IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Mobile Ad Hoc Network (MANET) is one kind of new wireless network
structures which is also known as infrastructure less network. Unlike devices in traditional
wireless LAN solution, all nodes are movable and the topology of the network is changing
dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile
Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks
due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic
network topology, open medium, autonomous terminal and management. As a result,
attackers can take advantage of flaws in routing protocols to carry out various attacks. The
black hole attack is one of such security issue in MANET. It could disturb the routing
protocol and bring about huge damage to the network’s topology. In this attack, a malicious
node gives false information of having shortest route to the destination node so as to get all
data packets and drops it. In this paper, we propose an algorithm which mitigates the
impact of black hole attack in AODV routing.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
One of the main challenges in MANET is to design the robust security solution that can protect MANET
from various routing attacks. Flooding attack launched at network layer is a serious routing attack which
can consume more resources like bandwidth, battery power, etc. It is more concealed form of Denial of
service attack and resource consumption attack. The route discovery scheme in reactive routing protocols
like Adhoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) used in MANET
makes it more easy for malicious nodes to launch connection request floods by flooding the route request
packets (RREQ) on the network. A novel detection technique based on dynamic profile with traffic pattern
analysis (PDS) is proposed. Its effectiveness in detecting and isolating the malicious node that floods the
route request packets is evaluated using java simulator jist/swans.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Mobile Ad Hoc Network (MANET) is one kind of new wireless network
structures which is also known as infrastructure less network. Unlike devices in traditional
wireless LAN solution, all nodes are movable and the topology of the network is changing
dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile
Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks
due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic
network topology, open medium, autonomous terminal and management. As a result,
attackers can take advantage of flaws in routing protocols to carry out various attacks. The
black hole attack is one of such security issue in MANET. It could disturb the routing
protocol and bring about huge damage to the network’s topology. In this attack, a malicious
node gives false information of having shortest route to the destination node so as to get all
data packets and drops it. In this paper, we propose an algorithm which mitigates the
impact of black hole attack in AODV routing.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
One of the main challenges in MANET is to design the robust security solution that can protect MANET
from various routing attacks. Flooding attack launched at network layer is a serious routing attack which
can consume more resources like bandwidth, battery power, etc. It is more concealed form of Denial of
service attack and resource consumption attack. The route discovery scheme in reactive routing protocols
like Adhoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) used in MANET
makes it more easy for malicious nodes to launch connection request floods by flooding the route request
packets (RREQ) on the network. A novel detection technique based on dynamic profile with traffic pattern
analysis (PDS) is proposed. Its effectiveness in detecting and isolating the malicious node that floods the
route request packets is evaluated using java simulator jist/swans.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
The document discusses defending wireless sensor networks against "Vampire attacks" which aim to drain nodes' battery power through malicious routing behavior. It analyzes the vulnerabilities of various routing protocols to two such attacks:
1) The "carousel attack" causes packets to repeatedly traverse the same set of nodes through introduced routing loops in source routing protocols.
2) The "stretch attack" constructs artificially long routes in source routing protocols, forcing packets through many more nodes than needed and increasing energy usage.
Simulation results show a single attacker can increase energy consumption by up to 4x with carousel attacks and up to 10x with stretch attacks. The document explores mitigation methods, finding loose source routing insufficient and proposing
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
This document analyzes and compares the performance of the multicast routing protocols MAODV and ODMRP under black hole attacks in MANETs. Simulation results show that both protocols experience a significant reduction in packet delivery ratio in the presence of black hole attackers. However, the impact is greater on MAODV compared to ODMRP due to ODMRP's use of alternate data delivery paths. The packet delivery ratio and average end-to-end delay are negatively affected by increased node mobility and number of attackers. ODMRP generally performs better than MAODV under black hole attacks due to its mesh-based structure providing redundant routes.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Wireless Sensor Networks (WSNs) are used nowadays, and therefore have broad range of
interesting applications. WSN can be of hypersensitive nature and therefore might require enhanced
secured environment. In today's world WSNs are the basic means of communication. The resources like
battery power, processing capabilities, communication and transmitting range are limitations of the system.
