Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Privacy preserving and truthful detection of packet dropping attacks in wirel...LeMeniz Infotech
Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this project, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, where by malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance.
Privacy preserving and truthful detection of packet dropping attacks in wirel...LeMeniz Infotech
Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the
channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on
the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The
malevolent node pretends to be an one of the node in the routing path and cause the assailment.
Conventional algorithm does not provide the efficient detection of packet loss so, In order to ameliorate the
detection accurately we propose correlation function and withal for the correct calculation of correlation we
implement BLS predicated Homomorphism Linear Authenticator to check the information provided by the
node are true. The HLA architecture provides privacy preserving, collusion proof and sanctions low
communication and storage overheads.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
Privacy preserving and truthful detection of packet dropping attacks in wirel...LeMeniz Infotech
Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this project, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, where by malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance.
Privacy preserving and truthful detection of packet dropping attacks in wirel...LeMeniz Infotech
Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks
PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the
channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on
the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The
malevolent node pretends to be an one of the node in the routing path and cause the assailment.
Conventional algorithm does not provide the efficient detection of packet loss so, In order to ameliorate the
detection accurately we propose correlation function and withal for the correct calculation of correlation we
implement BLS predicated Homomorphism Linear Authenticator to check the information provided by the
node are true. The HLA architecture provides privacy preserving, collusion proof and sanctions low
communication and storage overheads.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Privacy preserving and truthful detection of packet dropping attacks in wirel...Shakas Technologies
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy.
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
Computer network is unpredictable due to information warfareand is prone to various attacks. Such attacks
on network compromiseson the most important attribute, the privacy. Most of such attacksare devised using
special communication channel called Covert Channel".The word Covert" stands for hidden or nontransparent.
Network Covert Channel is concealed communication paths within legitimatenetwork
communication that clearly violates security policies laiddown. Non-transparency in covert channel is also
referred to as trapdoor.A trapdoor is unintended design within legitimate communication whosemotto is
leak information. Subliminal channel, a variant of covert channelworks similarly as network covert channel
except that trapdoor is setin cryptographic algorithm. A composition of covert channel with
subliminalchannel is the Hybrid Covert Channel". Hybrid covert channelis the homogeneous or
heterogeneous mixture of two or more variantsof covert channel either active at same instance or at
different instanceof time. Detecting such malicious channel activity plays a vital role inremoving threat to
legitimate network.In this paper, we introduce new detection engine for hybrid covert channelin transport
layer visualized in TCP and SSL. A setup made onexperimental test bed (DE-HCC9) in RD Lab of our
department. Thepurpose of this study is to introduce few performance metrics to evaluatedetection engine
and also to understand the multi-trapdoor natureof covert channel.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets
loss
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing
cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by
evaluating some network performances such as average delay, throughput of communication and packets
loss.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Privacy preserving and truthful detection of packet dropping attacks in wirel...Shakas Technologies
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy.
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
Computer network is unpredictable due to information warfareand is prone to various attacks. Such attacks
on network compromiseson the most important attribute, the privacy. Most of such attacksare devised using
special communication channel called Covert Channel".The word Covert" stands for hidden or nontransparent.
Network Covert Channel is concealed communication paths within legitimatenetwork
communication that clearly violates security policies laiddown. Non-transparency in covert channel is also
referred to as trapdoor.A trapdoor is unintended design within legitimate communication whosemotto is
leak information. Subliminal channel, a variant of covert channelworks similarly as network covert channel
except that trapdoor is setin cryptographic algorithm. A composition of covert channel with
subliminalchannel is the Hybrid Covert Channel". Hybrid covert channelis the homogeneous or
heterogeneous mixture of two or more variantsof covert channel either active at same instance or at
different instanceof time. Detecting such malicious channel activity plays a vital role inremoving threat to
legitimate network.In this paper, we introduce new detection engine for hybrid covert channelin transport
layer visualized in TCP and SSL. A setup made onexperimental test bed (DE-HCC9) in RD Lab of our
department. Thepurpose of this study is to introduce few performance metrics to evaluatedetection engine
and also to understand the multi-trapdoor natureof covert channel.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets
loss
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing
cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by
evaluating some network performances such as average delay, throughput of communication and packets
loss.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing
cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by
evaluating some network performances such as average delay, throughput of communication and packets
loss.
