation to network security. Network is a group of
nodes that interrelate with each other for switch over the information. This information is necessary for
that node is reserved confidentially. Attacker in the system may capture this private information and
distorted. So security is the major issue. There are several security attacks in network. One of the major
intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends
services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to
its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two
different behaviors they may happen obviously or it may due to some attackers .Various schemes are
developed defense against to this attack. The Main focus of paper is present basis of DDoS attack, DDoS
attack types, and DDoS attack components, intrusion prevention system for DDoS.
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
The single largest threat your organization faces today is network breach. Spear-phishing, poisoned search results, drive-by downloads, and legitimate sites being compromised to push malware are all part of our current reality. The most successful and common attacks vectors stem from targeted attacks on your employees. Organizations need to utilize solutions that protect their network from user error and support requirements for continuous monitoring, real-time situational awareness and providing actionable threat intelligence for their security teams.
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...IJECEIAES
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...journalBEEI
Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Implementation of user authentication as a service for cloud networkSalam Shah
There are so many security risks for the users of cloud computing, but still the organizations are switching towards the cloud. The cloud provides data protection and a huge amount of memory usage remotely or virtually. The organization has not adopted the cloud computing completely due to some security issues. The research in cloud computing has more focus on privacy and security in the new categorization attack surface. User authentication is the additional overhead for the companies besides the management of availability of cloud services. This paper is based on the proposed model to provide central authentication technique so that secured access of resources can be provided to users instead of adopting some unordered user authentication techniques. The model is also implemented as a prototype.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
Distributed-Denial of Service (DDoS) is a key intimidation to network security. Network is a group of
nodes that interrelate with each other for switch over the information. This information is necessary for
that node is reserved confidentially. Attacker in the system may capture this private information and
distorted. So security is the major issue. There are several security attacks in network. One of the major
intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends
services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to
its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two
different behaviors they may happen obviously or it may due to some attackers .Various schemes are
developed defense against to this attack. The Main focus of paper is present basis of DDoS attack, DDoS
attack types, and DDoS attack components, intrusion prevention system for DDoS.
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
The single largest threat your organization faces today is network breach. Spear-phishing, poisoned search results, drive-by downloads, and legitimate sites being compromised to push malware are all part of our current reality. The most successful and common attacks vectors stem from targeted attacks on your employees. Organizations need to utilize solutions that protect their network from user error and support requirements for continuous monitoring, real-time situational awareness and providing actionable threat intelligence for their security teams.
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...IJECEIAES
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...journalBEEI
Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
Implementation of user authentication as a service for cloud networkSalam Shah
There are so many security risks for the users of cloud computing, but still the organizations are switching towards the cloud. The cloud provides data protection and a huge amount of memory usage remotely or virtually. The organization has not adopted the cloud computing completely due to some security issues. The research in cloud computing has more focus on privacy and security in the new categorization attack surface. User authentication is the additional overhead for the companies besides the management of availability of cloud services. This paper is based on the proposed model to provide central authentication technique so that secured access of resources can be provided to users instead of adopting some unordered user authentication techniques. The model is also implemented as a prototype.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Review Paper on Predicting Network Attack Patterns in SDN using MLijtsrd
Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of Service attacks. The mechanism and communication extent of the SDN controller is overloaded when DDoS attacks are performed against the SDN controller. So, as results of the useless flow built by the controller for the attack packets, the extent of the switch flow table becomes full, leading the network performance to decline to a critical threshold. The challenge lies in defining the set of rules on the SDN controller to dam malicious network connections. Historical network attack data are often wont to automatically identify and block the malicious connections. In this review paper, we are going to propose using ML algorithms, tested on collected network attack data, to get the potential malicious connections and potential attack destinations. We use four machine learning algorithms C4.5, Bayesian Network BayesNet , multidimensional language DT , and Naive Bayes to predict the host which will be attacked to support the historical data. DDoS attacks in Software Defined Network were detected by using ML based models. Some key features were obtained from SDN for the dataset in normal conditions and under DDoS attack traffic. Dr. C. Umarani | Gopalshree Kushwaha "Review Paper on Predicting Network Attack Patterns in SDN using ML" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35732.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35732/review-paper-on-predicting-network-attack-patterns-in-sdn-using-ml/dr-c-umarani
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The volatile growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. The current IPS presents a less security. Unfortunately, our work combined with the work of others show that each of these mechanisms are completely futile. As a result, organizations with deployed wireless networks are vulnerable to illegal use of, and access to, their internal communications.
NIST's work underpins most of today's top science and technology challenges, such as cyber-security, biometrics, voting equipment standards, and nanotechnology, just to name an important few.
~ Sherwood Louis "Sherry" Boehler. Former Member of the U.S. House of Representatives from New York and Chairman of the House Science and Technology Committee
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...IJCNCJournal
Although there have been many solutions applied, the safety challenges related to the password security mechanism are not reduced. The reason for this is that while the means and tools to support password attacks are becoming more and more abundant, the number of transaction systems through the Internet is increasing, and new services systems appear. For example, IoT also uses password-based authentication.