One of the major challenges in Wireless Networks is the security concerns. Attacks affecting these types
of systems are increasing. One of the major resource consumption attacks called vampire attacks. It
includes Stretch attack and Carousal attack which affects node and even bring down the entire system by
draining the Battery power. In Stretch Attack, attackers construct wrong long routes which leads to
traversing almost every node in the network. Stretch attack, increases packet route length, and packets get
processed by a number of nodes. Carousel attackers introduce some packet within a route tranquil as a
sequence of loops, and so the same node appears in the route many times. The proposed system overcomes
this challenge by using the techniques which include the Energy weight detection algorithm and Route
Tracking algorithm, so energy consumption is reduced to a great extent. EWDA and Route Tracking
algorithm is used to detect and prevent the above problems.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication
between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes
for DTNs exploit the advantage of message replication to achieve high message delivery rate. However,
these schemes commonly suffer from large communication overhead due to the lack of efficient mechanisms
to control message replication. In this paper we give a brief survey on routing protocols designed for
DTNs, and evaluate the performance of several representative routing protocols including Epidemic, Spray
and Wait, PRoPHET, and 3R through extensive trace-driven simulations. Another objective of this work is
to evaluate the security strength of different routing schemes under common DTN attacks such as the black
hole attack. The results and analysis presented in this paper can provide useful guidance on the design and
selection of routing protocols for given delay-tolerant applications.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Enhancing proxy based web caching system using clustering based pre fetching ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance analysis of a liquid column in a chemical plant by using mpceSAT Publishing House
This document discusses the use of model predictive control (MPC) to control the composition of a liquid column in a chemical plant. It provides background on MPC and how it can be used for multivariable processes like liquid columns. The document describes modeling a liquid column process in MATLAB Simulink and comparing the performance of MPC and PID control of the column. The results show that MPC provides better control of the column composition and liquid level than PID control.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
The document discusses defending wireless sensor networks against "Vampire attacks" which aim to drain nodes' battery power through malicious routing behavior. It analyzes the vulnerabilities of various routing protocols to two such attacks:
1) The "carousel attack" causes packets to repeatedly traverse the same set of nodes through introduced routing loops in source routing protocols.
2) The "stretch attack" constructs artificially long routes in source routing protocols, forcing packets through many more nodes than needed and increasing energy usage.
Simulation results show a single attacker can increase energy consumption by up to 4x with carousel attacks and up to 10x with stretch attacks. The document explores mitigation methods, finding loose source routing insufficient and proposing
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
This document analyzes and compares the performance of the multicast routing protocols MAODV and ODMRP under black hole attacks in MANETs. Simulation results show that both protocols experience a significant reduction in packet delivery ratio in the presence of black hole attackers. However, the impact is greater on MAODV compared to ODMRP due to ODMRP's use of alternate data delivery paths. The packet delivery ratio and average end-to-end delay are negatively affected by increased node mobility and number of attackers. ODMRP generally performs better than MAODV under black hole attacks due to its mesh-based structure providing redundant routes.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Wireless Sensor Networks (WSNs) are used nowadays, and therefore have broad range of
interesting applications. WSN can be of hypersensitive nature and therefore might require enhanced
secured environment. In today's world WSNs are the basic means of communication. The resources like
battery power, processing capabilities, communication and transmitting range are limitations of the system.