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
Abstract The aim of this paper is to protect the wireless network against the blackhole attack. Blackhole attack, as the name suggest, drops all the packets forwarded to it. In this paper, we have proposed an intrusion detection system (IDS) scheme to detect the malicious node (blackhole node) and to nullify its effect in the network. The proposed IDS scheme in the presence of blackhole attack gives approximately similar result as that of in the absence of attack. The network comprises for the three modules (i) Default AODV, (ii) AODV in the presence of blackhole attack and (iii) IDS scheme in the presence of attack by considering some parameters such as end to end delay, throughput, packet delivery ratio, normalized routing load etc. The proposed algorithm has been simulated on Network Simulator version-2 (NS-2). Key Words: AODV, Blackhole attack, DSN, IDS scheme, routing misbehavior, security
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
In Mobile Ad Hoc Networks(MANETs), a set of interacting nodes should cooperatively
implement the routing functions to enable end-to-end communication along dynamic paths composed by
multi-hop wireless links. Several multi-hop routing protocols have been proposed for ad hoc networks,
and most popular ones include: Dynamic Source Routing (DSR), Optimized Link-State Routing (OLSR),
Ad Hoc On-Demand Distance Vector (AODV) and Destination- Sequenced Distance-Vector (DSDV).
Most of these protocols rely on the assumption of a trustworthy cooperation among all participating
nodes; unfortunately, this may not be a realistic assumption in real hosts. Malicious hosts could exploit
the weakness of MANET to launch various kinds of attacks. Node mobility on ad hoc network cannot be
restricted. As results, many Intrusion Detection System(IDS) solutions have been proposed for the wired
network, which they are defined on strategic points such as switches, gateways, and routers, can not be
implemented on the MANET. Thus, the wired network IDS characteristics must be modified prior to be
implemented in the ad hoc network. Thus an IDS should be added to enhance the security level of
MANETs. If MANET can detect the attackers as soon as they enter the network, we will be able to
completely eliminate the potential vulnerabilities caused by compromised nodes at the first time. IDSs
usually act as the second layer in MANETs. This paper presents an novel IDS for MANETs which is
based on acknowledgements.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
Similar to PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
1. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
PACKET DROP ATTACK DETECTION TECHNIQUES
IN WIRELESS AD HOC NETWORKS: A REVIEW
Kennedy Edemacu1, Martin Euku2and Richard Ssekibuule3
1 College of Computing and Information Sciences, Makerere University
Kampala, Uganda
2 College of Computing and Information Sciences, Makerere University
Kampala, Uganda
3College of Computing and Information Sciences, Makerere University
Kampala, Uganda
ABSTRACT
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
KEYWORDS
Wireless Ad hoc networks, Packet dropping attack, Watch Dog, Side Channel Monitoring, Monitoring
Agent, Sequence number.
1. INTRODUCTION
Wireless ad hoc networks are a group of computing devices equipped with radio transceivers and
interconnected wirelessly through radio frequency without a fixed infrastructure or centralized
control [13]. The most common examples of wireless ad hoc networks are wireless sensor
networks [1] [22] and mobile ad hoc networks [2].
In wireless ad hoc networks, nodes communicate with each other using multi hop wireless links.
Data to out of range nodes can be routed through intermediate nodes. That is nodes in wireless ad
hoc networks can act as both hosts and routers. There are numerous application areas in which
wireless ad hoc networks can be used ranging from military operations and emergency disaster
relief to community networking and interaction among meeting attendees or students during
lectures [21].
One basic assumption according to Djahel et al [3] in design of routing protocols in wireless ad
hoc networks is that, every node is honest and cooperative. This introduces a vulnerability that
can be exploited for launching attacks. An example of such attack is the malicious packet
dropping.
DOI : 10.5121/ijnsa.2014.6506 75
2. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
A number of techniques have been proposed in literature to mitigate the packet dropping problem
in wireless ad hoc networks. In this paper, we review some of the malicious packet dropping
detection techniques proposed in literature and comparatively analyze them. The rest of the paper
is organized as follows; section 2 discusses packet dropping in wireless ad hoc networks, in
section 3, we discuss some of the packet drop attack detection techniques proposed, section 4
presents a malicious node identification tool, section 5 compares these techniques under different
scenarios and section 6 concludes the paper.