In this context, consolidating password-based authentication mechanisms is critical, but monitoring measures for timely detection of attacks also play an important role in this battle. The password attack detection solutions being used need to be supplemented and improved to meet the new situation. In this
paper we propose a solution that automatically detects online password attacks in a way that is based solely on the network, using unsupervised learning techniques and protected application orientation. Our solution therefore minimizes dependence on the factors encountered by host-based or supervised learning solutions. The certainty of the solution comes from using the results of in-depth analysis of attack
characteristics to build the detection capacity of the mechanism. The solution was implemented experimentally on the real system and gave positive results.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Review Paper on Predicting Network Attack Patterns in SDN using MLijtsrd
Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of Service attacks. The mechanism and communication extent of the SDN controller is overloaded when DDoS attacks are performed against the SDN controller. So, as results of the useless flow built by the controller for the attack packets, the extent of the switch flow table becomes full, leading the network performance to decline to a critical threshold. The challenge lies in defining the set of rules on the SDN controller to dam malicious network connections. Historical network attack data are often wont to automatically identify and block the malicious connections. In this review paper, we are going to propose using ML algorithms, tested on collected network attack data, to get the potential malicious connections and potential attack destinations. We use four machine learning algorithms C4.5, Bayesian Network BayesNet , multidimensional language DT , and Naive Bayes to predict the host which will be attacked to support the historical data. DDoS attacks in Software Defined Network were detected by using ML based models. Some key features were obtained from SDN for the dataset in normal conditions and under DDoS attack traffic. Dr. C. Umarani | Gopalshree Kushwaha "Review Paper on Predicting Network Attack Patterns in SDN using ML" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35732.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35732/review-paper-on-predicting-network-attack-patterns-in-sdn-using-ml/dr-c-umarani
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The volatile growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. The current IPS presents a less security. Unfortunately, our work combined with the work of others show that each of these mechanisms are completely futile. As a result, organizations with deployed wireless networks are vulnerable to illegal use of, and access to, their internal communications.
NIST's work underpins most of today's top science and technology challenges, such as cyber-security, biometrics, voting equipment standards, and nanotechnology, just to name an important few.
~ Sherwood Louis "Sherry" Boehler. Former Member of the U.S. House of Representatives from New York and Chairman of the House Science and Technology Committee
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...IJCNCJournal
Although there have been many solutions applied, the safety challenges related to the password security mechanism are not reduced. The reason for this is that while the means and tools to support password attacks are becoming more and more abundant, the number of transaction systems through the Internet is increasing, and new services systems appear. For example, IoT also uses password-based authentication.
In this context, consolidating password-based authentication mechanisms is critical, but monitoring measures for timely detection of attacks also play an important role in this battle. The password attack detection solutions being used need to be supplemented and improved to meet the new situation. In this
paper we propose a solution that automatically detects online password attacks in a way that is based solely on the network, using unsupervised learning techniques and protected application orientation. Our solution therefore minimizes dependence on the factors encountered by host-based or supervised learning solutions. The certainty of the solution comes from using the results of in-depth analysis of attack
characteristics to build the detection capacity of the mechanism. The solution was implemented experimentally on the real system and gave positive results.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and
disadvantages. Providing safe communication between mobile nodes, recognization the position of
nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in
ad-hoc network, so providing trust schemes is an important in this network. MANET provides some
basic functions like routing, communication, network management and packet forwarding etc over
self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and
leaves the network within a random period of time. It effects energy, bandwidth and memory
computations of network. Providing trust in MANET is such a crucial task because it doesn’t having
centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
Cloud computing is widely used by organizations and individuals due to its flexibility and reliability. The trust model is important for cloud computing to detect malicious users and protect user privacy. The existing research faces the issues of local optima trap and overfitting problems when a training user node is idle for more time. This research proposed Weighted Coefficient Firefly Optimization Algorithm (WCFOA) with Support Vector Machine (SVM) for the trust model calculation and identifying paths with better Quality of Services (QoS). The weighted coefficient is added to the FOA model to balance the exploration and exploitation in the search of identifying optimal path based on reliability score. The WC-FOA method measures the link reliability in the model and SVM detects the malicious users in the model. The WC-FOA model selects the optimal path for transmission in terms of trust and efficient QoS parameters. The entropy measure and link reliability are provided as input to the SVM model for the detection of attacks in the network. The WCFOA-SVM model has 96% malicious user detection, whereas the Random Forest Hierarchical Ant Colony Optimization (RF-HEACO) has 92 % accuracy.
Similar to Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach (20)
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...IJLT EMAS
Vertical electrical soundings (VES) was carried out in Opolo and Tombia all in Yenagoa local government area, Bayelsa state, Nigeria to understand the resistivity distribution of its subsurface which serves as a tool in investigating subsurface lithology. All VES sounding were stacked together to generate 1D pseudo tomogram and was subsequently interpreted. The interpreted VES curve results shows that Opolo consists of three layers within the depth of investigation. Sandy clay with mixture of silt make up the first layer (Top layer) with resistance value ranging from 24-63Ωm. The second layer is made up of thick clay with very low resistivity values ranging from 3-19Ωm. The third layer is sandyclay with its resistance value ranging from 26-727Ωm.Tombia also reveals that the area is in three layers within the depth of investigation. Sandy clay with a mixture of fine sand made up the first layer (Top soil) with its resistance values ranging from 40-1194Ωm. The second layer is made up of fine sand with resistivity value ranging from 475-5285Ωm. The third layer is made up of sandy clay/sand with its resistance value ranging from 24-28943Ωm.The results of the 1D pseudo tomogram also reveals that Tombia and Opolo consists of three layers within the depth of investigation and pseudo tomograms serves as a basis tool for interpreting lithology and identifying lithological boundaries for the subsurface
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...IJLT EMAS
The study is to determine the PH and moisture content
of Nono sold in Port Harcourt , the prevalence of Pseudomonas
aeruginosa in Fura da nono and finally the antibiotic resistance
pattern of Pseudomonas aeruginosa isolated from the fermented
products. nono samples were purchased from Borikiri in
portharcourt township. A total of 20 samples were assessed to
determine their microbiological quality and to conduct antibiotic
susceptibility test. Moisture content and pH of the samples were
also assessed. Enumeration of the total viable bacterial count
(TVBC), Total coliform count (TCC) and Total Pseudomonal
count (TPC) were also assessed to determine the sanitary quality
of the product. The PH ranges between 2.99 to 3.89 while the
moisture content ranges between 80% to 88%. The result
obtained from the microbial culture indicated that a wide array
of microorganism were present in Fura da nono including species
of Bacilu, klebsiella, Pseudomonas Staphylococcus aureus,
Streptococcus, Lactobacillus and Escherichia coli.. The highest
TVBC, TCC and TPC were 9.8x103
cfu/ml, 10x103
cfu/ml and
9.7x103
cfu/ml respectively. Antibiotic susceptibility was
conducted using 12 broad spectrum antibiotics and compared
against a standard provided by the Clinical laboratory standard
institute (CLSI). Gentamycin, Ofloxacin and Levofloxacin
recorded 100% resistance , while Cotrimoxazole, Ciprofloxacin,
Vancomycin, Nitrofurantoin, Norfloxacin and Azithromycin
recorded 100% susceptibility as indicated by the complete clear
zone of inhibition.It was discovered that the absence of
regulatory agencies like National Agency for Food Drug
Administration and Control (NAFDAC) in the regulation of the
quality of the product was the cause of the high contamination,
since there were no quality control measures in its production
line .It was recommended that NAFDAC should provide a
standard operating procedure for local food producers and
should include them in their scope for regulation.
