This document summarizes a research paper that surveyed detection and prevention mechanisms for flooding attacks in mobile ad hoc networks (MANETs). It began with an abstract that described how MANETs are increasingly being used but also face security threats like flooding attacks. It then provided definitions and characteristics of MANETs and described two common routing protocols: AODV and OLSR. The paper discussed flooding attacks and different detection and prevention schemes that have been proposed. It concluded with a survey of these mechanisms to detect and mitigate flooding attacks in MANETs.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
- Mobile ad hoc networks (MANETs) are autonomous systems of wireless nodes that can dynamically change topology as nodes move. Routing must adapt to these changes.
- There are two main categories of routing protocols: table-driven protocols proactively maintain consistent, up-to-date routing tables whereas on-demand protocols only determine routes when needed.
- Examples of protocols include DSDV as a table-driven protocol and AODV as an on-demand protocol, with AODV using route requests and replies to discover routes only when transmitting data.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
- Mobile ad hoc networks (MANETs) are autonomous systems of wireless nodes that can dynamically change topology as nodes move. Routing must adapt to these changes.
- There are two main categories of routing protocols: table-driven protocols proactively maintain consistent, up-to-date routing tables whereas on-demand protocols only determine routes when needed.
- Examples of protocols include DSDV as a table-driven protocol and AODV as an on-demand protocol, with AODV using route requests and replies to discover routes only when transmitting data.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Ad-hoc routing protocols allow nodes in a mobile ad hoc network to discover the network topology and route packets between nodes that may not be directly connected. The key goals of ad-hoc routing protocols are to minimize control overhead and processing overhead, enable multihop routing between nodes not in direct transmission range, dynamically maintain routes as nodes move, and prevent routing loops. There are three main categories of ad-hoc routing protocols: table-driven protocols that maintain up-to-date routing tables via periodic updates, on-demand protocols that find routes only when needed via flooding, and hybrid protocols that use aspects of both table-driven and on-demand routing.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
A comparative study of reactive and proactive routingAbhiram Subhagan
This document presents a comparative study of reactive and proactive routing protocols in mobile ad hoc networks (MANETs). It summarizes key characteristics of MANETs and different types of routing protocols used in MANETs, including proactive, reactive, hybrid, and hierarchical protocols. It then describes the proactive Destination-Sequenced Distance-Vector (DSDV) and reactive Ad hoc On-Demand Distance Vector (AODV) routing protocols in more detail. The document outlines a simulation conducted using the NS-2 network simulator to compare the performance of DSDV and AODV under different metrics like throughput, packet loss, and end-to-end delay. The results showed that AODV, a reactive protocol
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an introduction and overview of a dissertation submitted by Rachna to partially fulfill the requirements for a Master of Technology degree in Computer Science and Engineering. The dissertation focuses on improving the route discovery phase in multi-path Dynamic Source Routing (DSR) for mobile ad-hoc networks using a hybrid ant colony optimization approach. Key topics covered in the introductory chapters include an introduction to mobile ad-hoc networks, categories of ad-hoc routing protocols including DSR and AODV, characteristics and design challenges of MANETs, and concepts related to route discovery and maintenance in DSR.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document summarizes a proposed system for providing data security and accountability in cloud computing. It discusses the existing issues around lack of security and accountability when data is stored in the cloud. The proposed system aims to address these issues through the use of technologies like OTP verification for user registration, encryption and fragmentation of user data, and monitoring of data and system activities by a Third Party Auditor. The system is designed with modules for data security, accountability, and integrity verification. It outlines the architecture including user registration and authentication, file uploading and downloading processes, and generation of alerts if any security issues are detected during internal monitoring.
This document discusses the theoretical and numerical analysis of a vibration isolator subjected to harmonic excitation. It presents equations to model the isolator and calculate the force and displacement transmissibility. The analysis considers varying the damping coefficient and spring stiffness. MATLAB is used to generate transmissibility curves matching the theoretical analysis. An experimental setup is proposed to validate the results and consider nonlinearities not included in the theoretical model.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Ad-hoc routing protocols allow nodes in a mobile ad hoc network to discover the network topology and route packets between nodes that may not be directly connected. The key goals of ad-hoc routing protocols are to minimize control overhead and processing overhead, enable multihop routing between nodes not in direct transmission range, dynamically maintain routes as nodes move, and prevent routing loops. There are three main categories of ad-hoc routing protocols: table-driven protocols that maintain up-to-date routing tables via periodic updates, on-demand protocols that find routes only when needed via flooding, and hybrid protocols that use aspects of both table-driven and on-demand routing.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
A comparative study of reactive and proactive routingAbhiram Subhagan
This document presents a comparative study of reactive and proactive routing protocols in mobile ad hoc networks (MANETs). It summarizes key characteristics of MANETs and different types of routing protocols used in MANETs, including proactive, reactive, hybrid, and hierarchical protocols. It then describes the proactive Destination-Sequenced Distance-Vector (DSDV) and reactive Ad hoc On-Demand Distance Vector (AODV) routing protocols in more detail. The document outlines a simulation conducted using the NS-2 network simulator to compare the performance of DSDV and AODV under different metrics like throughput, packet loss, and end-to-end delay. The results showed that AODV, a reactive protocol
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an introduction and overview of a dissertation submitted by Rachna to partially fulfill the requirements for a Master of Technology degree in Computer Science and Engineering. The dissertation focuses on improving the route discovery phase in multi-path Dynamic Source Routing (DSR) for mobile ad-hoc networks using a hybrid ant colony optimization approach. Key topics covered in the introductory chapters include an introduction to mobile ad-hoc networks, categories of ad-hoc routing protocols including DSR and AODV, characteristics and design challenges of MANETs, and concepts related to route discovery and maintenance in DSR.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document summarizes a proposed system for providing data security and accountability in cloud computing. It discusses the existing issues around lack of security and accountability when data is stored in the cloud. The proposed system aims to address these issues through the use of technologies like OTP verification for user registration, encryption and fragmentation of user data, and monitoring of data and system activities by a Third Party Auditor. The system is designed with modules for data security, accountability, and integrity verification. It outlines the architecture including user registration and authentication, file uploading and downloading processes, and generation of alerts if any security issues are detected during internal monitoring.
