A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...ijtsrd
The document discusses routing techniques and challenges in mobile ad-hoc networks (MANETs). It begins by defining MANETs as infrastructure-less, self-configuring networks of mobile devices connected wirelessly without centralized administration. It then examines routing protocols in MANETs, classifying them as proactive (table-driven), reactive (on-demand), or hybrid. Key challenges discussed include frequent changes in network topology, security issues due to the lack of centralized control, and resource constraints of battery-powered mobile devices. The document concludes that MANETs have potential for wireless communication where infrastructure is not available or reliable.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...ijtsrd
The document discusses routing techniques and challenges in mobile ad-hoc networks (MANETs). It begins by defining MANETs as infrastructure-less, self-configuring networks of mobile devices connected wirelessly without centralized administration. It then examines routing protocols in MANETs, classifying them as proactive (table-driven), reactive (on-demand), or hybrid. Key challenges discussed include frequent changes in network topology, security issues due to the lack of centralized control, and resource constraints of battery-powered mobile devices. The document concludes that MANETs have potential for wireless communication where infrastructure is not available or reliable.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
Network communications involve three main elements - a message source, destination, and channel between them. Messages are segmented into smaller pieces for transmission over the network to allow for multiple conversations and increased reliability. Network devices include end devices that interface with users and intermediary devices that direct traffic flow. Protocols govern network communications and are organized into protocol stacks, with lower layers focusing on transport and higher layers on applications. Standardized protocols enable different systems to communicate.
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
Generally, traditional networks presume the presence of some path between endpoints. Today, however, new applications, environments and types of devices are challenging these assumptions. In Delay Tolerant Networks (DTNs), an end-to-end path from source to destination may not exist. Nodes may connect and exchange their information in an opportunistic way. This book represents a broad overview of DTNs, particularly focusing on Vehicular Ad-hoc DTNs, their main characteristics, challenges and our research on this field. In the near future, cars are expected to be equipped with devices that will allow them to communicate wirelessly i.e. Wi-Fi. However, there will be strict restrictions to the duration of their connections with other vehicles, whereas the conditions of their links will greatly vary; DTNs as well as Ad-hoc DTNs present an attractive solution. Therefore, Vehicular Ad-hoc DTNs constitute an attractive research field. For practical implementation, we have used two Android devices for a little range of Wi-Fi. So, by this we are trying to give us better accuracy to go further. Thorough out this document, we have mentioned those techniques we came across and also those techniques and algorithms that we used in our proposed method.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
This document provides an overview of computer network technology concepts. It discusses what computer networks are used for, including data sharing, program sharing, and resource sharing. It also reviews key aspects of network components and topology. Specifically, it covers network types (LANs, MANs, WANs), transmission media, and multiplexing techniques. It explains the differences between circuit switching and packet switching, and surveys current network services. The overall purpose is to discuss the basic concepts of computer network technology and emphasize those required to stay informed of new developments in the field.
- Wireless ad-hoc networks are collections of wireless devices that can communicate directly with nearby devices or through intermediate devices to reach destinations further away without any centralized administration. They were first developed in the 1990s and have been widely researched.
- However, it is debated whether wireless ad-hoc networks are fundamentally flawed because they are rarely used in practice and wireless networks today typically connect to base stations or access points rather than communicating in a decentralized multi-hop fashion.
- This document will examine arguments for and against wireless ad-hoc networks being a flawed architecture, providing examples and analysis to support the position that technical limitations inherently make them unrealizable.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
Network communications involve three main elements - a message source, destination, and channel between them. Messages are segmented into smaller pieces for transmission over the network to allow for multiple conversations and increased reliability. Network devices include end devices that interface with users and intermediary devices that direct traffic flow. Protocols govern network communications and are organized into protocol stacks, with lower layers focusing on transport and higher layers on applications. Standardized protocols enable different systems to communicate.