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...IJLT EMAS
Hydrocarbon pollution Remediation by Enhanced
Natural Attenuation method was adopted to remediate the
hydrocarbon impacted site in Ogoniland Rivers State, Nigeria .
The research lasted for 6 months. Samples were collected at
monthly intervals . samples were collected intermittently
between Feb 2019 to July 2019 . Mineral salt medium containing
crude oil was used as a sole source of carbon and energy for the
isolation of hydrocarbonoclastic bacteria. Samples were
collected from the four (4) local government that made up
Ogoniland and they includes Khana(k), Gokana (G),Tai (T),
Eleme (E) and transported immediately to the laboratory for
analysis. The microbial and physicochemical properties of the
soil samples varied with the different local government areas.
Seven bacteria genera were isolated from the samples from the
four locations, viz, Pseudomonas, Lactobacter, Micrococcus,
Arthrobacter, Bacillus, Brevibacterium and Mycobacterium
were isolated and identified. the seven isolate were indigenous in
the study area. Nutrient were added to identified plots of
hydrocarbon pollution polluted site within the four local
government and they were able degrade hydrocarbon within a
short of period of time. Reassessment of physicochemical
parameter impacted site was used to judge the bioremediation
potentials of microorganism
Comparison of Concurrent Mobile OS CharacteristicsIJLT EMAS
It is challenging for the mobile industry to supply the best features of the devices with its increasing customer requirements. Among the progress of technologies, the mobile industry is the fastest growing; as it keeps pace with rapidly changing market demands. This paper compares between the currently available mobile devices based on its user interface, security, memory utilization, processor, and device architecture. The mobile products launched from 2015-19 are used for comparison. Current results after comparison with earlier study found that many mobile devices and features became obsolete in a short time span supporting the aggressive growth of mobile industry.
Design of Complex Adders and Parity Generators Using Reversible GatesIJLT EMAS
This paper shows efficient design of an odd and even parity generator, a 4-bit ripple carry adder, and a 2-bit carry look ahead adder using reversible gates. Number of reversible gates used, garbage output, and percentage usage of outputs in implementing each combinational circuit is derived. The CLA used 10 reversible gates with 14 garbage outputs, with 50% percentage performance usage.
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesIJLT EMAS
This paper shows an effective design of combinational circuits such as 2:1, 4:1 multiplexers, 2:4 decoder and a full subtractor using reversible gates. This paper also evaluates number of reversible gates used and garbage outputs in implementing each combinational circuit.
Multistage Classification of Alzheimer’s DiseaseIJLT EMAS
Alzheimer’s disease is a type of dementia that destroys
memory and other mental functions. During the progression of
the disease certain proteins called plaques and tangles get
deposited in hippocampus which is located in the temporal lobe
of brain. The disease is not a normal part of aging and gets
worsen over time. Medical imaging techniques like Magnetic
Resonance Imaging (MRI), Computed Tomography (CT) and
Positron Emission Tomography (PET) play significant role in the
disease diagnosis. In this paper, we propose a method for
classifying MRI into Normal Control (NC), Mild Cognitive
Impairment (MCI) and Alzheimer’s Disease(AD). An overall
outline of the methodology includes textural feature extraction,
feature reduction process and classification of the images into
various stages. Classification has been performed with three
classifiers namely Support Vector Machine (SVM), Artificial
Neural Network (ANN) and k-Nearest Neighbours (k-NN)
Design and Analysis of Disc Brake for Low Brake SquealIJLT EMAS
Vibration induced due to friction in disc brake is a
theme of major interest and related to the automotive industry.
Squeal noise generated during braking action is an indication of
a complicated dynamic problem which automobile industries
have faced for decades. For the current study, disc brake of 150
cc is considered. Vibration and sound level for different speed
are measured. Finite element and experimentation for modal
analysis of different element of disc brake and assembly are
carried out. In order to check that precision of the finite element
with those of experimentation, two stages are used both
component level and assembly level. Mesh sensitivity of the disc
brake component is considered. FE updating is utilized to reduce
the relative errors between the two measurements by tuning the
material. Different viscoelastic materials are selected and
constrained layer damping is designed. Constrained layer
damping applied on the back side of friction pads and compared
vibration and sound level of disc brake assembly without
constrained layer damping with disc brake assembly having
constrained layer. It was observed that there were reduction in
vibration and sound level. Nitrile rubber is most effective
material for constrained layer damping.
The aim of this article is to device strategies for
establishing and managing tomato processing industry, which
aims to enhance the taste experiences on different tomato
products for the people. Management needed for a successful
business is analyzed in each and every aspect. The five important
steps in management- planning, organizing, staffing, leading and
controlling are applied in management of the industry. Planning-
In the planning process, activities required to achieve desired
goals are thought about. This process involves the creation and
maintenance of a plan, those include psychological aspects that
require conceptual skills. Organizing- Organizing is a systematic
processing in order to attain objectives of structuring,
integrating, co-ordinating task, and activities. Staffing- Staffing is
the process of acquiring, deploying, and retaining a workforce of
sufficient quantity and quality to create positive impacts on the
organization’s effectiveness. Leading- Communicating,
motivating, inspiring and encouraging employees are key aspects
of process of leading, task of which is towards a higher level of
productivity of organization. Controlling- Controlling measures
the deviation of actual performance from the standard
performance, discovers the causes of such deviations and helps in
taking corrective actions.