This document discusses the theoretical and numerical analysis of a vibration isolator subjected to harmonic excitation. It presents equations to model the isolator and calculate the force and displacement transmissibility. The analysis considers varying the damping coefficient and spring stiffness. MATLAB is used to generate transmissibility curves matching the theoretical analysis. An experimental setup is proposed to validate the results and consider nonlinearities not included in the theoretical model.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
This document presents a novel method for recognizing two-dimensional QR barcodes using texture feature analysis and neural networks. It first extracts texture features like mean, standard deviation, smoothness, skewness and entropy from divided blocks of barcode images. These features are then used to train a neural network to classify blocks as containing a barcode or not. The trained neural network can then be used to locate barcodes in unknown images by classifying each block. The method is implemented and evaluated using MATLAB on a database of QR code images, showing satisfactory recognition results.
This document describes a water distribution system that monitors water quality and prevents theft. The system uses an AVR microcontroller and SCADA (Supervisory Control and Data Acquisition) interface. Sensors measure the pH level and water levels in tanks to monitor quality and detect leakage or theft. The AVR collects data from the sensors and sends it to the SCADA interface. The SCADA interface allows operators to monitor the system in real-time and identify any issues. The system is designed to automate water distribution and ensure a safe and secure water supply for industries.
The document describes the synthesis and characterization of a composite material made of polyaniline and ferric oxide. Polyaniline and ferric oxide were mixed in a 1:1 ratio by weight and heat treated to form the composite. The composite was characterized using X-ray diffraction, UV-visible spectroscopy, and vibrating sample magnetometry. XRD analysis confirmed the crystalline structure of the composite and determined a particle size of 126 nm. UV-visible spectroscopy showed optical absorption peaks related to electronic transitions in polyaniline and charge transfer in ferric oxide. Magnetic characterization found the composite exhibited ferromagnetism at room temperature with a saturation magnetization of 0.136 emu, indicating the composite has magnetic properties.
This document presents a new technique for enhancing the contrast of low-contrast satellite images using discrete wavelet transform (DWT) and singular value decomposition (SVD). It begins with an abstract and introduction describing the technique. The technique uses DWT to decompose an input satellite image into frequency subbands, and SVD to estimate the singular value matrix of the low-low subband. The singular values are modified to enhance contrast before reconstructing the final image. The proposed DWT-SVD technique is compared to general histogram equalization (GHE) and singular value equalization (SVE), with results suggesting it outperforms these methods both visually and quantitatively. The document also discusses using fast Fourier transform and bi-log
This document provides an overview of different approaches for tuning PID controllers. It first introduces PID controllers and their proportional, integral and derivative terms. It then describes several common methods for tuning PID controllers, including manual tuning on-site, Ziegler-Nichols reaction curve method, Ziegler-Nichols oscillation method, and Cohen-Coon method. These tuning methods are compared based on their performance and applicability to different process control systems.
El documento discute la relación entre el diseño y la cultura. Explica que el diseño refleja la historia y cultura humana y puede usarse para desarrollar habilidades e instituciones. También señala que el diseño contribuye al bienestar humano a través de la calidad de los productos y servicios. Finalmente, concluye que la relación entre diseño y cultura ha cambiado en los últimos años para fomentar la innovación y el desarrollo.
This document describes a software system that aims to help deaf and dumb people communicate using hand gesture recognition and text-to-speech conversion. The system has three main modules: 1) text-to-voice conversion, 2) text-to-image matching, and 3) image recognition of hand gestures to provide audio or image outputs. The system uses algorithms like localization, pixel analysis, and skin color detection to analyze hand gestures from images. Evaluation results demonstrate the system's ability to correctly convert text inputs to audio or matched images and recognize stored gesture images to output audio or images. Future work to implement the system on mobile devices using sensors is also discussed.
This document summarizes a survey on attacks against mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their unique characteristics and vulnerabilities. It then categorizes the different types of attacks that can occur in MANETs based on their nature (active vs passive), location (external vs internal), and which layer of the protocol stack they target (physical, data link, network, transport, etc.). Specific attacks are defined at each level. The document aims to provide an overview of the security issues in MANETs and different classifications of attacks.
This document reviews alternative thermal barrier coatings for diesel engines. It discusses how thermal barrier coatings can increase combustion chamber temperatures, improving engine efficiency and reducing emissions. Several alternative coating materials are described that have properties suitable for thermal barrier coatings, such as low thermal conductivity and high thermal stability at high temperatures. These include zirconates, garnets, yttria stabilized zirconia, and oxides from the alumina-silica-magnesia system like cordierite, forsterite, spinel, and mullite. The document also reviews the potential benefits of thermal barrier coatings, such as reduced fuel consumption and increased engine efficiency, as well as some challenges in fully realizing these benefits.