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
Generally, traditional networks presume the presence of some path between endpoints. Today, however, new applications, environments and types of devices are challenging these assumptions. In Delay Tolerant Networks (DTNs), an end-to-end path from source to destination may not exist. Nodes may connect and exchange their information in an opportunistic way. This book represents a broad overview of DTNs, particularly focusing on Vehicular Ad-hoc DTNs, their main characteristics, challenges and our research on this field. In the near future, cars are expected to be equipped with devices that will allow them to communicate wirelessly i.e. Wi-Fi. However, there will be strict restrictions to the duration of their connections with other vehicles, whereas the conditions of their links will greatly vary; DTNs as well as Ad-hoc DTNs present an attractive solution. Therefore, Vehicular Ad-hoc DTNs constitute an attractive research field. For practical implementation, we have used two Android devices for a little range of Wi-Fi. So, by this we are trying to give us better accuracy to go further. Thorough out this document, we have mentioned those techniques we came across and also those techniques and algorithms that we used in our proposed method.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
This document provides an overview of computer network technology concepts. It discusses what computer networks are used for, including data sharing, program sharing, and resource sharing. It also reviews key aspects of network components and topology. Specifically, it covers network types (LANs, MANs, WANs), transmission media, and multiplexing techniques. It explains the differences between circuit switching and packet switching, and surveys current network services. The overall purpose is to discuss the basic concepts of computer network technology and emphasize those required to stay informed of new developments in the field.
- Wireless ad-hoc networks are collections of wireless devices that can communicate directly with nearby devices or through intermediate devices to reach destinations further away without any centralized administration. They were first developed in the 1990s and have been widely researched.
- However, it is debated whether wireless ad-hoc networks are fundamentally flawed because they are rarely used in practice and wireless networks today typically connect to base stations or access points rather than communicating in a decentralized multi-hop fashion.
- This document will examine arguments for and against wireless ad-hoc networks being a flawed architecture, providing examples and analysis to support the position that technical limitations inherently make them unrealizable.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
This document discusses a proposed Secured PPEM based Multi-Hop Strong Path Geographic Routing protocol for mobile ad hoc networks (MANETs). The protocol aims to enhance security in MANETs by incorporating effective key management, secure neighbor detection, securing routing data, identifying malicious nodes, and eliminating them from routing tables. Simulation results show the protocol increases throughput and packet delivery ratio with a tolerable increase in routing overhead and end-to-end delay compared to existing routing protocols for MANETs.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
Discovery and verification DocumentationSambit Dutta
This document discusses public-key cryptography, which uses two separate but mathematically linked keys - a private key and a public key. The public key can be published without compromising security, while the private key must remain secret. Public-key cryptography allows for encryption with a recipient's public key and digital signatures created with a sender's private key that can be verified by anyone with the sender's public key. This ensures confidentiality for encryption and authenticates messages for digital signatures.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
This document discusses mobile ad hoc networks (MANETs) and related security challenges. It provides an overview of MANETs, including their evolution, characteristics, and architecture. The document then examines key security issues for MANETs, such as vulnerabilities to different types of attacks, including active attacks like packet dropping, modification, and denial of service attacks. It emphasizes that MANETs require new security solutions due to their lack of infrastructure, dynamic topology, and other distinguishing features compared to traditional wired networks. Overall, the document serves to introduce MANETs and outline important security considerations for further research on this topic.
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
This document provides an analytical study of routing protocols for mobile ad hoc networks (MANETs). It begins with definitions of MANETs and discusses their key characteristics including dynamic topology, limited energy/bandwidth, and security vulnerabilities. The document then examines the core functions and categories of MANET routing protocols. It analyzes several table-driven proactive protocols including DSDV and WRP, and on-demand reactive protocols including DSR, AODV, and TORA. Tables compare the protocols on metrics like routing structure, memory overhead, convergence time and advantages/disadvantages. The analysis found that different protocols have tradeoffs between overhead, adaptation to mobility, and scalability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
The flexibility and diversity of Wireless Mobile Networks offer many opportunities that are not always taken into account by existing distributed systems. In particular, the proliferation of mobile users and the use of mobile Ad-Hoc promote the formation of collaborative groups to share resources. We propose a solution for the management of fault tolerance in the Ad-Hoc networks, combining the functions needed to better availability of data. Our contribution takes into account the characteristics of mobile terminals in order to reduce the consumption of resources critical that energy, and to minimize the loss of information. Our solution is based on the formation of clusters, where each is managed by a node leader. This solution is mainly composed of four sub-services, namely: prediction, replication, management of nodes in the cluster and supervision. We have shown, using several sets of simulation, that our solution is twofold: minimizing the
Similar to Proposed Scheme for Secured Routing in MANET (20)
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.19 ISSN: 2454-1311
www.ijaems.com Page | 527
Proposed Scheme for Secured Routing in MANET
Nidhi Goyal, Susheel Kumar
Dept. of Computer Science, Samalkha Group of Institutions, Samalkha (HR.), Kurukshetra University, Kurukshetra, India
Abstract— A Mobile Adhoc Network (MANET) is
characterized by mobile nodes, multihop wireless
connectivity, infrastructure less environment and dynamic
topology. A recent trend in Ad Hoc network routing is the
reactive on-demand philosophy where routes are
established only when required. Stable Routing, Security
and Power efficiency are the major concerns in this field.