76
2. PACKET DROPPING IN WIRELESS AD HOC NETWORKS
Like in any other network, packet loss is expected in ad hoc networks at least to an acceptable
percentage. Not all packets lost should be viewed as malicious. In this section, we discuss some
of the packet loss scenarios in wireless ad hoc networks.
2.1 Legitimate Packet Dropping
Packet dropping can be experienced in wireless ad hoc networks where no compromised nodes
are present. This packet loss is mainly associated with the following events;
I. Network Congestion
Network congestion in wireless ad hoc networks is something unavoidable. These networks are
mainly scalable due to in and out movements of nodes. As a result, congestion is more likely to
happen which can lead to loss of packets.
II. Channel Conditions
In wireless networking the channel condition cannot be neglected since it changes drastically.
Free path loss, interference, presence of noise on the channel and fading of the transmitted
wireless signals are among the channel conditions that can lead to packet loss or bit errors in the
transmitted signal. In the presence of these factors, some packets can get dropped.
III. Resource Constraints
Nodes in wireless ad hoc networks have limited energy resource [23] [24] [30]. Intermediate
nodes in these networks may behave selfishly and fail to forward the received packets in order to
conserve their limited resources battery power. These packets in turn get dropped.
2.2 Malicious Packet Dropping
Mostly, the first step in launching a packet dropping attack is for a malicious node to get involved
during route formation. This is better done by exploiting the vulnerabilities of the underlying
well known routing protocols used in wireless ad hoc networks which are designed basing on the
assumption of trustworthiness between nodes in a network.
Once in the route, the malicious node can do anything including maliciously dropping packets.
This Packet dropping at a malicious intermediate node can lead to suspension of communication
or generation of wrong information between the source and destination which is an undesirable
situation. For better understanding, following are the illustrations of malicious packet dropping
scenarios in wireless ad hoc networks under the two commonly used routing protocols AODV
(Ad hoc On Demand Distance Vector) and OLSR (Optimized Link State Routing).
3. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
77
Figure 1. Route Discovery in AODV [4]
A. Packet Dropping in AODV
The route discovery process between source (S) and destination (D) under AODV routing
protocol is as illustrated in Figure 1.The source broadcasts a RREQ (Route Request) message
with unique identifier to all its one hop neighbors. Each receiver rebroadcasts this message to
its one hop neighbors until it reaches the destination.
The destination on receiving the message updates the sequence number of the source and sends a
RREP (Route Reply) message back to its neighbor which relayed the RREQ. On the other hand,
an intermediate node that has a route to the destination with destination sequence number equal
to the one in RREQ can send back a RREP packet to the source node without relaying to the
destination.
For a node to launch packet dropping attack, it must be involved in at least one routing paths
in the network. This is illustrated in Figure 2, C is a malicious node intending to drop packets
from S to D. To discover a path from S to D, S first broadcasts RREQ packet to its neighbors.
Each neighboring node continues to rebroadcast this message as explained earlier until it reaches
D.
Figure 2. Packet Dropping Attack in AODV [4]
The malicious node C disobeys this rule and lies to S claiming it has the shortest path to D and
sends a RREP packet to S. As a result, S assumes that the shortest route to D is through C and
starts to send data packets to D through C which are in turn dropped.
B. Packet Dropping in OLSR
OLSR uses Multipoint Relays (MPRs) which are set of neighboring nodes that are responsible for
spreading the local link state information to the whole network for optimization. The link state is
broadcasted periodically through Topology Control (TP) messages. Each node in OLSR selects
its MPR set from its one hop neighbors such that it can easily reach all its two hop neighbors
with minimum number of retransmissions.
Selection of the MPR depends on the number of two hop neighbors reachable through the
candidate node and its “Willingnessı value obtained from “Hello” message which indicates
the readiness of a node to forward packets of its neighbors.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
Through periodic exchange of link state, each node senses its neighbors and disseminates the
network topology. Each node constructs a partial topology graph of the network from
broadcasted TC messages which allows it to establish routes to non-neighboring nodes.
For a packet dropping attack, a malicious node may send a TC message claiming to be a MPR of
nodes although it may not. As the network depends on the MPRs for routing services, the
malicious node may decide to drop packets passing through it.