This document summarizes and compares different channel estimation techniques for OFDM systems. It discusses block-type pilot arrangement where pilots are sent on all subcarriers periodically, and comb-type pilot arrangement where pilots are spaced between data symbols. For block-type, channel estimation can be done with LS or MMSE. For comb-type, estimation is done at pilot frequencies using LS, MMSE or LMS, and interpolation between pilots with techniques like linear, cubic spline. Decision feedback equalizer is also implemented for block-type. Performance is evaluated using modulation schemes like QPSK, 16QAM under fading channels, and comb-type is shown to track fast fading better than block-type.
This document presents a study on using dynamic surface control (DSC) to achieve synchronization and anti-synchronization of identical Arneodo chaotic systems. DSC is proposed as a method to address issues with conventional backstepping control, such as the "explosion of terms". The paper describes the Arneodo chaotic system, then designs DSC controllers to synchronize and anti-synchronize a master and slave Arneodo system. Simulation results demonstrate the controllers drive the errors to zero, achieving synchronization and anti-synchronization. In conclusion, DSC is an effective method for controlling synchronization in identical chaotic systems.
This document reviews various e-learning methodologies. It discusses asynchronous and synchronous learning methods. Asynchronous methods allow learners and instructors flexibility in time and location through tools like email and discussion forums. Synchronous methods require all participants to be online at the same time, using tools like video conferencing and real-time chat. The document also examines interactions between learners and instructors and among learners, noting benefits of both asynchronous flexibility and synchronous collaboration.
This document describes a student attendance recording system using face recognition and GSM technology. The system uses a webcam to capture images of students' faces and matches them to images stored in a database using MATLAB. If a match is found, a text message is sent using a GSM board to notify that the student has attended class. The system aims to automate attendance tracking and address issues with conventional paper-based systems. It provides accurate attendance recording and real-time notification without requiring students to manually sign attendance sheets or carry RFID cards. The results found nearly 100% accurate recognition and authentication of student faces compared to the stored images in testing.
This document summarizes a study on habitat selection of pupation height and its correlation with abdominal melanization and desiccation resistance in nine altitudinal populations of Drosophila melanogaster from India. The study found that pupation height, abdominal melanization, and desiccation resistance increased with increasing altitude. Genetic correlations between abdominal melanization and desiccation resistance were also significantly high and varied with altitude. The results suggest that habitat selection of higher pupation heights and correlated increases in abdominal melanization confer greater desiccation resistance in high altitude populations as an adaptation to their environment.
This document discusses a proposed scheme called Blowfish Encryption (BE) to securely store data in public clouds using encryption. The BE scheme addresses weaknesses in an existing mCL-PKE scheme. In the BE scheme, users must register with the data owner before accessing data. The owner encrypts data using the Blowfish algorithm and secret key before storing it in the cloud. When a registered user requests data, the cloud verifies the user and retrieves the encrypted data without decrypting it. The user then decrypts the data using the secret key. The BE scheme improves security over mCL-PKE by requiring registration and keeping decryption with the user instead of the cloud. It also speeds up the process using the fast
The document discusses automatic data unit annotation in search results. It proposes a method that clusters data units on result pages into groups containing semantically similar units. Then, multiple annotators are used to predict annotation labels for each group based on features of the units. An annotation wrapper is constructed for each website to annotate new result pages from that site. The method aims to improve search response by providing meaningful annotations of data units within results. It is evaluated based on precision and recall for the alignment of data units and text nodes during the annotation process.
This document discusses selecting alternative updating policies for fault diagnosis under a cognitive theory framework. It proposes a methodology that assigns prior probabilities to a computational decision making system based on its primary and secondary decisions regarding normal and fault conditions. The system adopts a probability distribution as its credence function. Expected utility functions are used to evaluate how well the system's beliefs match the truth, and the policy that maximizes this function is selected. As an example, it shows applying an alternative primary decision making policy based on parameter distributions and re-evaluating results. Probabilities are then assigned to the system's output based on its performance.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
This document summarizes an intermediate guardianship based routing protocol proposed to improve the performance of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad hoc networks. The proposed protocol aims to balance energy consumption among nodes by only allowing nodes with sufficient energy to participate in route requests. It also designates intermediate nodes as "guardians" to relay messages when the source or destination nodes have low energy or link failures occur, in order to increase the probability of message delivery. The document provides background on AODV and related work, and describes how the intermediate guardianship approach extends AODV to address energy efficiency and reliability issues in intermittent and low-power ad hoc networks.
This document summarizes a research paper on load balancing protocols in mobile ad hoc networks (MANETs). It begins with an abstract of the paper and introduces MANETs and the importance of load balancing in them given nodes' limited resources. It then discusses various load metrics and load balancing routing protocols. Specific protocols covered include Ad Hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), and Scalable Multipath On-Demand Routing (SMORT). AOMDV and SMORT aim to compute multiple loop-free paths during route discovery to help balance traffic load across multiple paths. The document concludes that load balanced routing protocols use different metrics to select routes
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
This document evaluates the performance of the AODV and DSR routing protocols under wormhole attacks in a mobile ad hoc network (MANET) simulation. The simulation analyzed packet delivery ratio, end-to-end delay, and throughput with and without wormhole attacks. Without attacks, AODV performed better than DSR for packet delivery ratio and end-to-end delay, while DSR had higher throughput due to using multiple paths. Under wormhole attacks, both protocols saw degraded performance, with DSR being more severely impacted due to its vulnerability to the attacks. The study aims to compare how the two reactive routing protocols are affected by wormhole attacks in MANETs.