This paper deals with the functioning of a Propylene
Recovery Unit (PRU) in a chemical industry and the various
Managerial and Human Resource considerations that need to be
accounted for, in this process. This report discusses various
aspects that are to be considered, before initializing the setup of
PRU, ranging from a Management perspective. Mission and
objective was decided and subsequently the managerial model
was developed. Propylene is an indispensible raw material that
has a variety of end use. A detailed analysis pertaining to
propylene demand in the market along with major sources has
been incorporated in this paper. Emphasis has been placed on
the type of departmentation required. Managerial aspects of
various functions ranging from warehousing to quality control
have also been taken into consideration. Delegations of functional
departments have been defined to prevent redundancy of duties
and major managerial functions of Planning, Organizing,
Staffing, Leading and Controlling has also been discussed.
Internal and External factors that affect the company have been
analyzed through SWOT Analysis and MBO strategies are also
broadly classified. Finally, Total Quality Management and
strategies for adoption of Lean Manufacturing as also touched
upon briefly.
This business model is intended to provide an online
platform connecting the general public customers with the
producers of groceries and food products such as fruits,
vegetables, meat and dairy products. The producers are selected
based on their production methods and their quality. The model
obtains the demand from the customers and the supply is found
from the producers. The prices of the products are fixed
according to the supply and demand. The customers' orders can
be classified into two different categories: 1. Bulk orders and 2.
Recipe based. The orders are obtained in a bulk quantity or for a
certain period of time and the products are delivered
periodically as per the customer's need. This model eliminates
the requirements of conventional storage units and also controls
the quality of the products using scientific devices. This model
reduces the wastage of resources as it enables the customer to
estimate their requirements using the help of recipe based
ordering system and also keeps the price constant for the bulk
orders.
Home textile exports are market driven, which implies that they deal with what the foreign market wants and how the home textile exporter could fulfil it, or product driven, where they deal with what the exporter has to offer and how can an appropriate strategy be applied to find the targeted buyers in the foreign market. The requisites of these are that the exporter must know the export plan, production procedure and export documentations. Exporter also must know his/her operational capacity, organizational nature and structure. An attempt is made in this project to understand and examine the nature and structure of the organization of the S3P exports.
Almost 80% of the population are coffee lovers.
Kaffinite sunshine café is guaranteed to become the daily
necessity for all the coffee addicts. A place with good ambience
where people can escape from their daily stress and cherish with
a morning cup of coffee. Our café offers home style delicious
breakfast and snacks. We focus on finding the most aromatic
and exotic coffee beans. We have our branches in many cities of
Tamil Nadu. We have a romantic ambience which attracts youth.
Our café has spectacular interior designs with stupendous taste
of coffee. We have attached our menu which contains multicuisines
at attractive prices. In this paper, we have done SWOT
analysis of our café to know our strengths and weaknesses. We
have also analyzed our opportunities and threats from the
external environment
Management of a Paper Manufacturing IndustryIJLT EMAS
This project focuses on how a paper manufacturing industry looks like and how it operates. For better understanding purpose, we have taken a hypothetical situation here. We have discussed on various factors that are to be considered before constructing a plant. For example, what kind of proprietorship is suitable for this case? We have developed a SWOT Analysis for the plant, thinking about the pros and cons. This project can be a guide for a person who is willing to start up a new manufacturing plant. This report can be used to streamline your approach to planning by outlining the responsibilities of plant managers and external factors, as well as identifying appropriate resources to assist you with the construction of plant.
Application of Big Data Systems to Airline ManagementIJLT EMAS
The business world is in the midst of the next
revolution following the IT revolution – the Big Data revolution.
The sheer volume of data produced is a major reason for the big
data revolution. Aviation and aerospace are typical areas that
can apply big data systems due to the scale of data produced, not
only by the plane sensors and passengers, but also by the
prospective passengers. Data that need to be considered include,
but are not limited to, aircraft sensor data, passenger data,
weather data, aircraft maintenance data and air traffic data.
This paper aims at identifying areas in aviation where big data
systems can be utilized to enhance operational performances
improve customer relations and thereby aiding the ultimate goal
of increased profits at reduced costs. An improved management
model built on a strong big data infrastructure will reduce
operation costs, improve safety, bring down the cost and time
spent on maintenance and drastically improve customer
relations.
Impact of Organisational behaviour and HR Practices on Employee Retention in ...IJLT EMAS
I. INTRODUCTION
Roads are constituted as the most significant component of
India‟s Logistics Industry, accounting for 60 percent of
the total freight movement in the country. A majority of
players in this industry are small entrepreneurs running their
family businesses. As a result, Man Power Development
Investments that pay off in the longer term, have been
minimised respectively. Moreover, these businesses are
typically controlled severely by the proprietor and his / her
family and consequently, making it unattractive for the
professionals. Poor working conditions, Low pay scales
relative to alternate careers, poor or non-existent Manpower
Policies and prevalence of unscrupulous practices have added
to the segment's woes for seeking employment. Thus, it could
be rightly stated that the Transportation, Logistics,
Warehousing and Packaging Sector is considered an
unattractive career option and fails to attract and retain skilled
manpower. Many Organizations have failed to recognize that
Human Resources play an important role in gaining an
immense advantage in today‟s highly competitive Global
Business Environment. While all aspects of managing Human
Resources is important, Employee Retention continues to be
an essential part of Human Resource Management activity
that help the Organizations to achieve their goals and
objectives.
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...IJLT EMAS
The purpose of this article is to identify the energy
challenges faced by airports especially with regards to the energy
consumed by the terminal building and suggest suitable energy
conservation techniques based on what has already been
implemented in few airports around the world.