One of the major challenges in Wireless Networks is the security concerns. Attacks affecting these types
of systems are increasing. One of the major resource consumption attacks called vampire attacks. It
includes Stretch attack and Carousal attack which affects node and even bring down the entire system by
draining the Battery power. In Stretch Attack, attackers construct wrong long routes which leads to
traversing almost every node in the network. Stretch attack, increases packet route length, and packets get
processed by a number of nodes. Carousel attackers introduce some packet within a route tranquil as a
sequence of loops, and so the same node appears in the route many times. The proposed system overcomes
this challenge by using the techniques which include the Energy weight detection algorithm and Route
Tracking algorithm, so energy consumption is reduced to a great extent. EWDA and Route Tracking
algorithm is used to detect and prevent the above problems.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication
between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes
for DTNs exploit the advantage of message replication to achieve high message delivery rate. However,
these schemes commonly suffer from large communication overhead due to the lack of efficient mechanisms
to control message replication. In this paper we give a brief survey on routing protocols designed for
DTNs, and evaluate the performance of several representative routing protocols including Epidemic, Spray
and Wait, PRoPHET, and 3R through extensive trace-driven simulations. Another objective of this work is
to evaluate the security strength of different routing schemes under common DTN attacks such as the black
hole attack. The results and analysis presented in this paper can provide useful guidance on the design and
selection of routing protocols for given delay-tolerant applications.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Enhancing proxy based web caching system using clustering based pre fetching ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance analysis of a liquid column in a chemical plant by using mpceSAT Publishing House
This document discusses the use of model predictive control (MPC) to control the composition of a liquid column in a chemical plant. It provides background on MPC and how it can be used for multivariable processes like liquid columns. The document describes modeling a liquid column process in MATLAB Simulink and comparing the performance of MPC and PID control of the column. The results show that MPC provides better control of the column composition and liquid level than PID control.
This document summarizes a study on using fiber optic sensors embedded in concrete beams to monitor structural health. Three concrete beams reinforced with steel bars were instrumented with fiber optic sensors attached to reinforcement. As load increased, the sensors detected changes in light intensity corresponding to crack formation before cracks were visible. The sensors responded well to applied loads and provided warning of damage even before cracks appeared. The study demonstrated that embedded fiber optic sensors can successfully detect cracks in concrete structures.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An algorithm for design of brick lining for irrigation channelseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses cloud computing and its security aspects. It begins by defining cloud computing as a new computing paradigm that provides hosted services over the internet on demand. Security is identified as a major concern for cloud computing since data and services are distributed over an open environment. The document then examines different types of clouds and cloud providers, and explores some common security issues in cloud computing including confidentiality, integrity, availability, and privacy. It emphasizes that security needs to be carefully considered for cloud computing to gain wider acceptance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document provides an overview of data mining techniques designed for imbalanced datasets. It discusses how imbalanced datasets, where one class is greatly underrepresented compared to others, pose challenges for machine learning algorithms. Several approaches have been proposed to address this issue, including sampling methods like oversampling the minority class and undersampling the majority class, as well as cost-sensitive methods that assign higher misclassification costs. The document reviews common sampling strategies used for imbalanced datasets, such as SMOTE, and cost-sensitive approaches involving cost matrices and cost curves. Overall, it examines how various sampling and cost-based methods can help improve classification of imbalanced datasets in fields such as medical diagnosis and text classification.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental investigation on behavior of bamboo reinforced concrete membereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Impact analysis of epda and ipda attack with increasing node mobility in data...eSAT Journals
Abstract In this Paper, two types of denial of service attacks over mobile ad hoc networks are implemented and their impact is analyzed on data communication process when using a reactive routing protocol for data communication. The reactive routing protocol well known Ad-hoc on-demand distance vector (AODV) routing protocol. In the Implemented attacks, a malicious node i.e., attacker will drop data packets that it receives for forwarding towards the destination of the packet. The attacker can do the attack by either making itself one of the intermediate nodes on the active route. The attackers can be one of the intermediate nodes in two ways. In the first method the attacker is waiting that some route discovery process will select it as one of its intermediate node and then it will drop all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false information to become the part of an active route. Due to the wrong information spread by the malicious nodes the routing tables of the source node enters a route for the destination that will surely includes the attacker in the route. The Implemented attack is simulated using a tool Exata and results are drawn using graphs to show the impact of the attack on data communication. Finally, a mechanism is proposed through which both the attack and attackers can be detected during the data communication and can be avoided in further communication process. Keywords: AODV, DoS Attacks, EPDA & IPDA Attacks, MANET
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
The document proposes an enhanced anonymous position-based security aware routing protocol called E-APSAR for mobile ad hoc networks (MANETs). It aims to address security issues like black hole attacks in dynamic source routing (DSR) protocol. E-APSAR divides the network area into zones and implements encryption to securely transmit data between neighboring zones. Simulation results show that E-APSAR has lower routing overhead and higher throughput and packet delivery ratio compared to DSR, especially at certain mobility levels. The protocol performance is analyzed against different node densities and mobility to evaluate its effectiveness against black hole attacks in MANETs.