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
Comparative analysis of manet reactive protocolsprj_publication
This document compares two reactive routing protocols for mobile ad hoc networks (MANETs) - Ad Hoc On-Demand Distance Vector (AODV) routing and Dynamic Source Routing (DSR). It provides an overview of MANETs and characteristics of reactive protocols. AODV establishes routes on demand and uses destination sequence numbers to ensure freshness. DSR is similar but uses source routing where the source node specifies the route in packets. The document analyzes the operation of each protocol and compares their advantages and disadvantages, finding that AODV generally outperforms DSR under higher stress conditions while DSR is better under less stressful situations.
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
This document analyzes the blackhole attack in the AODV and DSR routing protocols for mobile ad hoc networks (MANETs). It first provides background on MANETs and describes common routing protocols like AODV and DSR. It then explains what a blackhole attack is, where a malicious node advertises the best route to destinations but drops packets instead of forwarding them. Through simulation, the document evaluates the performance of AODV and DSR under blackhole attacks, finding how the attack disrupts the operation of MANET routing protocols.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
This document summarizes and compares various routing protocols for mobile ad-hoc networks (MANETs). It first describes the characteristics and challenges of MANETs. It then classifies routing protocols for MANETs into three main categories: table-driven (proactive), on-demand (reactive), and hybrid protocols. Examples of protocols from each category are described in detail, including DSDV, AODV, DSR, and ZRP. Key features such as route discovery, table maintenance, and use of proactive and reactive approaches are discussed for each example protocol. Finally, the document compares different protocols based on parameters like scalability, latency, bandwidth overhead, and mobility impact.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs). It defines a MANET as a network formed spontaneously by wireless mobile nodes without any preexisting infrastructure. Key characteristics of MANETs include dynamic topologies, energy-constrained operation, limited bandwidth, and security threats. Applications include collaborative work, crisis management, and personal area networks. The document also describes different routing protocols for MANETs including table-driven, source-initiated, and hybrid protocols. It then discusses challenges in WSNs such as ad-hoc deployment, limited resources, scalability, and fault tolerance and how these influence routing protocol design.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
300
Survey of Detection and Prevention Mechanism for
Flooding Attacks in MANETs
Er. Nitin Mohil1, Ms. Kanta Dhankhar2
1ECE Department, ISTK, Kurukshetra University Kurukshetra, Haryana, INDIA
2CSE Department, ISTK, Kurukshetra University Kurukshetra, Haryana, INDIA
Email: mohil73.nitin@gmail.com1, Kanta.dhankhar@gmail.com2
Abstract-Today MANETs has reached to its pinnacle, as the demand for the MANETs are increasing day by
day, due to the increasing demand for MANETs in various areas such as in Military operations, in flood affected
areas etc., threat of security has also increased. MANETs has no protection from harms, so information can be
accessed by both authorized network users and catty attackers because MANETs don’t have centralized
administration. In the presence of catty nodes, the main problem in MANETs is to design the rich security
solution that can protect MANETs from various routing attacks. Flooding attack is kind of the security threat in
which source node sends huge amount of data, Root request (RREQ) and Sync packet to destination node, then
receiver will be engaged in receiving the excessive amount of Data, RREQ and Sync packets from the attacker
and cannot work properly. In this paper a survey of Different mechanisms to detect and prevent the Flooding
attacks in MANETs is proposed.
Index Terms- MANETs, Attacks, Detection, Prevention.
1. INTRODUCTION
Mobile Adhoc networks are special purpose network
created by set of dynamic wireless nodes which can
transfer information by hop or multi hop through any
intermediate node using dynamic routing through
temporary network design for special purpose.
Most mobile devices use radio or infrared
frequencies for their communications which leads to a
very limited transmission range. Usually the
transmission range is increased by using multi-hop
routing paths. In that case a device sends its packets to
its neighbour devices, i.e. devices that are in
transmission range.
Ad-hoc networks are temporary networks because
they are formed to fulfil a special purpose and cease
to exist after fulfilling this purpose. Mobile devices
might arbitrarily join or leave the network at any time,
thus ad hoc networks have a dynamic infrastructure.
To achieve the ambitious goal of providing
ubiquitous connectivity, ad hoc networks have special
properties that distinguish them from other networks.
The properties of MANETs have been discussed [5]
in the following.
· Dynamic topologies
Nodes are free to move arbitrarily; thus, the network
topology—which is typically multi-hop—may change
randomly and rapidly at unpredictable times.
Adjustment of transmission and reception parameters
such as power may also impact the topology.
· Bandwidth-constrained
Wireless links will continue to have significantly
lower capacity than their hardwired counterparts. One
effect of the relatively low to moderate link capacities
is that congestion is typically the norm rather than the
exception, i.e. aggregate application demand will
likely approach or exceed network capacity
frequently.
· Power-constrained operation
Some or all of the nodes in a MANET may rely on
batteries for their energy. For these nodes, the most
important system design criteria for optimization may
be that of power conservation.
· Limited physical security
Mobile wireless networks are generally more prone to
physical security threats than are fixed, hardwired
nets. Existing link security techniques are often
applied within wireless networks to reduce security
threats.