78
3. PACKET DROPPING ATTACK DETECTION TECHNIQUES
A number of malicious packet dropping detection techniques have been proposed in literature. In
this section we discuss some of them;
3.1 Watch Dog Technique
The watch dog technique has been the most well know node misbehavior detection in ad hoc
networks. In this technique, every node acts as a watchdog agent monitoring packet
transmissions to neighboring nodes [17]. The watchdog agents save a copy of packets in their
watchdog monitoring buffers before their transmission to the next node. This serves to monitor
packet relay from a neighboring node to the next node.
Figure 3. An illustration of Watch Dog [17]
Figure 3 shows an example of watchdog. “S” is the source node and “D” is the destination node.
The other nodes are intermediate nodes in the route between ‘S’ and ‘D’. Before ‘A’ forwards a
packet received from ‘S’, it saves the packet in its watchdog monitoring buffer. After
forwarding the packet to ‘B’, ‘A’ monitors whether the packet has been forwarded to ‘C’.
This is because ‘A’ is expected to receive a copy of the packet forwarded to ‘C’ since it’s within
‘B’s transmission range. ‘A’ then compares the received packet with the one saved in its watchdog
monitoring buffer. If ‘A’ fails to receive a copy of the packet from ‘B’ within certain duration, it
reduces the confidence level of ‘B’ by 0.05. When this happens in recurring manner, the
confidence level is set to zero and ‘A’ decides that ‘B’ is a malicious node and sends an
alarm so as to change the route through ‘B’. Meanwhile if ‘B’ forwards the packet within the
time duration, ‘A’ rewards ‘B’ by increasing its confidence level by 0.01.
Forootaninia et al [10], proposed an improved version of watch dog technique (I-Watch dog). In I-Watch
dog technique, the cluster head is assumed to be the watchdog as illustrated in Figure 4.
Figure 4. Proposed Improved-Watchdog (I-Watchdog) [10]
5. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014
Incase node A wants to communicate with node C, node M which is the cluster head acts as the
watchdog. It’s assumed that, M has a buffer that accommodates all the sent packets within its
range. Node B is the intermediate node between A and C. M monitors the packet forwarding
character of B after receiving A’s message which is stored in its buffer and compares the received
copy from B with the buffered message. If the messages are similar, the buffered message is
dropped. Otherwise, it is considered that, B has not sent the message or replaced with another.
This work though improves the life span and power consumption of sensor nodes, has not
addressed the packet dropping detection inefficiencies of watch dog technique.
Under circumstances of ambiguous collision problems, False misbehavior, receiver collision
problems insufficient transmission power, Cooperated misbehavior and partial packet dropping
[25] [27], watch dog technique fails. Since watch dog relies on confidence values, a malicious
node can partially drop packets so that its confidence value does not come to zero. This technique
is only suitable in environments in which the watch dog agent has knowledge of its two hop
neighbors [26]. As a result, it is only more effective in source routing protocols like Dynamic
Source Routing (DSR).
79
3.2 Side Channel Monitoring (SCM)
In SCM a sub-set of neighbors for each node in a route between source and destination are
selected to observe and monitor their message forwarding behaviors [18]. Alarm channel
(Primary channel and Side channel) is generated to inform the source about the misbehaving
node; The Primary channel (PC) is formed by nodes in the route and Side channel (SC) is
formed by sub-set of monitoring neighbors.
As an example, consider an established data communication path R = a0. . . ak+1 with k 0 and a0 ,
ak+1 being source and destination respectively. It’s assumed that a1,. . . , ak are normal at the route
establishment time and that a0 and ak+1 are always normal during their communication time.
Packets transmitted along R can be classified as data packets or alarm packets. Data packets flow
from a0 to ak+1 meanwhile alarm packets flow in the opposite direction. The alarm packets are
normally generated by intermediate nodes and transmitted to the source through the SC.
In (Figure 5a), for the two successive nodes ai−1 and ai between the source and destination, a set Gi
of nodes are selected as observers. The selected nodes in Gi are responsible for monitoring
whether ai forwards ai−1’s data packets towards ak+1 and generate an alarm when it fails to forward
within a given time window. In Figure 5b, the logical view of observer nodes is presented. Gi [1 2
3 4 5] monitors ai-1 and Gi+1 [4 5 6 7 8 9] monitors ai.
a b c
Figure 5. An illustration of Side Channel monitoring Technique [18]
For a particular node under observation, the set of monitoring nodes keep observing its data
forwarding behavior. If it fails to forward a data packet within a given time period, the set
generates an alarm that is sent to the source through the SC created between different sets of
6. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
monitoring nodes as illustrated in Figure 5c. The watch dog nodes in the path also
construct a PC for forwarding such kind of misbehavior to the to the source.