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
This document summarizes a research paper that proposes a new method for detecting wormhole attacker nodes in mobile ad hoc networks (MANETs). The method detects malicious nodes based on analyzing hop counts and time delays in routes, without requiring any special hardware or protocol modifications. The proposed method is simulated using OPNET software with scenarios of 50 nodes, both with and without wormhole attacks. The results show that without prevention, a wormhole attack decreases average hop count and increases delays. However, when the proposed method is applied, it is able to detect the attacker nodes and avoid their paths, regaining normal hop counts and delays.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Abstract: Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic These attacks are very effective based on high throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput, it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism means combines Measurement-based detection and accusation-based reaction techniques.The attacks and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting. Keywords— Wireless mesh network,high throughput metrics, secure multicast routing,metric manipulation attacks, Byzantine attacks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
This document reviews various energy efficient techniques for wireless sensor networks. It discusses several routing protocols that have been proposed to reduce energy consumption and extend the lifetime of wireless sensor networks, including a 3D geographical routing protocol, a trust and energy aware routing protocol, and a directional transmission based energy aware routing protocol. It also reviews security attacks that can occur in mobile ad hoc networks, such as black hole attacks, wormhole attacks, and denial of service attacks. Finally, the document summarizes several papers that have studied and proposed improvements to energy efficient routing techniques.
This document surveys different types of black hole attacks in wireless mobile ad hoc networks and various detection schemes that have been proposed. It discusses single black hole attacks, where a single malicious node drops packets to disrupt routing, and collaborative black hole attacks, where multiple nodes work together. The document analyzes and compares detection schemes for single black hole attacks in terms of the routing protocol used, detection method, results reported, and limitations. It finds that while many schemes can effectively detect a single attacker, they often fail against collaborative black hole attacks.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
This document summarizes research on the performance impact of black hole attacks on mobile ad hoc networks (MANETs) using different routing protocols. The researchers conducted simulations using OPNET to evaluate the effects of black hole attacks on network throughput, delay, and load under three routing protocols: AODV, OLSR, and DSR. With AODV, the presence of black hole attackers significantly reduced throughput and increased delay by discarding packets. OLSR was not significantly affected by attackers. With DSR, throughput increased over time with attackers due to increasing discarded packets. The research analyzed how black hole attacks degrade MANET performance depending on the routing protocol used.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
This document analyzes the performance of three routing protocols - AODV, OLSR, and ZRP - under a blackhole security attack in a mobile ad hoc network (MANET). It defines the blackhole attack and describes how each protocol functions. Simulations are run in OPNET with 40 nodes using various performance metrics like network load, end-to-end delay, and packet delivery ratio. The results show that while all protocols are negatively impacted by blackhole nodes, AODV maintains the most consistent performance under attack compared to OLSR and ZRP.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses security challenges in mobile ad hoc networks (MANETs) and provides an overview of several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to their dynamic topology. It then discusses common security goals for routing protocols, such as confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to summarize several existing secure routing protocols for MANETs, such as DSDV, SAODV, SRP, and TORA, focusing on how each protocol aims to provide routing security. It concludes
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
Similar to Performance investigation of re shuffling packet (20)
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
Performance investigation of re shuffling packet
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 494
PERFORMANCE INVESTIGATION OF RE-SHUFFLING PACKET
ATTACK ON TRANSPORT LAYER PROTOCOL IN MANET
Sonia Choudhary1
, Vandna Verma2
1, 2
Department of Computer Science and Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan,
India, sonia.choudhary.14@gmail.com, vermamtech@gmail.com
Abstract
Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio
frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants
(PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks
than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we
present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the
packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their
destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to
retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always
participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets
in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will
also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end
throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated
using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data
flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study
on UDP and TCP.
Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
MANET routing protocols in general lack security
mechanisms. For proper operation of routing protocol, it is
assumed that intermediate nodes included in routing paths are
trustworthy and follow protocol rules. It is required that each
node in the network generate and forward routing control
traffic according to protocol specifications. Absolute trust on
intermediate nodes is a significant issue in networks that are
characterized by dynamic topology. It is comparatively easy to
eavesdrop wireless communication and to physically capture
and compromise legal nodes. Without appropriate network
level or link-layer security provisions, routing protocols are
susceptible to many form of malicious activity that can freeze
the whole network. In this chapter we study various attacks
that can be launched on MANETs by exploiting the
vulnerabilities inherent in routing protocols. We study how
basic routing protocol functions like packet or message
forwarding and routing can easily jeopardize the whole
network.
This paper is organized in the following manner. In Section II,
we present the related work done in our area which includes
the papers that are proposed the effective routing methods.
This is followed by the proposed work for efficient routing for
delay-sensitive applications in Section III. We also
summarize the key features, basic operation, as well as major
pros and cons of our proposed approach. In Section IV, We
will conclude the paper with present state of the art and future
work.
2. RELATED WORK
In this section, we discuss the past works done in MANET
that includes the evolution of many new attacks. It is
imperative to secure networks - wired or wireless for its
proper functioning. Wireless ad hoc network is more
vulnerable to security threats than wired network due to
inherent characteristics and system constraints. The nodes are
free to join, move and leave the network making it susceptible
to attacks - both from inside or outside the network. The
attacks can be launched by nodes within radio range or
through compromised nodes. The compromised nodes exploit
the flaws and inconsistencies present in routing protocol to
destroy normal routing operation of the network. A
compromised node may advertise nonexistent or fake links or
flood honest nodes with routing traffic causing Denial of
Service (DoS) attacks that may severely degrade network
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 495
performance. Thus we see that routing protocols are one of the
main areas of vulnerability. There is a need to study the
vulnerabilities in routing protocols that may be exploited by
malicious nodes to launch attacks.
In [1] and [2], the attack is one of the most serious attacks on
MANETs. In wormhole attack at least two attackers are
required to perform the attack very effectively. These two
attackers resides on different areas of the network makes a
tunnel through the network to communicate with each other.
The attackers broadcast the wrong information to the other
nodes in the network that the destination is only one hop away
from them. Sometimes they also broadcast the wrong
information that they are true neighbors of each other due to
this the attacker one which is near to source node is easily
selected on the route between the source destination pair when
the route is discovered on the basis of lowest number of hops
on the route.
In [3], the attacker when received a route request (RREQ)
message it modifies the sequence number in the RREQ
message to perform the attack. The attacker increases the
sequence number more than the usual number and reply back
to the source to make it believe that it has the better and
fresher route to the destination node. Once the source node got
this reply it start the transmission of data packet on the route
which consists of the attacker i.e., one of the intermediate
node of the established route is the attacker. Till now half of
the attack is performed by the attacker by spreading the false
information and making himself the part of the route. Now
when the data communication is started using the route the
attacker will drop all the data packets that reaches to it that is
when the attacker got the data packet for forwarding it drops
the packet without forwarding any of the data packets.
In [4], Flooding attack is the simplest attack to implement but
it is one of the most dangerous attacks. In this attack, the
attacker broadcast the false control or data packets in the
network due to which the network bandwidth is wasted largely
and the non-false packets are not able to reach their
destinations.
In [5]: As the communication in MANETs is multi hop
therefore the intermediate nodes plays an important role in
data communication over MANETs. The intermediate nodes
can become selfish by either using the wireless channel
unnecessary due to which the other nearby channels has to
contend more time to access the channel.