The whole paper comprises of six sections, the 1st
section provides the introduction, 2nd section provides
the information about the different routing protocols
such as Ad-hoc on demand distance vector (AODV)
and Optimized link state routing (OLSR) protocols
etc., 3rd section provides the overview to the different
types of Routing attacks in the MANETs and brief
introduction to the flooding attack, 4th section
provides the information regarding the different
detection schemes for MANETs routing attacks, the
5th section provides the information regarding the
different prevention schemes for MANETs routing
attacks and the 6th section provides conclusion to the
whole paper.
2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
301
2. ROUTING PROTOCOLS
A Routing Protocols is a touch stone that control how
nodes determine which way is chosen to send packets
between computing devices in MANETs. Basically
there are two types of Routing Protocols Proactive or
table driven which are DSDV, OLSR and reactive or
on demand which are AODV, DSR.
Fig.1. MANETs Routing Protocols
Reactive protocols [12] invoke a route
determination procedure on demand only. Thus, when
a route is needed, some sort of global search
procedure is employed. The family of classical
flooding algorithms belong to the reactive group.
The advantage of the proactive schemes is that,
once a route is needed, there is little delay until the
route is determined. In reactive protocols, because
route information may not be available at the time a
datagram is received, the delay to determine a route
can be quite significant. Furthermore, the global
flood-search procedure of the reactive protocols
requires significant control traffic. Because of this
long delay and excessive control traffic, pure reactive
routing protocols may not be applicable to real-time
communication. However, pure proactive schemes are
likewise not appropriate for the ad hoc networking
environment, as they continuously use a large portion
of the network capacity to keep the routing
information current.
There exist another one protocol which having the
properties of both Proactive and active protocols is
called Hybrid protocol (ZRP).
Since nodes in an ad hoc network move quite
fast, and as the changes may be more frequent than
the route requests, most of this routing information is
never even used! This results in a further waste of the
wireless network capacity. What is needed is a
protocol that, on one hand, initiates the route
determination procedure on-demand, but at limited
search cost. The protocol described in this draft,
termed the "Zone Routing Protocol (ZRP)".
2.1. AODV (Ad-hoc on demand protocol)
Ad-hoc on-demand Distance Vector routing protocol
[9] uses on-demand route discovery technique to
ensure loop free, single path, hop by hop distance
vector routing. AODV operates in two sub phases.
Route discovery Phase is initiated by a source node
not having valid route to a destination node to which
it wants to send data. Route maintenance phase for
handling dynamic topology in MANET changes as
the node moves or when some error persists. When a
node wishes to send data to some destination it floods
Route Request (RREQ) messages to all its
neighbouring nodes. An intermediate node receiving
RREQ updates its routing table with reverse route
entry to the source node if RREQ is unique. Source id
and broadcast id determines uniqueness of a RREQ
packet. An intermediate node can further rebroadcasts
RREQ to its neighbours or unicasts RREP message
back to the source node if it already has unexpired
route to that destination in its routing table otherwise
destination node replies.
In AODV, a node can receive multiple RREP
messages for one route discovery message sent but it
maintains only one entry per destination in its routing
table. An intermediate node always forwards first
RREP message received after making entry for
forward path towards destination in its routing table
and second RREP for a particular RREQ is used for
updating table and forwarded only if RREP has higher
destination sequence number for the destination or
hop count is smaller in case of same destination
sequence number otherwise RREPs are suppressed.
Higher sequence number ensures fresher route.
HELLO messages are exchanged for maintaining
neighbourhood connectivity.
RREQ
A
D
Fig.2. AODV Route discovery
Reactive:
AODV,
DSR
Proactive:
DSDV,
OLSR
Hybrid:
ZRP,
ZHLS
S
B
C
E
R
R replies to only
one RREQ which
received earlier
Duplicate
RREQ is
discarded by C
Duplicate
RREQ is
discarded by R
Broadcast
RREQ received
via A to D & E
RREP
Unicasted to S
MANETs Routing Protocols
3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
302
In Fig. 2, source node S initiates route discovery
message broadcasting to node A and B. Node C
discards duplicate RREQ and further rebroadcasts
RREQ received from B to node E and D. Destination
node R replies to first RREQ received from E and
discards duplicate RREQ by D. So reply is unicasted
back to source node and each node maintains single
path both in forward and reverse direction.
The routing table entry corresponds to fields as
shown in Fig-3. AODV uses a timer-based technique
to remove stale routes. Each routing entry is
associated with a lifetime of a route known as route
expiration timeout. This timer is refreshed whenever a
route is used.
Destination
ID
Sequence
Number
Hop
count
Lifetime
of a
route
Next
hop
Fig.3. Routing Table Entry in AODV
Once a route is established between source and
destination nodes it is maintained in routing table as
long as source needs this route for data transfer and
timer does not expires. Whenever a source node
moves during active session of data transfer a new
route discovery process is initiated and if an
intermediate or destination node moves or a link
break, RERR message including lists of unreachable
destinations along with their sequence numbers is
broadcasted back to source node. Each node upon
receiving a RERR message from a downstream
neighbour and using failed link must invalidate the
route and source node reinitiates new route discovery.
RERR message is rebroadcasted if at least one
destination becomes unreachable.
2.2. OLSR (Optimized Link State Routing)
OLSR [7] is a proactive routing protocol for mobile
ad hoc networks. The protocol inherits the stability of
a link state algorithm and has the advantage of having
routes immediately available when needed due to its
proactive nature. OLSR minimizes the overhead from
flooding of control traffic by using only selected
nodes, called MPRs, to retransmit control messages.