This paper is an effort to study security problems associated
with MANETS and solutions to achieve more reliable
routing. The ad hoc environment is accessible to both
legitimate network users and malicious attackers. The study
will help in making protocol more robust against attacks to
achieve stable routing in routing protocols.
Keywords— Ad hoc Networks, AODV, security, wireless
network, packet delivery.
I. INTRODUCTION
Since their emergence in the 1970s, wireless networks [1,
11] have become increasingly popular in the computing
industry. This is particularly true within the past decade,
which has seen wireless networks being adapted to enable
mobility. Wireless networks are emerging fast as latest
technology to allow users to access information and
services via electronic media, without taking geographic
position in account. Mobile hosts and wireless networking
hardware are becoming widely available, and extensive
work has been done recently in integrating these elements
into traditional networks such as the Internet. Wireless
networks have taken the world by storm. Enterprises and
homeowners are avoiding the expenses and delays
associated with installing wired networks. High-speed
Internet facility is enjoyed by travelers all over the places
worldwide. Along with increases in throughput, wireless
networks remain unlicensed and affordable. This has further
helped their exponential growth in businesses, homes,
communities and open spaces. There are currently two
variations of mobile wireless networks: Infrastructured or
Infrastructure less. [10, 12, 13]. In Infrastructured wireless
networks, the mobile node can move while communicating,
the base stations are fixed and as the node goes out of the
range of a base station, it gets into the range of another base
station that is within its communication radius. The figure 1,
given below, depicts the Infrastructured wireless network.
Typical applications of this type of network include office
wireless local area networks (WLANs). In Infrastructureless
wireless network commonly known as an ad hoc network,
the mobile node can move while communicating, there are
no fixed base stations and all the nodes in the network act as
routers. The mobile nodes in the Ad Hoc network
dynamically establish routing among themselves to form
their own network ‘on the fly’. This type of network can be
shown as in figure 2.
II. AD HOC NETWORK
An Ad hoc network [1, 11] is a self-configuring network of
wireless links connecting mobile nodes. These nodes may
be routers and/or hosts. Each node or mobile device is
equipped with a transmitter and receiver. They are said to
be purpose-specific, autonomous and dynamic. Ad hoc
networking is a concept in computer communications,
which means that users wanting to communicate with each
other form a temporary network, without any form of
central administration. Term Ad hoc means a network
which can take different forms in terms of topologies and in
term of devices used. Ad hoc devices can be mobile,
standalone or networked.
Fig.1: Infrastructured Wireless Networks
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.19 ISSN: 2454-1311
www.ijaems.com Page | 528
Fig.2: Infrastructure less or Ad Hoc Wireless Network
“A Mobile Ad hoc Network (MANET) [4, 5] is an
autonomous system of mobile hosts which are free to move
around randomly and organize themselves arbitrarily” or we
can say that “It is a collection of wireless mobile nodes
forming a temporary/short-lived network without any fixed
infrastructure where all nodes are free to move about
arbitrarily and where all the nodes configure themselves”.
In MANET, each node acts both as a router and as a host &
even the topology of network may also change rapidly.
MANET is viewed as suitable systems which can support
some specific applications as virtual classrooms, military
communications, emergency search and rescue operations,
data acquisition in hostile environments, communications
set up in Exhibitions, conferences and meetings, in battle
field among soldiers to coordinate defense or attack, at
airport terminals for workers to share files etc. In Ad hoc
networks nodes can change position quite frequently. The
nodes in an ad hoc network can be Laptops, PDA (personal
digital Assistant) or palm tops etc. These are often limited
in resources such as CPU capacity, storage capacity, Battery
Power, Bandwidth. Each node participating in the network
acts both as a router and as a host and must therefore be
willing to transfer packets to other nodes. For this purpose a
routing protocol is needed and the new protocol should try
to minimize control traffic. An ad hoc network has certain
characteristics, which impose new demands on routing
protocols. The most important characteristic is dynamic
topology, which is a consequence of node mobility. It
should be reactive i.e. calculates routes only upon receiving
a specific request.