In [6] has analyzed the impact of packet re-ordering attack
over various TCP-variants using the MANET routing
protocols named AODV and DSR. Although authors claim
that they have investigated various versions of TCP but the
simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
3. PROPOSED METHODOLOGY
In proposed Re-shuffling data packet attack (RSA) an attacker
node re-ordered a specified number of packets using a re-
ordering buffer whose size is either selected randomly every
time the buffer is empty or its size can be fixed at the start of
the data communication and kept constant throughout the
whole communication duration. To perform this attack the
attacker node should be one of the intermediate nodes on the
route between the source destination pair. The attacker can
perform the proposed Re-shuffling data packet attack (RSA)
using any one of the following two approaches:
a) In this method, the attacker node uses a fixed size of
buffer and wait till the number of packets are equal to
the size of the buffer once the number of data packets
are equal to the used re-order buffer size the attacker
shuffles all the packets and forward them one-by-one.
For example, if the re-order buffer size is set to 3
then as soon as the re-order buffer has 3 data packets
stored in it the attacker shuffles them in any random
or predefined order and forward the data packets.
b) In the second method, the attacker node may vary the
size of the reorder buffer during the communication
duration and uses a random re-order buffer size for
some duration while uses some other size for the rest
or some other period. In this way, the attacker makes
itself more secure from the detection mechanisms if
applied by the source node to detect the attackers. To
perform any attack method either first or second the
attacker should be one of the intermediate nodes on
the active TCP or UDP based route using for data
communication process.
Pseudo Code for proposed Delay-Aware Routing Protocol
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 496
Processing of Data Packet Received by an Attacker
Node
Shorthand used in the Algorithm:
////////////////////////////////////
S = Source node
D = Destination node
A = Attacker node
I = Intermediate node
IP_OQ(N) = IP output queue of node N
RO_buffer_size = x; where x is between 1 to 5
//////////////////////////////////
IF1 (I got a data packet)
I check its AODV routing table
IF2 (Route is present in the routing table)
IF3 (I != A)
I forward the data packets from its IP output queue using FIFO
approach towards D
ELSE //this node is an attacker node
A checks whether the IP output queue has number of data
packets that are greater than or equals to its RO_buffer_size
IF4 (RO_buffer_size (A) >= number of packets in IP_OQ(A))
A either send the data packet or it pauses the data packet till
the re-shuffle buffer of its IP output queue is filled with the
required packets
ELSE //attackers re-shuffle buffer is full
A re-shuffle the data packets either using a fixed re-order
pattern or randomly
After re-shuffling send the packets from the re-order buffer
using FIFO approach
ENDIF4
ENDIF3
ENDIF2
ENDIF1
4. SIMULATION RESULTS AND
PERFORMANCE EVALUATION
In this section, we present the detailed performance analysis
and impact analysis of the proposed Re-shuffling data packet
attack (RSA) on different variants of TCP protocol over
mobile ad-hoc networks. The network scenarios used in the
simulation process are designed in such a way so that the
effects of the wireless channel and environment can be
mitigated. This is done to discover the exact impact of Re-
shuffling data packet attack on the TCP-based MANETs.
Therefore, we ignore the congestion and mobility induced
situation from the network scenarios used for simulation
process. As already mentioned above that the network
simulator used for the simulation process is the trail version of
the well knows network simulator called EXata.
Table1. Simulation Parameter Table
Parameters Values
Simulator EXata
Network Size 900 x 900 meter square
Simulation time 750 Seconds
Application Layer
Process
File transfer protocol
(FTP)
Transport Layer
Protocols
TCP (Tahoe, Reno,
NewReno) and UDP
Routing protocol AODV, DSR, OLSR
Number of Nodes 30
Mobility model None
MAC specification IEEE 802.11
Network Bandwidth 15 Mbps
Performance Metrics Network Throughput,
Packet Delivery Ratio
end-to-end delay and
Number of
Retransmissions
PHY Specification 802.11a/g
Parameters Values
A .Simulation Setup
Furthermore, the performance measurement metrics used are
as follows and the graphs will show that the attack is
independent from the effect of routing protocol on both TCP
as well as UDP:
a) Network throughput: The network throughput is
defined as the ratio of the total number of data bytes
received to the total duration of the communication
process.
b) Packet delivery ratio (PDR): The ratio of the
application data packets that are received without any
error at destination nodes to the total data packets
generated by the CBR sources are called Packet
delivery ratio (PDR) of the network.