The source accumulates this information about a particular node and once it has exceeded a
threshold value, it generates a warning message that is forwarded to all the nodes in the network
and reconstructs a different path that excludes the misbehaving node.
Since, the primary channel operates the same way as the watch dog and all the neighboring nodes
have the ability to do side channel monitoring, in mobile environments, SCM detects packet drop
attack. SCM on the other side generates lots of network traffic from the side channels and
primary channel causing communication overhead.
80
3.3 Monitoring Agent Technique
[19], proposed the monitoring agent technique. The technique is based on capturing packets
sent by neighboring nodes within a transmission range. All the nodes in a network collect
information about their one hop neighbors within a certain period of time. The collected
information include; the total number of packets transmitted from a particular node (WLi),
the average number of transmitted packets from all its one hop neighbors (AWL), the
packet drop rate of a particular one hop neighbor (DRi), and the average packet dropping
rate by all its one hop neighbors (ADR ) which are used for identifying a malicious node.
Figure 6 is an illustration of the concept and S is the monitoring agent. S uses information
collected from its neighbors to determine whether there are legitimate or malicious nodes.
Assuming the information S collected during a certain period from its neighbors is as in table 1.
Figure 6. An illustration of monitoring Agent [19]
Table 1. Measured sample values [19]
From table 1, node A is assumed to be a malicious node due to its high packet drop rate.
Another parameter DEVi (ADR‐DRi) helps in determining a suspicious node. DEVi is calculated
for each node before sending a packet from the monitoring node to each neighboring node.
The nodes are then sort in a descending order based on DEVi to classify the suspicious and
normal nodes as illustrated in the table 2.
7. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
81
Table 2. DEVi sorted in descending order [19]
Also a parameter Dn (Average packet drop rate (ADR) /2) is calculated. If a node has DEVi
more than Dn, it’s assumed to be normal otherwise it’s considered malicious.
To reduce false negatives (whether a node dropped packets maliciously or due to traffic
problem), AWL (average of packet transmission by neighboring nodes) is calculated. In table 1,
the AWL during a certain period of time is 224. The total number of packets broadcasted by a
malicious node A during that period was 100 and this was lower than the average number
of packets, so it had a high packet drop rate. Thus, monitoring node S determined that
node A was maliciously dropping packets and an alarm message was sent to the entire
network so as to inform the source.
3.4 Sequence Number Model
In [20], another technique “Sequence number model technique” for detecting packet dropping
attack was proposed. Consider Fig 6, source (S) is out of communication range with
destination (R) and uses intermediate node ‘X’ to reach ‘R’. When ‘R’ determines that the
rate of packet loss using TCP sequence number through ‘X’ has exceeded a certain
threshold value, ‘R’ becomes suspicious and starts the investigation.
Figure 7. An illustration of Sequence number model [20]
‘R’ first sends ‘X’ a message requesting it to broadcast a special message to all its neighbors. The
special message requests all X’s neighbors to send ‘R’ a secure message communicating the
traffic amount they forward to ‘X’. Once ‘R’ sends the special message to ‘X’, it starts to
monitor ‘X’ to determine whether it will send the message to its neighbors. To prevent an intruder
from making X’s neighbors sending ‘R’ false message in response to its query, an
authentication system based on private symmetric session key is used. Once ‘R’ gathers all the
information from X’s neighbors, it can determine whether the packet loss is due to
congestion or malicious.
If another node other than ‘X’, say ‘Y’ is the one compromising the network, it may decide to
send false information to ‘R’. To overcome this, each node is asked to monitor the total traffic
sent by each of its neighbors. This helps ‘X’ to identify the true intruder ‘Y’ and informs ‘R’ about
it.
8. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
82
3.5 PathRater
PathRater is run by every node in the network [31] [26]. A node maintains ratings for every other
node it knows in the network basing on the knowledge of misbehaving nodes and link reliability
data in order to choose the most suitable path. A path metric is calculated by averaging the ratings
for nodes in the path. In case there is more than one path to the destination, the path with the
highest metric is chosen. A pathrater node assigns a neutral rating of 0.5 to nodes known to it. It
normally assigns itself a rating of 1. The ratings are updated in intervals of 200ms. The ratings for
nodes in active path are increased by 0.01 and the maximum rating a node can attain is 0.8. A
node’s rating is decreased by 0.05 when a link break is detected and the node becomes
unreachable.