The Internet Engineering Task Force currently has a
working group named Mobile Ad hoc Networks (MANET)
that is working on routing specifications for Ad hoc
networks. This research work will evaluate some of the
existing protocols and suggests a new protocol. To
accomplish this task, several routing protocols for Ad hoc
networks have been studied such as Dynamic Source
Routing (DSR)[6], Dynamic Distributed Routing (DDR)[7],
Temporarily Ordered Routing Algorithm (TORA)[2], Ad
Hoc On Demand Distance Vector Routing (AODV)[4,5]. In
all the protocols major emphasis has been on stable and
shortest routes ignoring the major issue of delay in response
whenever break occurs. Most of the protocols proposed
require knowledge of the network topology for routing.
These protocols involve communication overheads of route
discovery and maintenance. Later, position based protocols
were proposed to eliminate these overheads. Most of the
protocols in this category, however, use single route and do
not utilize multiple alternate paths. Those routing protocols
should also minimize the usage of valuable resources such
as bandwidth, power and processor.
III. MANET CHALLENGES
The special features of mobile ad hoc networks bring great
technological opportunities together with different
challenges[9,10]. Some of the key challenges in the area of
mobile ad hoc networks include:
1. Unicast routing
2. Multicast routing
3. Dynamic network topology
4. Speed
5. Frequency of updates or Network overhead
6. Scalability
7. Mobile agent based routing
8. Secure routing
9. Quality of Service
10. Energy efficient/Power aware routing
The key challenges faced at different layers of MANET are
shown in figure 3. It represents layered structure and
approach to ad hoc networks.
Fig.3: Challenges at different layers of MANET
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.19 ISSN: 2454-1311
www.ijaems.com Page | 529
IV. SECURITY ISSUE OVER AD HOC
NETWORKS
Many organizations including retail stores, hospitals,
airports and business enterprises plan to capitalize on the
benefits of “going wireless”. But if we think about the
security of the modern wireless network, this wouldn’t
looks so positive. There have been numerous published
reports and papers describing attacks on wireless networks
that expose organizations to security risks such as attacks on
confidentiality, integrity, non repudiation and network
availability [8,9]. There are several proposals to solve these
issues but they target specific threats separately. Therefore,
there is a requirement to have an efficient security system
which takes care of all aspects of security.
Security Threats: Network security attacks are typically
divided into passive & active attacks[ ]as shown in table 1.
Passive Attack: An attack in which an unauthorized party
gains access to an asset and does not modify its content.
Passive attacks can be either eavesdropping or traffic
analysis (sometimes called traffic flow analysis). These two
passive attacks are described below.
Eavesdropping: The attacker monitors transmissions
for message content. An example of this attack is a
person listening into the transmissions on a network
topology between two workstations or tuning into
transmissions between a wireless handset and a base
station.
Traffic analysis: The attacker, in a more subtle way,
gains intelligence by monitoring the transmissions for
patterns of communication. A considerable amount of
information is contained in the flow of messages
between communicating parties.
Table 1: Passive vs. active attacks
Passive attacks
Eavesdropping, traffic
analysis
Active attacks
Masquerading/Spoofing,
Replaying, Message
modification, DoS
Active Attack: An attack whereby an unauthorized party
makes modifications to a message, data stream, or file. It is
possible to detect this type of attack but it may not be
preventable. Active attacks may take the form of one of four
types masquerading, replay, message modification, and
Denial-of-Service (DoS). These attacks are summarized as:
Masquerading: The attacker impersonates an
authorized user and thereby gains certain
unauthorized privileges. A spoofing attack is a
situation in which one person or program
successfully masquerades as another by falsifying
data and thereby gaining an illegitimate advantage.
Replay: The attacker monitors transmissions and
retransmits messages as the legitimate user.
Message modification: The attacker alters a
legitimate message by deleting, adding to,
changing, or reordering it.
Denial-of-Service: The attacker prevents or
prohibits the normal use or management of
communications facilities.
The consequences of these attacks include, but are not
limited to, loss of proprietary information, legal and
recovery costs, tarnished image, and loss of network
service.