c) Average end-to-end delay of data packets: This
metric is calculated by the destination node whenever
it receives a data packet. The destination node will
calculate the delay of each received data packet by
using its send timestamp and its received timestamp
at the destination.
d) Number of retransmission (NOR): This is the
important evaluation metric as we are using TCP-
based MANETs. In TCP a data packet is re-
transmitted when its retransmission timer expires or
the TCP receives the three acknowledgment packets
for the same data packet. These retransmissions
waste network bandwidth and lead to lower network
throughput.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 497
B. Performance Evaluation
1. Effects of Increase in Re-Shuffle Buffer Size
In this section, the effects of increase in the size of the re-
shuffle buffer of an attacker node are analyzed using the two
metrics (i.e., network throughput and number of
retransmissions).
Fig.1 Network throughputs with increase in shuffle size when
using all three routing protocols (TCP-based MANETs)
Fig.2 Number of Retransmissions with increase in shuffle size
when using all three routing protocols (TCP-based MANETs)
2. Effects of Increase Number of Attackers in TCP-
Based Manets
In this section, we analyze the performance of three TCP
protocol variants with the increase in the number of attackers
in an active route between any source-destination pair. The
metrics used for the analysis are network throughput and
number of re-transmissions caused during the whole duration
of data communication of a data session.
Fig.3 Network throughputs with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
Fig.4 Number of Retransmissions with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
3. Effects of Increase Number of Attackers in UDP-
Based Manets
In the previous section, we have shown the effect of the
proposed attack on TCP-based transmissions over mobile ad-
hoc networks. In this section, we analyze the effects of the
proposed attack on the UDP-based transmissions. As we are
using UDP as a transport layer protocol therefore there is no
re-transmission of data packets so we have used different
metrics to analyze the effects of our proposed attack on the
source-destination pair and overall network.
To show through the simulation process that the attack is
independent on the routing protocol used, we have also
configure the OLSR and DSR as the routing protocols in
conjunction with the AODV protocol and the results are given
below. This change is due to their different types of route
discovery methods used for route discovery and different
levels of routing overhead. These factors affect the network
metrics values.
Figure 5 End-to-end delays with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
Figure 6: End-to-end delay with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 498
5. PROPOSED DETECTION METHOD FOR RE-
SHUFFLING DATA PACKET ATTACK
In this section, we will propose an efficient yet simple method
to detect the proposed Re-shuffling data packet attack. The
source node TCP protocol uses the time-stamps to detect
whether the re-transmission done by it is a false or true re-
transmission. If the re-transmission done by the source is true
than the TCP will work in the traditional way by applying its
methods to control the congestion and network flow rates. On
the other hand, if the re-transmission is detected as a false re-
transmission the source TCP will not enter into the congestion
control states. Due to this the network throughput of the
network is maintained during the attack periods.
The proposed method for the detection weather the current re-
transmission at the source is true or false type is explained
below with the help of the Figure
Figure 7 Detection methods for packet re-shuffling attack
When the source TCP sends a data packet, it also places a
time-stamp in that data packet. The value of the time stamp is
set equal to the current system time when the data packet is
transmitted into the network. Let’s assume that node A sends
four data packets with the time stamps t1, t2, t3 and t4
respectively. As, it can be seen in Figure 4.13 that the attacker
node re-shuffles the packets before forwarding them towards
the destination node When the receiver node E receives the
data packet with the time-stamped equal to t4 it generates the
duplicate ACK because it is waiting for the data packet which
has the timestamp equal to t1. In this way, the node E will
generate three duplicate ACKs for the first three received out
of order data packets.
CONCLUSIONS AND FUTURE WORK
In this section, we have presented the conclusion and future
work for the paper. As we are using UDP as a transport layer
protocol therefore there is no re-transmission of data packets
so we have used different metrics to analyze the effects of our
proposed attack on the source-destination pair and overall
network. For this we have studied all forms of existing attacks
over Mobile ad-hoc networks. The simulation results clearly
show the impact of proposed attack on the network
throughput, bandwidth wastage and received data quality. We
have also seen that the proposed attack is independent on the
underlying network protocol as the attack is done to interrupt
the usual working of the TCP protocol. The attack exploits the
TCP congestion avoidance algorithm and flow control process
to disturb the regular data transmission process.