A negative path metric value indicates presence of misbehaving nodes in the path. Due to faults
or false accusations, a node may be marked as a misbehaving node. It is generally better not to
permanently mark it as misbehaving node. Therefore, the marked misbehaving nodes’ rating
should be increased slowly or set back to 0.0 after a long time period.
When a pathrater detects a misbehaving node in a path it is using and fails to get an alternative
path free of misbehaving nodes, it sends out a route request message called Send Route Request
(SRR) [31]. This way, a new metric can be constructed from which a new path can be determined.
3.6 TwoAck
In this technique, packets sent by a node are expected to be received by nodes which are two hops
away in the path [32]. Nodes in a path are expected to send acknowledgement packets called
TWOACK packets two hops backwards. If a node fails to receive TWOACK packet after sending
or forwarding packets, the next node’s link is considered to be misbehaving and will be
eliminated in the next routing.
In order to reduce the overhead due to these acknowledgement messages, a scheme called
selective-TWOACK (S-TWOACK) which selectively acknowledges packets was proposed in
[33]. In this scheme, an acknowledgement is sent after receiving certain number of data packets.
4. MALICIOUS NODE IDENTIFICATION
Not all the packet dropping detection techniques can identify malicious nodes. Some simply
detect the packet dropping misbehavior without identifying the malicious node. Once malicious
packet dropping behavior is detected, the responsible malicious node needs to be identified. There
is one malicious node identification tool (traceroute tool) being used in wired networks which can
be adopted for wireless ad hoc networks [28].
4.1 Traceroute
Traceroute [29] is used to determine the route to a destination node. It sends probing UDP
messages with increasing Time-to-Live (TTL) values towards the destination. The first probe is
assigned a TTL value of 1. This enables the message to travel only the first hop in the path to
destination. Once the TTL elapses, the packet gets dropped and an ICMP time exceeded message
is sent back to the probing node. The probing node then keeps on increasing the TTL value for the
successive probing UDP messages until it reaches all the intermediate nodes between the source
and the destination. Every time the UDP packet gets dropped, an ICMP port unreachable message
is sent back to the source as illustrated in Figure 8.
9. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
In Figure 8, node 1 wants to reach node 9. It sends probing UDP messages with increasing TTL
values until it reaches the destination node 9. Every time a TTL elapses in an intermediate node,
the node sends back an ICMP time exceeded (TE) message to node 1 with its address. This way,
node 1 is able to know the route to node 9 by combing the received addresses from the respective
ICMP messages.
In case a malicious packet dropping node is in the route between the source and the destination,
the sent UDP messages get dropped and fail to reach the destination. Since, for every dropped
packet an ICMP message containing the address of the dropping node is sent back to the source, it
is possible to isolate and identify the malicious node.
83
Figure 8. An Illustration of traceroute [28].
5. COMPARISON OF THE PACKET DROP ATTACK DETECTION
TECHNIQUES
In this section, we compare the discussed packet dropping attack detection techniques in terms of;
the attack kinds they can detect (partial and cooperate attacks), the potential to detect attacks in
mobile environments, the computational overhead and the communication overhead caused.
Some malicious packet dropping detection techniques in wireless ad hoc networks consider a
node malicious if it drops packets above a certain threshold value, the partial attack
exploits this principle in that the malicious node if aware of the threshold will drop
packets to a value just below the threshold. On the other hand, cooperate attack is one where
two or more coordinated malicious nodes are used to launch an attack. The malicious nodes may
be on the same or different routes but usually are synchronized.
The comparison for the different packet dropping attack detections are illustrated in table 3.