This technique significantly reduces the number of
retransmissions required to flood a message to all
nodes in the network. Secondly, OLSR requires only
partial link state to be flooded in order to provide
shortest path routes.
Also, OLSR does not require sequenced delivery of
messages. Each control message contains a sequence
number which is incremented for each message. Thus
the recipient of a control message can, if required,
easily identify which information is more recent -
even if messages have been re-ordered while in
transmission.
2.3. ZRP (Zone Routing Protocol)
Zone Routing Protocol (ZRP) is a hybrid routing
protocol suitable for a wide variety of mobile ad-hoc
networks, especially those with large network spans
and diverse mobility patterns. Each node proactively
maintains routes within a local region (referred to as
the routing zone). Knowledge of the routing zone
topology is leveraged by the ZRP to improve the
efficiency of a globally reactive route query/reply
mechanism. The proactive maintenance of routing
zones also helps improve the quality of discovered
routes.
In the Zone Routing protocol, a proactive routing
protocol provides a detailed and fresh view of each
node’s surrounding local topology (routing zone) at
the local level. The knowledge of local topology is
used to support services such as proactive route
maintenance, unidirectional link discovery and guided
message distribution. One particular message
distribution service, called border casting, directs
queries throughout the network across overlapping
routing zones. Border casting is used in place of
traditional broadcasting to improve the efficiency of a
global reactive routing protocol.
The benefits provided by routing zones, compared
with the overhead of proactively tracking routing zone
topology, determine the optimal framework
configuration. As network conditions change, the
framework can be dynamically reconfigured through
adjustment of each node’s routing zone
3. MANETs ROUTIMG ATTACKS
MANET is a collection of mobile nodes, sometimes
nodes in MANET can be bad or malicious and these
bad nodes cannot forward the packets due to their aim
of conserving network resources such as band width,
battery etc. by the denial of service.
There are mainly two types of attacks in MANET
Active and Passive [1].
3.1. Active Attacks
In active attacks, intruders launch intrusive activities
such as modifying, injecting, forging, fabricating or
dropping data or routing packets, resulting in various
disruptions to the network. Some of these attacks are
caused by a single activity of an intruder and others
can be caused by a sequence of activities by colluding
intruders. Active attacks (as compared to passive
attacks) disturb the operations of the network and can
be so severe that they can bring down the entire
network or degrade the network performance
significantly, as in the case of denial of service
attacks.
4. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
303
3.2. Passive Attacks
Passive attacks are those where the attacker does not
disturb the operation of the routing protocol but
attempts to seek some valuable information through
traffic analysis. This in turn can lead to the disclosure
of critical information about the network or nodes
such as the network topology, the location of nodes or
the identity of important nodes.
Active and passive attacks are further classified as
shown in Fig. 4.
Flooding
Evesdrooping
Location
Disclouser
Fig.4. MANET Routing Attacks
3.1.1. Flooding Attacks
It is a type of active attack in which source node sends
large amount of data, Root request (RREQ) and Sync
packet to destination node, destination node will then
be engaged in receiving the excessive Data, RREQ
and Sync packets from the attacker and cannot work
properly.
3.1.1.1 Root Request (RREQ) Flooding
The aim of the Root Request Flooding attack [3] is to
exhaust the network resources, such as bandwidth and
to consume a node’s resources, such as computational
and battery power or to disrupt the routing operation
to cause severe degradation in network performance.
For example, in AODV protocol, a malicious node
can send a large number of RREQs in a short period
to a destination node that does not exist in the
network. Because no one will reply to the RREQs,
these RREQs will flood the whole network. As a
result, all of the node battery power, as well as
network bandwidth will be consumed and could lead
to denial-of-service. In the authors show that a
flooding attacks can decrease throughput by 84
percent.
RREQ
2
5
Fig.5. RREQ Flooding Attack
In RREQ Flooding Attack attacker node will
broadcast RREQ packet with fake destination address
or non-existing node in the network as shown in Fig 5
here node 1 is attacker node and it will flood the
network with non-existing node in the network which
is node 10.
3.1.1.2 Data Flooding Attack
When nodes in MANETs find the correct routing
path, source nodes send the data packets through that
route. In data flooding attack [2], the attacker first
maintains the routes to destination node, then sends
frequently the useless data packets. The destination
node will then be engaged in receiving the excessive
data packets from the attacker and cannot work
properly. The attacker packets engage the network
and stop the processing of legitimate data packets.
RREQ for node K
ACK for node K
Sending Useless
Data
Fig.6. Data Flooding Attack
In Data flooding firstly source node sending root
request to destination when it receive
A
T
T
A
C
K
S
A
C
T
I
V
E
P
A
S
S
I
V
E
Malicious
Packet
Dropping
Jamming
DOS
Routing
Black Hole
Grey Hole
Sybil
Rushing
Sleep
Deprivation
Traffic
Analysis
1
3
4
6
7
Node 7
Broadcast
RREQ for Node
10
Node 4 Broadcast
Node 1 RREQ for Node 10
broadcast
RREQ for
node 10
Source
Node N
Destination
Node M
5. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
304
acknowledgment for route to destination after that
source or attacker will flood the network by sending
excessive amount of data packets to destination as
shown in Fig 6.