In the paper, we have analyzed the impact of packet re-
ordering attack over various TCP-variants using the MANET
routing protocols named AODV and DSR. Although authors
claim that they have investigated various versions of TCP but
the simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
REFERENCES
[1] George Hoffman, Yoko Ono, Akiko Kawakami,
Kenichi Kusano, and Takashi Manabe Japan
Communications 2012 Top 10 Predictions
http://www.idc.com/getdoc.jsp?containerId=JP1376002
U.
[2] Trends — Survey Says Wireless Net- works Expand for
Mobile Growth.
http://edtechdigest.wordpress.com/2011/10/18/trends-
survey-says-wirele
[3] Raza, I. and Hussain, S.A. and Ali, A. and Hassan
Raza, M. : Persistent packet reordering attack in TCP
based Ad hoc wireless networks, Information and
Emerging Technologies (ICIET), 2010 International
Conference, 2010.
[4] C. Perkins and E. Royer. Ad hoc on-demand distance
vector routing. 1999.
[5] A. Mishra, R. Jaiswal, and S. Sharma. A novel
approach for detecting and eliminating cooperative
black hole attack using advanced dri table in ad hoc
network. In Advance Computing Conference (IACC),
2013 IEEE 3rd International, 2013.
[6] Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole
attacks in wireless networks," Selected Areas in
Communications, IEEE Journal on , vol.24, no.2,
pp.370,380, Feb. 2006.
[7] Hoang Lan Nguyen and Uyen Trang Nguyen. A study
of different types of attacks in mobile ad hoc networks.
In Electrical Computer Engineering (CCECE), 2012
25th IEEE Canadian Conference on, 2012.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 499
[8] M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy.
A reputation-based mechanism for isolating selfish
nodes in ad hoc networks. In International Conference
on Mobile and Ubiquitous Systems, Networking and
Services, July 2005.
[9] Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang,
"Resisting flooding attacks in ad hoc networks,"
Information Technology: Coding and Computing, 2005.
ITCC 2005. International Conference on , vol.2, no.,
pp.657,662 Vol. 2, 4-6 April 2005.
[10] Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of-
service attack-detection techniques," Internet
Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb.
2006.
[11] JOHNSON David B. The dynamic source routing
protocol for mobile ad hoc networks (dsr). Internet-
Draft, 2004.
[12] Chen, S., Nahrstedt, K.: Distributed quality-of-service
routing in ad hoc networks. Selected Areas in
Communications, IEEE Journal 17, 1488–1505 (1999).
[13] Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan
and Irwin, Angela and Hassan, Aamir,” Vehicular ad
hoc networks (VANETS): status, results,
and challenges”, Telecommunication Systems, Springer
US, 2012.
[14] Chakrabarti, S., Mishra, A.: QoS issues in ad hoc
wireless networks. Communications Magazine, IEEE
39, 142–148 (2001).
[15] Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu.
Mobile ad hoc networking: imperatives and challenges.
Ad Hoc Networks, 1(1):13 – 64, 2003.
[16] Tsu-Wei Chen and Gerla, M.: Global state routing: a
new routing scheme for ad-hoc wireless networks,
Communications, 1998. ICC 98. Conference Record.
1998 IEEE International Conference.
[17] E.M. Royer and Chai-Keong Toh. A review of current
routing protocols for ad hoc mobile wireless networks.
Personal Communications, IEEE, 6(2):46 –55, apr
1999.
[18] P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, and L. Viennot. Optimized link state routing
protocol for ad hoc networks. 3626, 2001.
[19] Charles E. Perkins and Pravin Bhagwat. Highly
dynamic destination-sequenced distance-vector routing
(dsdv) for mobile computers. SIGCOMM Comput.
Commun. Rev., 24:234–244, October 1994.