Technique
Computation
al Overhead
Communicatio
n Overhead
Mobility
Environme
nt
Partial
Attack
Cooperate
Attack
Watch Dog Low Low Yes No No
SCM Average Average Yes Yes Yes
Monitoring
Agent
High Average No Yes Yes
Sequence
Number Model
Average High No Yes No
10. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
84
PathRater Average Low Yes No Yes
TwoAck Low High Yes Yes Yes
Table3. Comparison of the different Packet dropping Attack Detection techniques
6. CONCLUSION
Wireless ad hoc networks are widely used in military and civilian applications. Security which is
a critical factor is a concern in these kind of networks due to lack of centralized control. This
results into launching of different attacks including the packet dropping attack in these kind of
networks. In this work, we reviewed the malicious packet dropping in wireless ad hoc networks
considering the two common routing protocols AODV and OLSR as example cases. We
comparatively analyzed some of the malicious packet dropping detection techniques proposed to
assess their effectiveness and limitations. The Watch Dog though produces less computational and
communication overhead is susceptible under partial and cooperate attacks. The SCM produces
average computational and communication overheads as it detects different kinds of attacks in
mobile environments. The Monitoring Agent produces high overheads in detecting different
attack kinds and is susceptible in mobile environments. And the sequence number technique as
well produces high overheads and is susceptible in mobile environments and does not detect all
attack kinds.
Depending on the anticipated attack strategy, network environment (mobile or stationary) and the
processing power of the nodes to be used in a given wireless ad hoc network the choice of a
malicious packet dropping technique can be guided by this work. As a future work, designing a
malicious packet dropping detection technique that effectively detects the packet dropping attack
in any environment while keeping the generated overheads minimal will be our focus.
REFERENCES
[1] S Meguerdichian, F. Koushanfar, M. Potkonjak and M. B. Srivastava, “Coverage Problems in
Wireless Ad-hoc Sensor Networks”, Available from: www.cs.ucla.edu.
[2] S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile Ad Hoc Networking, Wiley-IEEE
Press, 2004.
[3] S. Djahel, F. Na¨ıt-abdesselam, and Z. Zhang, “Mitigating Packet Dropping Problem in Mobile
Ad hoc Networks: Proposals and Challenges”, IEEE Communications Surveys Tutorials, vol.
13, no. 4, Fourth Quarter 2011.
[4] X. Wu and D. K. Y. Yau, “Mitigating denial-of-service attacks in by incentive-based packet
filtering: A game theoretic approach”, in proc 3rd International Conference on Security and Privacy in
Communications Networks, September 2007.
[5] Y. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security Privacy, 2(3):
28-39, May 2004.
[6] D. Djenouri, L. Khelladi and N. Badache, “A Survey of Security Issues in Mobile Ad Hoc and
Sensor Networks”, IEEE Common. Surveys Tutorials, 7(4): 2-28, Fourth Quarter 2005.
[7] P. Argyroudis and D. O
‟
Mahony, “Secure Routing for Mobile Ad Hoc Networks”, IEEE Commun.
Surveys Tutorials, 7(3): 2-21, Third Quarter 2005.
[8] T. R. Andel and A. Yasinsac,”Surveying Security Analysis Techniques in MANETRouting Protocols”,
IEEE Commun. Surveys Tutorials, 9(4):70-84, Fourth Quarter 2007.
11. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
[9] S. S. Tripathi and S. Agrawal, “A Survey on Enhanced Intrusion Detection System in Mobile Ad
hoc Network”, International Journal of Advanced Research in Computer Engineering
Technology (IJARCET) Volume 1, Issue 7, September 2012.
[10] A. Forootaninia and M. B. Ghaznavi-Ghoushchi, “International Journal of Network Security Its
85
Applications (IJNSA)”, Vol.4, No.4, July 2012.
[11] S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc
Networks”, In Proc. ACM/IEEE Int Conf. on Mobile Computing and Networking, pp. 255-265,
2000.
[12] H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time Protocol Analysis for Detecting Link-State Routing
Protocol Attacks”, ACM Tran. Inf. Sys. Sec., 1, pp. 1-36, 2001.
[13] X. Li, R. Lu, X. Liang, and X. Shen, “Side Channel Monitoring: Packet Drop Attack Detection in
Wireless Ad hoc Networks”, IEEE Communications Society subject matter experts for
publication in the IEEE ICC 2011.
[14] S. Sharma and R. Gupta, “Simulation study of black hole attack in the mobile ad hoc networks”, In
Journal of Engineering Science and Technology, pp 243–250, 2009.
[15] M. S. Islam and S. A. Rahman, “Anomaly Intrusion Detection System in Wireless Sensor
Networks: Security Threats and Existing Approaches”, International Journal of Advanced Science
and Technology Vol. 36, November, 2011.