We have identified the various facilities and systems which are
responsible for a major share of the consumption of energy by
airport terminals and we have suggested measures to effectively
overcome these problems.
OVERVIEW OF THE COMPANY
Cake Walk sweets and savories
Cake Walk is India‟s No. 1 confectionery and cake
manufacturer with its products exported to over 20 countries
around the world. They are dedicated to the art of producing
innovative and delicious products for sweet lovers of all ages.
Cake Walk‟s products offer tantalizing experiences that sparks
the imagination in people who eat their candy. Of course, this
has been Cake Walk‟s goal since their inception in 1947.
Today, Cake Walk Candy continues to make some of the best
candy in India. They also are a responsible business venture
and contribute positively to the society with their “Learn to
bake” initiative to encourage households to earn by starting
their own small-scale businesses. Cake Walk products can be
enjoyed by kids and adults alike, and their products come in
an array of flavors, shapes and sizes.
Every individual in our planet is busy in his / her own
world these days. The busy schedules and work preoccupations
of many people hinder them from spending nominal amount of
time with their families.
To address this concern, we have come up with our MACH
Tours and Travels, our motto being, “Breaching the
Boundaries!” which aims at not only giving its customers the best
and most comfortable tour, but also an enjoyable and
memorable experiences.
We differ from our competitors in various ways. For a start, we
emphasize that our profit is not in the income from this business,
but in the satisfaction of our customers. Added to that, we focus
on improving the ease of travel, the luxury of trip, the quality of
time spent and the worth of pay.
There is a variety of customers we come across: some will want
their trip to be extravagant, while some require it to be cost
effective; some need a long vacation, while some choose just a
weekend away.
Our mission: In order to meet the desires of this large range of
people and to include all the factors of a hearty holiday, we have
devised our strategies and planned our processes, thus, setting us
apart from the others.
Our vision: As the main priority, a year from now, we target on
contenting as many customers as possible through our services.
The following sections of this document includes our roles in
planning, decision making, staffing, leading and communicating
in which we highlight various aspects of our organization,
including the pros and cons of travelling with us.
The purpose of this paper is to highlight the general
terms and definitions that falls under the ‘common set’ in the
intersection of the sets Meteorology and Aerospace Engineering.
It begins with the universal explanations for the meteorological
phenomena under the ‘common set’ followed by the
categorization of clouds and their influences on the aerial
vehicles, the instrumentation used in Aeronautics to determine
the required Meteorological quantities, factors affecting aviation,
effects of aviation on the clouds, and the corresponding protocols
involved in deciphering the ‘common set’ elements.
It also talks about the relation between airport construction and
Geology prior to concluding with the uses and successes of
Meteorology in the field of Aerospace.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
1. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 64
Mitigating Various Attacks in Mobile Ad-hoc
Networks Using Trust Based Approach
Namratha Shetty1
, Deeksha Salian2
, Jahnavi S.3
, Jyothi N.4
Srinivas School of Engineering, Mukka, Mangaluru, Karnataka
Abstract: - A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, self-
organizing nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Keyword: MANET, Vampire Attack, DDoS Attack
I. INTRODUCTION
n mobile ad hoc network (MANET), the transmission of
any data packets are totally dependent on the cooperation of
each node in the network, since packets are transmitted from
hop-to-hop. Also each node has their own transmission range,
so if any source node wants to send the data packets to the
final destination node, source node contacts to its neighbour;
that neighbour node again contact to another neighbour and so
on, so as to reach the final destination node. As we know the
wired networks needs infrastructure and have central
administration. But in remote locations such as mountains,
valleys and some public locations wired networks are hard to
setup. Since MANETs are infrastructure-less, open and no
central administration required, it became popular. Today
MANETs are widely used in every area where wired networks
cannot reach. But due to the openness, infrastructure less and
dynamic nature of MANET, it is highly sensible to various
attacks. In MANET, routing is dependent on various factors
such as topology, selection of route, route requests and
responses, etc. In MANET, if any attack is occurred, it will
affect the performance of the entire network and some secured
information may get stolen.
1.1 Problem Definition
Protecting data transformation in mobile ad hoc
networks is an important aspect to be seen. Parties within the
network want their communication to be secure. At present
MANET do not have any strict security policy. This could
possibly lead active attackers to easily exploit or possibly
disable mobile ad hoc network. Mobile ad-hoc networks are
highly dynamic i.e. topology changes and link breakage
happen quite frequently. Hence, needs a security solution
which is dynamic too. Any malicious or misbehaving nodes
can create hostile attacks.
These types of attack can seriously damage basic aspects of
security, such as Confidentiality, Integrity, Availability, Non-
Repudiation and Authentication, Authorization and
Anonymity. Confidentiality ensures that Secret information or
data is never disclosed to unauthorized devices. Integrity tells
that a received message is not corrupted. Availability permits
the survivability of network services despite Denial-of-
Service attacks. Non-repudiation ensures that the sender of a
message cannot deny having sent the message. Authentication
enables a node to ensure the identity of the Peer node it is
communicating with. Authorization is a process in which an
entity is issued a credential, which specifies the privileges and
permissions it has and cannot be falsified, by the certificate
authority. Anonymity ensures that the information used to
identify the owner or the current user of the node should
default be kept private and not be distributed by the node
itself.
1.2 Solution
To resolve this problem, hence proposed a more
flexible trust based approach where at first it creates a cluster
of nodes and then choose the node with the highest energy
which is considered as trusted node. The communication is
carried out through these trusted nodes. To find out the
malicious nodes in the network, sent and received packets as
well as the route response is calculated. This calculated value
is compared with the threshold value and then malicious node
is detected.
1.3 Objective of the Work
The primary objective of this project is to reduce the
malicious behavior of mobiles nodes in MANET which is due
to its openness, decentralized and self-organizing nature. This
malicious behavior is due to various attacks which occur
inside the network by intruders.
In this project, we consider 2 aspects; first we prevent attacks
to occur in the network thereby allowing smooth transmission
I
2. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 65
of the data packets between trusted nodes; second is to detect
and recover from an attack which occurred in the network.