3.1.1.3 Sync Flooding
In Sync Flooding [10] a malicious node sends a huge
number of SYNC packets to a destination node. The
destination node sends back SYNC+ACK packets and
keeps the entry for the incomplete connection request.
The attacker never sends ACK so a large amount of
memory of victim node is consumed for storing
pending requests and node may come to a halt even.
SYNC
SYNC+ACK
ACK
Fig.7. Sync Flooding Attack
4. DETECTION SCHEMES FOR FLOODING
ATTACKS
In this section different detection methods to find out
the attacks in the network will be discussed. These
schemes or methods use to defend network from
malicious activities or attacks. With the help of these
methods, the incorrect or malicious activities in the
network can be detected. Detection schemes basically
involves monitoring the network resources for
collecting audit data (set of data of the network
regarding user activities or network events) with the
help of this audit data attacks can be detected. These
detection schemes [1] can be categorize in to three
categories
I) Misuse Detection or Knowledge Based
Intrusion Detection.
II) Anomaly Based or Behavior Based Intrusion
Detection.
III) Specification Based Intrusion Detection.
4.1. Knowledge Based Intrusion Detection
This type of system maintains information data base
that contains information about well-known attacks.
In this scheme current data from the network is taken
and compared with the data stored in information data
base (which contains information about different
attacks). If the current data is matched with any of
data stored in information data base then it will
generate message that attack is recognize otherwise it
consider it as unknown attack and it will update new
information regarding unknown attack in Information
data base as shown in Fig 8.
YES
Current
Audit Data
Apply
Detection
Technique
NO
Fig.8. Knowledge Based Intrusion Detection
Process
4.2. Anomaly Based Intrusion Detection
This type of system monitors the activities which
are different from normal activities. These systems
are also called Behavior Based Intrusion Detection,
in this scheme information is collected about the
normal behavior of the network then this collected
data is compared with current audit data taken
from the network to detect the attack.
YES
NO
Fig.9. Anomaly Based Intrusion Detection
Process
Information
Data Base
Condition
Matched
?
Unknown
Attack
Attack is
recognized
Update New
Information
about
Unknown
Attack
Current
Audit
Apply Detection
Technique
Information Data
Base about the
Expected
Normal Profile
of Network
Condition
Matched
?
Attack is
recognized
Update
Expected
Normal Profile
of the Network
Source
Node N
Destination
Node M
6. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
305
If the current audit data is match with information
stored in data base about the behavior of the
network then it will generate alert for attack
otherwise if there is a deviation between current
audit data and expected profile data then it will
update expected normal profile of the network as
shown in Fig. 9.
4.3 Specification Based Intrusion Detection
In this type of detection system [4][7] firstly set
of specification as information data base is define
and then these set of specifications are used to
monitor Routing protocol operation or network
layer operation to detect Attack in the network.
In this approach system observe the behavior of
individual nodes and generate alert if a node
violate the behavioral specifications. This detection
scheme can detect all types of attacks whether it is
known or unknown for system.
YES
Fig.10. Specification Based Intrusion Detection
Process
5. PREVENTION SCHEMES FOR FLOODING
ATTACKS
There are several methods available to prevent the
Flooding attacks in MANETs (Mobile Ad-hoc
Networks).
5.1 In [3] author proposed a new prevention
scheme for the flooding attack in MANETs; in which
each node maintain a count table for rate of RREQ of
its neighboring nodes. If the rate of RREQ is more
than predefined threshold value then the ID of that
neighbor is blacklisted, but the limitation of this
scheme is that it cannot prevent the attack in which
rate of RREQ is below threshold.
5.3 In [11] author proposed an Adaptive technique
for the flooding attack. It basically works on the
statistical analysis to detect malicious RREQ flood
and prevent forwarding of such packet. In this
approach node maintain a count table for rate of
RREQ of its neighboring nodes. If the rate of RREQ
is more than predefined threshold value then the ID of
that neighbor is blacklisted same as [6] , but in this
method threshold is determine on the bases of
statistical analysis of RREQ Floods. The main
advantage of this approach is that it can also prevent
flooding attacks with varying rates.
5.4 In [2] author proposed a new defense scheme
against the RREQ flooding attack. Basically RREQ
flooding attacker will not obey the binary exponential
back off, which is normally obey by the RREQ of
AODV scheme. In this scheme firstly each
neighboring node is checked whether it obey binary
back off for time to wait for RREP or not. Which
node do not follow this criterion is identified as
suspicious node and secondly rate of RREQ is
checked, in this scheme two threshold values are used
RREQ_RATELIMIT is considered as 1st threshold
and other is (RREQ_RATELIMIT)/2 is considered as
2nd threshold. If the rate of RREQ is less than 1st
threshold then the node is identified as normal node, if
the rate of RREQ is lies in between 1st and 2nd
threshold then the node is identified as suspicious
node and add to delay queue. If the rate of RREQ is
above the 2nd threshold then the node is identified as
Attacker and ID of that node is broadcasted to all
neighboring nodes.
5.4 In [4] author proposed a new mechanism to
prevent RREQ flooding attack the author of proposed
an Effective Filtering scheme against RREQ flooding
attack; this scheme can detect the malicious nodes and
attacker nodes, which are disturbing the network
communication.
In this scheme there are two thresholds 1)
RATE_NM and 2) BLACKLIST_NM, which are
used to limit the RREQ message.