Due to the dynamically changing topology and
infrastructure less, decentralized characteristics, security is
hard to achieve in mobile ad hoc networks. Hence, security
mechanisms have to be a built-in feature for all sorts of ad
hoc network based applications.
V. EXISTING SECURITY MEASURES
Some of the measures that can be incorporated are:
1. Virtual Private Networks (VPN): This offers a
solid solution to many security issues, where an
authenticated key provides confidentiality and integrity
for IP (Internet Protocol) data grams. Software are
available to implement VPNs on just about every
platform. Authentication depends upon three factors such
as password, fingerprints and a security token.
2. Encryption: Encryption is a technique used for
many years for passing information from one place to
other in a secured manner. A message in its original shape
is referred to as a plaintext (or Text) and a message used
to conceal original message is called Ciphertext (or
Cipher). The process of changing plaintext into ciphertext
is called Encryption and the reverse process is called
decryption. There are many algorithms available for these
processes. Some of them are Data Encryption Standard
(DES), International Data Encryption algorithm (IDEA)
and Public key algorithm (RSA). These algorithms are
key based algorithms.
3. One Way Hash Function: There is another
algorithm called one way hash Function. It is like
checksum of a block of text and is secure. It is impossible
to generate the same hash function value without knowing
the correct algorithm and key. It accepts a variable size
message and produces an affixed size tag as output.
4. Digital Signature: A digital signature is an
electronic signature that can be used to authenticate the
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.19 ISSN: 2454-1311
www.ijaems.com Page | 530
identity of the sender or the signer of a
message/document, and possibly to ensure that the
original content of the message or document that has been
sent is unchanged. Digital signatures are easily
transportable, cannot be imitated by someone else, and
can be automatically time-stamped. External attacks can
be checked using Confidentiality of the routing
information and also by authentication and integrity
assurance features. Encryption can be solution to this.
Digital signature can be applied.
VI. PROPOSED SCHEME
The effort is to propose a solution for routing in Ad hoc
networks by tackling the core issue of stability and security.
A protocol will be developed which improves existing on-
demand routing protocols by adding security parameter. An
effort will also be made to develop a cryptographic
algorithm or to implement new strategy to existing
algorithm.
The scheme will establish multi paths without transmitting
any extra control message. It will offer quick adaptation to
distributed processing, dynamic linking, low processing and
memory overhead and loop freedom at all times. The
proposed scheme will respond to link breakages and
changes in network topology in a timely manner. The
distinguishing feature will be security factor for Ad hoc
routing protocol. The work will present a new scheme
based on stable and secured nodes and the goal is to able
to address the following features:
The proposed scheme performs better for finding a
good route, such that better packet delivery is assured.
The scheme performs well in denser mediums.
Scheme should be successful in minimum hop count
as metrics for optimality.
The Scheme should offer Secured Routing
It should be able to provide stable route selection.
The Proposed scheme should perform with both bi-
directional and uni-directional traffic patterns.
The Metrics[ 1,3,12 ] that will be used for Performance
evaluation and comparison will be:
Packet Delivery Ratio: The fraction of successfully
received packets, which survive while finding their
destination is called packet delivery ratio. This
performance measure also determines the
completeness and correctness of the routing protocol.
End-to-End Delay: Average end-to-end delay is the
delay experienced by the successfully delivered
packets in reaching their destinations. This is a good
metric for comparing protocols. This denotes how
efficient the underlying routing algorithm is, because
delay primarily depends on optimality of path chosen.
Throughput: This declares overall throughput in
terms of packets received and helps in performance
evaluation of the proposed scheme.
Proposed Scheme
Hashing is done for route request, reply and local route
repair and not in route error and route erasure phases so that
less overhead occurs. If in REQ phase if intermediate node
cannot satisfy the security and power requirements, the
REQ packet is dropped and not forwarded. Arrival of REQ
to Destination will ensure a safe path. REP packet contains
this security information specified by sender. So additional
field is added to REQ and REP packet formats.
1 Source node broadcasts routing request message to its
neighbors in order to find a route to destination node.
2. The neighbors of the source node forward the request to
their neighbors if the security evaluation on the source
node pass its predefined threshold, and so on, until either
the destination or an intermediate node with a "fresh
enough" route to the destination is reached.
3. If some nodes respond that they have fresh enough route
to the destination node,, Based on the evaluation result
and hops of the routes, the source node selects one
preferred route, which it believes the best.