1.4 Scope of the Work
It helps in creating a secured environment for the data to be
outsourced with increased security and convenience.
We detect various untrusted attacks in the network thereby
avoiding loss of data packets and providing data security.
II. LITERATURE SURVEY
1. Sandeep A. Throat and P. J. Kulkarni compared
cryptographic and trust based approaches in MANET
routing for implementing security. In this paper, author
discussed the various design issues embedded in trust
based routing protocol for MANET in detail. For future
research in trust based routing protocol for MANET,
author has also presented a survey on trust based routing
protocol and provides the necessary direction.
2. Ramya S. Pure proposed a model which is designed over
the Ad-hoc On-demand Distance Vector Routing Protocol
(ADOV). The proposed routing algorithm adds a field to
store the trust value or nodes trust on its neighbor, so that
the computational overhead can be reduced and
trustworthiness of routing procedure can be generated.
Based on the trust value of node, the routing information
will be forwarded to the next node having highest trust
value. Authors also worked on some attacks such as
Black hole attack, Gray hole attack and Worm hole
attack. The proposed method helps to improve the
throughput of the network.
3. Naveen Kumar Gupta and Kavita Pandey proposed an
algorithm which is a Trust based AODV Routing
Protocol for mobile ad-hoc network, and worked on the
concept of honest value, which is calculated on the
concept of hop and trust to protect the network from
affected nodes (malicious nodes). In proposed HAODV
routing protocol, before forwarding the data through
various routes, the routing paths have been evaluated
according to the trust metrics by the nodes. This method
is based on honest mechanism to secure the AODV
routing protocol. The performance of the HAODV has
been analyzed using three parameters namely the number
of drop packets, throughput and Packet Delivery Ratio.
The HAODV performs well in terms of throughput and
number of dropped packets. The future work of this
method is to implement the proposed scheme with more
number of parameters while evaluating the path.
4. Naveen Kumar Gupta and Amit Garg proposed a Trust
based Management framework for securing AODV
Routing Protocol. This worked on the concept of Trust
factor and selection of most efficient route and using the
Trust Value a routing path is evaluated, also during the
route exchange process, the route gets updated. The
performance of the proposed system is calculated based
on the Packet Delivery Ratio (PDR), number of drop
packets and throughput. The identity information
(Internal Protocol address and Trust Factor Value) has
been used to prevent the attack by the malicious node.
This identity information has been assigned to each node
in the initialized phase or when the node has been
configured. In future works, to optimize above mentioned
scheme in terms of number of nodes and building the fast
mechanism to detect and prevent the attacker nodes even
when large number of nodes.
5. Sumathy Subramaniam proposed a framework for
Opportunistic Routing which help to improve the lifetime
of network and a Trust model that helps to overcome the
vulnerability due to attacks by malicious /selfish nodes, to
provide reliable packet transmission. In Opportunistic
Routing, one node is selected among the set of candidate
nodes as a potential next-hop forwarder using metrics like
number of transmission in the link, link error probability,
cost, etc. for the packet transmission. This metrics helps
in improving the network lifetime. Also, to prevent attack
by malicious nodes, the Trust model is used which is
based on direct and indirect Trust degree from similar
trusted neighbors. On logical level, a proposed
framework for Opportunistic Routing has the Two
Modules: Routing Module and Trust Module. Routing
module is mainly responsible for the selection and
prioritization of candidate using the proposed metric, help
to improve the residual battery power required for the
packet transmission. Trust module is responsible for
detection and prevention of malicious and selfish nodes.
This Trust module is based on the direct and Indirect
Trust degree. As an enhancement to the proposed work,
further focus is to determine the delay incurred in
transmission of packet from the source to the destination
so as to better quality of service in MANET.
6. Issac Woungang proposed an Enhanced Trust Based
Multi-path Dynamic Source Routing (ETBMDSR)
protocol to securely transmit messages in MANETs.
Authors proposed a method to improve the TB-MDSR
scheme at least route selection time standpoint. The route
selection time is the time taken by algorithm to find the
suitable secured routing path to transmit the message
from source to destination. In TB-MDSR scheme, a
message between source to destination is first broken into
four message parts. At the source node, the messages get
encrypted using soft-encryption and similar XOR
operation as in Step 1. The encrypted message parts are
transmitted from source to destination through many
trusted paths constructed using DSR and selected
according to the Greedy approach on a path length basis
(Step 2). At the destination node, the received encrypted
messages are decrypted and the original messages is
recovered (Step 3). The proposed ETB-MDSR scheme is
implemented by following same steps as for the TD-
MDSR scheme. However, in Step 2, a new Trust
3. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 66
management model is implemented. In ETB-MDSR
scheme, History of Interaction (HI) modules stores the
records on the interactions between nodes in suitable data
structure. During trust computation, History Maintenance
module is used to maintain and update the History of
Interaction (HI) module, then calculate the Trust value
which is based on the direct and indirect Trust values
(using Direct Computation and Indirect Computation).
7. Ahmed M. Abd El-Haleem proposed a novel secure
relative routing protocol for MANET, called TRIUMF for
securing MANET against Packet Dropping Attack. It is
hard to determine whether the node is malicious or selfish
node. This proposed protocol first distinguishes the
malicious and selfish nodes and then controls the degree
of selfishness. The proposed monitoring tool first detects
the malicious behavior and then the path searching tool
identifies the attacker or compromised nodes in the
network and isolated them, and then proposed routing
protocol which selects the routes securely.
8. Zen Yan proposed a Trust Evolution based security
solution to provide effective security decision on
protection of data, safe routing and other network
activities. The authors proposed two trust models based
on the two ad-hoc system models. One is the independent
model that represents independent ad-hoc networks, have
not any connection to the predefined (fixed) networks.