[16] B. Ramesh, V. Neelima, S. N.Kumar, T. Soujanya and R. S. Prakash, “Optimizing congestion in
wireless Ad hoc Networks”, International Journal of Advanced Research in Computer Science and
Software Engineering, 2012.
[17] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc
Networks”, Proc. 6th Annual Intl. Conf. on Mobile Computing and networking (MobiCom’00),
Boston, Massachusetts, August 2000, pp. 255‐265.
[18] X. Li, R. Lu, X. Liang, and X. Shen, “Side Channel Monitoring: Packet Drop Attack Detection in
Wireless Ad hoc Networks”, publication in the IEEE ICC proceedings, 2011.
[19] J. Ko, J. Seo, E. Kim and T. Shon, “Monitoring Agent for Detecting Malicious Packet Drops for
Wireless Sensor Networks in the Microgrid and Grid-enabled Vehicles”, International Journal of
Advanced Robotic Systems, 19 Apr 2012.
[20] W. Zhang, R. Rao, G. Cao, and G. Kesidis, “Secure routing in ad hoc networks and a related intrusion
detection problem”, accessed on 2nd Nov 2012.
[21] Y. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy,
2004.
[22] M. S. I. Mamun and A.F.M. S. Kabir, “Hierarchical Design Based Intrusion Detection System For
Wireless Ad Hoc Sensor Network”, International Journal of Network Security Its Applications
(IJNSA), Vol.2, No.3, July 2010.
[23] P. Swetha and V. Bhupathi, “Unmasking Of Packet Drop Attack In Manet”, International Journal of
Emerging Trends Technology in Computer Science (IJETTCS), Volume 2, Issue 6, November –
December 2013.
[24] O. F. Gonzalez, G. Ansa, M. Howarth, and G. Pavlou, “Detection and Accusation of Packet
Forwarding Misbehavior in Mobile Ad-Hoc Networks”, Journal Of Internet Engineering, Vol. 2, No.
1, June 2008.
[25] J. Jubin and J. Tornow, “The DARPA Packet Radio Network Protocols”, In Proceedings of the IEEE,
75(1):21-32, 1987.
[26] P. Peethambaran and J. S. Jayasudha, “Survey Of Manet Misbehaviour Detection Approaches”,
International Journal of Network Security Its Applications (IJNSA), Vol.6, No.3, May 2014.
[27] D. Djenouri and N. Badache, “A Survey on Security Issues in Mobile Ad hoc Networks”, Report,
February 2004.
12. International Journal of Network Security Its Applications (IJNSA), Vol.6, No.5, September 2014
[28] S. Gavini, “Detecting P Acket -Dropping Faults In Mobile Ad-Hoc Networks”, Thesis, Washington
86
State University, School of Electrical Engineering and Computer Science, DECEMBER 2004.
[29] V . Jacobson. “Traceroute Computer software”, Available from ftp://ftp.ee.lbl.gov/traceroute.tar.gz.
[30] V. L. L. Thing and H. C. J. Lee, “IP Traceback for Wireless Ad-hoc Networks”, Available from:
http://www.diadem-firewall.org/publications, Accessed on: 28th August 2014.
[31] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc
Networks”, Available from: http://www.cs.cmu.edu. Accessed on: 28th August 2014.
[32] K. Balakrishnan, D. Jing and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc
Networks”, Wireless Communications and Networking Conference, IEEE, 2005.
[33] K. Balakrishnan, J. Deng, and P.K.Varshney,” TWOACK: Preventing selfishness in Mobile Ad Hoc
Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC’05), Mar.2005.
Authors
Kennedy Edemacu received Bsc in Computer Science from Gulu university in 2011. He
has received Msc in Data communication and Software Engineering from Makerere
University. He is currently working as a teaching staff in Muni University. His recent
research interest s include; Machine-to-Machine communication, Security in Wireless Ad
hoc Networks, Resource Allocation and Image Processing.
Martin Euku received Bsc in Computing and Information technology from Kyambogo
University in 2011. He is currently pursuing Msc in Data Communication and Software
Engineering from Makerere University. His research interests include; Security in Ad hoc
networks and Long Distance Wi-fi
Richard Ssekibuule is pursuing Phd from Makerere university. He is currently teachin g in
the college of Computing and information sciences Makerere University. He has several
publications in International Journals and Conferences. His current research interests
include; Cryptography, Machine Learning and Auction Mechanisms.