Here RATE_NM parameter denotes no. of
RREQ that can be accepted and processed. Here each
node monitors the RREQ and maintain a count table
for RREQ received. Whenever a RREQ request is
received a condition check is performed, if the rate of
received RREQ is less than the RATE_NM then
received RREQ processed normal otherwise a second
condition check is performed, where received RREQ
is compared with another threshold
BLACKLIST_NM, if the rate of RREQ is greater
than the BLACKLIST_NM then it is assume that
particular node trying to flood the network with fake
RREQ messages otherwise the received RREQ is add
to delay queue. After identification of sender node as
malicious node it will be blacklisted. The malicious
Current
Audit Data
Apply Specification
Based Detection
Technique
Set of
Specifications
(Information
Data Base)
Condition
Matched
?
Attack is
recognized
7. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
306
node is blocked for a time period given by
BLACKLIST_TIMOUT_NM after if black list time
out it will be unblocked.
After adding malicious node to blacklist all the
neighboring nodes of malicious node now free to
entertain RREQ from other genuine nodes, if the
received RREQ has rate in between RATE_NM and
BLACKLIST_NM then this will de add to delay
queue by doing so the node which has high attack rate
will be delayed.
5.5 In [6] author proposed a new prevention
scheme for RREQ flooding attack. In this scheme all
nodes are categorize as Friend, Acquaintance and
stranger depending upon relationship (trust level) with
their neighboring nodes. Initially all nodes are
stranger to each other , the trust level is a function of
many parameters such as ratio of no. of packet
forwarded successfully to the neighbor to the total no.
of packet sent to the neighbor, average time taken to
respond to a route request etc.
According to the trust level neighbors are
categorize as Friend (Most trusted), Acquaintance
(trusted) and stranger (not trusted).
Here the threshold trust level for stranger to
become an acquaintance is represented as Tacq and
threshold trust level for an Acquaintance to become
Friend is denoted by Tfri.
1. If T > = Tfri then node is considered as
Friend node,
2. If Tacq < =T < Tfri then node is
considered as Acquaintance node,
3. If 0< T <Tacq then node is considered as
Stranger node.
To prevent RREQ flooding attack the threshold
level is set for the max. no. of RREQ node can receive
from its neighbors, If specified level of threshold is
reached further RREQ from nodes are dropped or
blacklisted.
6. CONCLUSION
MANET’s are the most promising field of research
but there are always security threats from attacker due
to their characteristics and absence of centralized
administration. This paper provides a survey of
various types of Flooding attacks, their Detection and
Prevention Mechanisms. Hopefully the survey
presented in this paper will be helpful in designing
more secure detection and prevention schemes for
flooding attacks.
REFERENCES
[1] Adnan Nadeem member IEEE and Michael P.
Howarth, “A Survey of MANET Intrusion
Detection & Prevention Approaches for
Network Layer Attacks”,Communication survey
& Tutorials, IEEE Volume: 15, Issue: 4, 2013.
[2] Arunmozhi Annamlai, Venkataramani
Yegnanarayan, ”Secured System against DDoS
Attack in Mobile Adhoc Network”, WSEAS
Transaction on Communication Issue 9, Volume
11, September 2012.
[3] Bounpadith Kannhavong, Hidehisa Nakayama,
Yoshiaki Nemoto, and Nei Kato, “A Survy of
Routing Attacks in Mobile Ad hoc Network,”
IEEE Wireless Communications • October 2007.
[4] Jian-Hua Song, , Fan Hong, Yu Zhang, ”Effective
filtering Scheme against RREQ Flooding Attack
in Mobile Ad Hoc Networks”, IEEE Computer
Society 2006.
[5] Joseph P. Macker, a M. Scott Corsonb, “Mobile
Ad Hoc Networking and the IETF”, Mobile
Computing and Communications Review,
Volume 2, Number 1, January 1998.
[6] Revathi Venkataraman, M. Pushpalatha, and T.
Rama Rao, ”Performance Analysis of Flooding
Attack Prevention Algorithm in MANETs”,
World Academy of Science, Engineering and
Technology 32, 2009.
[7] T. Clausen, P. Jacquet, ” Optimized Link State
Routing Protocol (OLSR)”, IETF October 2003.
[8] Tao Song, Calvin Ko, Chinyang Henry Tseng,
Poornima Balasubramanyam, Anant Chaudhary,
and Karl N. Levitt “Formal Reasoning About a
Specification-Based Intrusion Detection for
Dynamic Auto-configuration Protocols in Ad
Hoc Networks”, Springer-Verlag Berlin
Heidelberg LNCS 3866, pp. 16 – 33,2006.
[9] Tarunpreet Bhatia, A. K. Verma, “Simulation and
Comparative Analysis of Single Path and
Multipath Routing Protocol for MANET,”
ANVESHANAM - THE JOURNAL OF
COMPUTER SCIENCE & APPLICATIONS,
VOL. II, NO. 1, AUGUST 2013-JULY 2014.
[10] Tarunpreet Bhatia and A.K. Verma, “Security
Issues in Manet: A Survey on Attacks and
Defense Mechanisms,” IJARCSSE,Volume 3,
Issue 6, June 2013.
[11] Saman Desilva Rajendra V. Boppana,
”Mitigating Malicious Control Packet Floods in
Ad Hoc Networks”, IEEE Wireless
Communications and Networking Conference,
March 2005.
[12] Zygmunt J. Haas, Marc R.
Pearlman,PrinceSamar, "Zone Routing
Protocol”, IETF July 2002.