The second model is the cross model, that represents ad-
hoc networks. This model has some few connections to
the fixed networks. Personal Trusted Bubble (PTB)
represents an ad-hoc node is the basic unit in both
models. In PTB, the owner of the ad-hoc device has
unreasonable full trust on the device, needed for the ad-
hoc communication and organization. Trust relationship
(logical and rational) should be evaluated
computationally among bubbles, between bubbles and the
fixed networks. The proposed trust evaluation is
conducted digitally, ahead of any communication and for
the better security decision; the result of this evaluation
should be noticed.
III. ATTACKS
Security is the main concern of any MANET for secure
transmission of any data. Due to the decentralized and open
nature of wireless system, MANET is highly prone to various
attacks. Attacks can be categorised as passive attacks and
active attacks. Passive attacks only monitor the data traffic
and looks for clear text password and other sensible
information which may be used in other attacks. Active
attacks try to break the security systems. Active attacks may
include introducing malicious nodes, to steal or modify the
sensitive information and break or bypass the security
mechanism. Types of attacks are as follows:
Black hole attack: In this type of attack, malicious nodes
broadcast the message to all the nodes, that it has valid,
shortest and fresh route to the destination. In this way
such malicious nodes divert all the traffic toward itself
and without forwarding the data packets to the
neighboring nodes, all the data packets are dropped.
Gray hole attack: this attack can be considered as a form
of black hole attack. In this type of attack, the malicious
nodes drop the data packets for particular nodes for
particular period of time in the network. That is why
grayhole attack is difficult to identify than black hole
attack.
Wormhole attack: In this type of attack, two malicious
nodes form a tunnel and all the data packets received at
one location of the network are tunneled at the other
location in the network, in such way all the data are resent
to the network. The tunnel between two malicious nodes
is called as wormhole. Such attacks prevent any route
other than any wormhole from being discovered.
Byzantine attack: This type of attacks is carried out by
intermediate nodes or group of intermediate nodes. Such
malicious nodes provide the false routing information and
create routing loop as well as forward the data packets to
that path which is not optimal, which may be harmful to
the routing system.
Denial of service attack: it prevent the victim from being
used all or part of the network connections. DOS attacks
may have numerous forms and hard to detect. In this type
of attack, attacker nodes sends the excessive amount of
data packet or request to the server so that server get busy
in testing illegal request and will not be available to
others. This attack may degrade the performance of the
network since it consumes the energy (battery power) of
nodes.
In this scenario two attacks are considered: Vampire attack
and DDoS attack.
Vampire attack: This is not protocol specific attack and hard
to detect. This attack may exploit general properties of
protocol classes such as link-state, distance vector, source
routing and geographic routing. It drains the power of the
node which may result in network failure and data loss. The
attacker packets (vampire attack) consumes more power of
any nodes than the normal packets.
DDoS attack: This can be carried out from several layers, it is
a distributed layer, large-scale attempt by malicious nodes to
amass the victim network with enormous number of packets.
This exhausts the resources of victim network such as
bandwidth, computing power etc. in such case victim unable
to provide the services to its client and network performance
may degrade.
IV. PROPOSED DESIGN
The basic idea behind the trust based approach is to find out
nodes having highest energy. In each cluster of network,
maximum two nodes are identified having highest energy
called trusted nodes. The communications are carried out
4. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 67
through these trusted nodes. That is trusted node in each
cluster send the received packets to the destination or next
trusted node in another cluster and so on. To find out the
malicious nodes in the network, send and received packets as
well as route response is calculated. Then the number of
packets (send & received) compared to the threshold value, if
it is less than the threshold value then particular node is
considered as a malicious node.
Cluster based network formation: The number of cluster
depends on the total number of nodes in the network.
Here maximum number of nodes in the cluster is
considered as 10. To place the node in the cluster, the
value of x and y coordinates of each cluster are
determined to make sure that each x and y coordinates of
each cluster to be within the specified range. For
example, for a network of 300m x 300m, if the number of
clusters are 3 then each node will be placed in 100m x
100x area.
Selection of Trusted nodes: After formation of the
network, the trusted nodes are determined (Nodes having
highest energy). To choose the random energy of each
node, rand () function is used. For example, expr rand
()*1000. We can also check the energy of each node by
using, set e [$node (2) energy]; then print the value of e.
After calculating the initial energy of each node in each
cluster, nodes with highest and second highest energy
have been chosen. These two are called as trusted nodes
in each cluster. These nodes with highest and second
highest energy are referred to as cluster head one and
cluster head two respectively. All the communication will
be carried out using these cluster heads.
Counting packets (send & received) along with Route
responses: The send and received packets are calculated
for each node; also route response of each node is
determined. This information is helpful to determine the
malicious node in the network. Node having less route
response and send packets may be considered as a
malicious node.
Comparison of packets with threshold to get malicious
nodes: To get the malicious node, the number of packets
(send & received) is compared with the threshold value to
determine the malicious nature of any node. While
calculating, the route response is also taken into
consideration. The threshold value is set as 30. Here, we
take into account the DDoS attack. This comparison is
playing a vital role to determine the DDoS attacks.
Routing table update: After determining the trusted nodes
and malicious nodes in the network, the information is
updated in the routing table. According to the routing
table, most trusted path is selected for communication
which helps to improve the network life as well as
network performance.
Figure 1: Work Flow
V. PROPOSED WORK
In the proposed work, the cluster based network is
formed. Ten nodes are considered in each cluster. Total
number of cluster is based on the total number of nodes in the
network. Two nodes having maximum energy have been
selected in each cluster.
Selection of each cluster:
Max_cluster=expr[val(nn)/Max_Node_in_Cluster]
Here, val (nn) is the total number of nodes in the network and
maximum ten nodes are considered in each cluster. Also X
and Y coordinates (Maximum values of X and Y) have been
calculated for each cluster:
Set max_x[expr[expr $CURRENT_CLUSTER+1]* $val
(x)/$MAX_CLUSTERS]
To calculate the energy of nodes, rand() function is
used. The two nodes with highest energies in each cluster
have been calculated. These two nodes are called Cluster
Head 1 and Cluster Head 2. In between Cluster Head 1 and
Cluster Head 2, node with highest energy is selected as
CLUSTER HEAD in each cluster.