4. After receiving the data packages, the destination node
applies the same method above to reply the confirmation
message if the source node requests it. It is not
mandatory to use the same route as the source for better
security consideration.
5. If within the time slot, the destination's confirmation
arrives and can be verified as valid, the source node will
continue sending data packages via the underlying route. If
the destination's confirmation cannot receive within the
preferred time slot, the source node will update its route
table and go for local repair.
6. The source node selects the second best route.
VII. CONCLUSION
The existing routing protocols are typically attack-oriented.
They first identify the security threats and then enhance the
existing protocol to conquer such attacks. The ultimate goal
for adhoc network security is to develop a multifold security
solution that results in in-depth protection that offers
multiple lines of defense against both known and unknown
security threats. The objective in this study is to find a
multifold security solution by developing a new on-demand
5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.19 ISSN: 2454-1311
www.ijaems.com Page | 531
stable and secure routing protocol. The work will help in
development of new protocol and standardize the existing
schemes.
ACKNOWLEDGEMENT
We sincerely wish to thank Dr Ashwani Kush, Head, Dept
of computer science, UCK for his valuable help and kind
advice.
REFERENCES
[1] A. Kush, P. Gupta, R. Kumar; Performance
Comparison of Wireless Routing Protocols; Journal of
CSI, Vol. 35 No.2, April-June 2005.
[2] A.Kush, P.Gupta , C J Hwang “Stable and Energy
Efficient Routing for Mobile Adhoc Networks”
Information Technology: New Generations, 2008.
ITNG 2008. Fifth International Conference, LAS
VEGAS USA 7-9 April 2008 Page(s):1028 – 1033
Digital Object Identifier 10.1109/ITNG.2008.230 at
IEEE explore.
[3] Bayya, Arun. “Security in Ad hoc Networks”,
Computer Science Department. University of
Kentucky.
[4] C.Parkins and E.Royer , “Ad Hoc on demand distance
vector routing”, 2nd IEEE workshop on mobile
computing , pages 90-100, 1999.
[5] Charles Perkins, Elizabeth Royer, Samir Das, Mahesh
Marina, “Performance of two on-demand Routing
Protocols for Ad-hoc Networks”, IEEE Personal
Communications, February 2001, pages 16-28.
[6] D.B.Johnson and D.A. Maltz, “Dynamic source
routing in ad hoc networks”, Kluwer academic
publishers, 1996.
[7] D. B. Johnson, D. A. Maltz, Y.C. Hu, “The Dynamic
Source Routing Protocol for Mobile Ad Hoc Networks
(DSR)”, IETF Draft, April 2003, work in progress.
http://www.ietf.org/internet-drafts/draft-ietf-manet-
dsr-09.txt.
[8] D. B. J., Yih-Chun Hu, Adrian Perrig, “Ariadne: A
secure on-demand routing protocol for ad-hoc
networks”, Proceedings of the Eighth Annual
International Conference on Mobile Computing and
Networking (MobiCom 2002), Sept. 2002.
[9] Hao Yang, Haiyun Luo et al., ‘Security in Mobile Ad
Hoc Networks: Challenges and Solutions”, UCLA
Computer Science Department.
[10]Md. Golam Kaosar, Hafiz M. Asif, Tarek R. Sheltami,
Ashraf S. Hasan Mahmoud, “Simulation-Based
Comparative Study of On Demand Routing Protocols
for MANET”, available at http://www.lancs.ac.uk.
[11]NIST, Fed. Inf. Proc. Standards, “Secure Hash
Standard,” Pub. 180, May 1993.
[12]A.Kush , Sunil Taneja, “ simulation of MANET
schemes“,in International Journal of Computing and
Business Research IJCBR, Vol 1, Issue 2, Nov, 2010.
[13]A.Kush, Sunil Tanjea, “End to End Delay Analysis of
Prominent On-demand Routing Protocols” IJCST,
International Journal of Computer Sci ence and
Technology, Vol 2 Issue 1 March 2011, I S S N : 2 2 2
9 - 4 3 3 3 ( P r i n t ) | I S S N : 0 9 7 6 - 8 4 9 1 (On l i
n e ) pp 42-46
[14]A.Kush, S.Taneja, Divya, “Encryption Scheme for
Secure Routing in Ad Hoc Networks” in International
Journal of Advancements in Technology
http://ijict.org/ ISSN 0976-4860, Vol 2, No 1
(January 2011) pp22-29.