VI. SECURITY AND PERFORMANCE ANALYSIS
For the simulation purpose Network Simulator 2 (NS-2.35)
has been used. Simulation parameter are as follows: The
simulation area is 300 m by 300 m. AODV protocol has been
used, since AODV protocol is loop free, avoid counting to
infinity problem and does not need any central administration
system to handle routing process. The UDP is used as
application traffic. UDP has two advantages over TCP: First,
the source code continuously sends UDP packets even if
malicious nodes drop them, while node finishes the
5. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 68
connection if it is used TCP. Second, it is able to count sent
and received packets separately even if the UDP connection is
lost during simulation; but in case of TCP, node finishes the
TCP connection after a while if it has not received the TCP
acknowledgement packet.
Following are the simulation parameters:
Parameters Value
Simulation Area 300*300
Number of Nodes 30
Routing Protocol AODV
Application Traffic CBR
Packet Size 1000 bytes
Simulation Time (Total No. of Nodes +3) Sec
Packet Interval 0.07 Sec
Queue 50
Table1: Simulation Parameters
Figure 2 shows creation of normal scenarios. Here, we can see
the communication is being carried out between node 4 and
15 and node 5 and 16.
Figure 2: Normal Scenario Creation
Figure 3: Scenario with DDoS Attack
Figure 4: Scenario with Vampire and DDoS Attacks
Following Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and
Figure 10 shows the PDR, Throughput, Delay, Jitter, Goodput
and Energy respectively.
Figure 5: Packet Delivery Ratio
Figure 6: Throughput
6. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 69
Figure 7: Goodput
Figure 8: Delay
Figure 9: Jitter
Figure 10: Energy
VIII. CONCLUSION AND FUTURE WORK
The Vampire and DDoS attacks are resources consumption
attacks which drain the energy of node in the network. This
draining of the energy of the nodes will affect the packet
forwarding process which in turn might degrade the
performance of the underlying network. Here we have
considered small network of 30 nodes which are divided into
three clusters; each cluster included ten nodes. Simulation
have been performed and various parameters have been
considered. From the result, we can conclude that the Vampire
and DDoS attacks have been mitigated using trust based
approach. The future work is to use the proposed technique to
mitigate Vampire and DDoS attacks with more number of
nodes and increasing the simulation area and also for other
types of attacks.
REFERENCES
[1]. Pallavi Kharti. Using Identity and Trust with Key Management for
achieving Security in Ad-hoc network; IEEE; 978-1-4799-2572-
8/2014.
[2]. Sandeep A. Throat and P.J.Kulkarni. Design Issues in Trust Based
Routing for MANET; IEEE; July 11-13, 2014.
[3]. Jenita T.and Jayshree P. Distributed Trust Node Selection for
Secure Group Communication in MANET; IEEE; 978-1-4799-
4363-0/2014.
[4]. H.Bharani , M.Kanchana, S,B.Dhivya , V.Kavitha and I.Vinnarasi
Tharania . Vampire Attacks: Draining Life from Wireless Ad-Hoc
Sensor Network; IJSTE; Vol. 1, Issue 1, July 2014.
[5]. Prof.Ramya S. Pure, Gauri Patil and Manzoor Hussaion Hussaion .
Trust based solution using counter strategies for Routing attacks in
MANET; IJISET; Vol. 1, Issue 1, July 2014.
[6]. G. Vijayanad and R. Muralidharan. Overcome Vampire Attacks
Problem In Wireless Ad-Hoc Sensor Network By Using Distance
Vector Protocols; IJCSMA; Vol. 2, Issue. 1, pg. 115-120, January-
2014.
[7]. Naveen Kumar Gupta and Kavita Pandey. Trust Based Ad-hoc On
Demand Routing Protocol for MANET; IEEE; 978-1-4799-0192-
0/2013.
[8]. Naveen Kumar Gupta and Amit Garg. Trust and shortest path
selection based routing protocol for mobile ad-hoc networks;
IJCA; Vol. 76, No.12, August 2013.
7. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue III, March 2017 | ISSN 2278-2540
www.ijltemas.in Page 70
[9]. Pallavi Kahtri and Aamir ohammed. TDSR: Trust Based DSR
Routing Protocol for Securing MANET; International Journal of
Networking and Parallel Computing. Vol. 1, Issue 3, January
2013.
[10]. Radha Krishna Bar, Jyotsna Kumar Mandal and Moirangthem
Marjith Singh. Quality of Service of mobile ad-hoc network
through Trust based AODV routing protocol by exclusion of
Black-hole attack; Science Direct; CIMTA 2013.
[11]. Sumathy Subramaniam, R. Saravanan and Pooja K. Prakash.
Trusted Based Routing to Improve Network Lifetime of Mobile
Ad-hoc Networks: Journal of Computing and Information
Technology; CIT 21, 2013.
[12]. Issac Woungang, Mohmmed S. Obaidat, Sanjay Kumar
Dhurandher, Han-Chieh Chao and Chris Liu. Trust enhanced
Message Security Protocol for Mobile Ad-hoc Networks; IEEE;
ICC 2012.
[13]. Ahmed M. Abd El-Haleem and Ihab A. Al.TRIUMF: Trust-Based
Routing Protocol with control degree of Selfishness for Securing
MANET against Packet Dropping Attack; International Journal of
Computer Science; Vol. 8, Issue 4, No. 1, July 2011.
[14]. N. Bhalaji and Dr. A. Shanmugam. Defence Strategy using Trust
based model to mitigate active attacks in DSR based mobile ad-
hoc network; Journal of Advances in Information Technology;
Vol. 2, No. 2, May 2011.
[15]. Zhen Yan, Peng Zhang and Teemupekka Virtanen. Trust
Evaluation Based Security Solution in Ad-hoc Networks; 2011.