Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Similar to RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS (20)
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
DOI : 10.5121/ijnsa.2011.3412 130
RTOS BASED SECURE SHORTEST PATH
ROUTING ALGORITHM
IN MOBILE AD- HOC NETWORKS
R. Ramesh1
and S. Gayathri2
1
Department of Electrical and Electronics Engineering, Anna University, India
rramesh@annauniv.edu
2
Department of Electrical and Electronics Engineering, Anna University, India
gayathri.in50@gmail.com
ABSTRACT
Increase of number of the nodes in the wireless computing environment leads to different issues like
power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most
of the wireless networks. Especially networks without having a centralized system (MANETS) is facing
severe security issues. One of the major security issues is the wormhole attack while finding the shortest
path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole
attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are
hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both
software and hardware specific. RTOS is included to make the ad hoc network a real time application.
KEYWORDS
Mobile ad hoc networking, routing, security, wormhole, shortest path, RTOS, Real time application
1. INTRODUCTION
Mobile ad hoc networks (MANETS) have a wide range of applications, especially in military
operations, emergency, e-commerce and entertainment. Mobile ad hoc networks are self
configuring network sometimes called mesh networks which form link by themselves. It
forwards the traffic also establishes a route by route request within its transmission range.
Hence it acts like a transmitter as well as a router. The route establishment is not static it is done
by dynamic ways. Hence these types of systems don’t have a centralized system. This leads to
the evolution of protocols bounded within a mobility range usually nodes which are placed only
few hops of each other. Different protocols are then evaluated based on packet drop rate,
overhead introduced by routing protocol, security etc. In this paper the security issue faced by
the routing protocol is taken into consideration. The routing protocol of mobile ad hoc networks
faces different security issues described in [2]. This paper concentrates on wormhole attack
described in [1]. The effect of wormhole attack creates a malicious node thereby deleting the
legitimate path. Many secure routing protocols against wormhole have been proposed in [3, 5,
6, 8, and 9] for an efficient routing on a general purpose routing environment. This paper focus
on local monitoring and isolation through cryptographic methods in a real time operating system
(RTOS) environment.
2. MANETS ROUTING PROTOCOL
Routing is an activity or a function that connects a call from origin to destination in
telecommunication networks and also plays an important role in architecture, design and
operation of networks. Ad-hoc networks are wireless networks where nodes communicate with
each other using multi-hop links. There is no stationary infrastructure or base station for
communication. Each node itself acts as a router for forwarding and receiving packets to/from
2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
131
other nodes. Routing in ad-hoc networks has been a challenging task ever since the wireless
networks came into existence. The major reason for this is the constant change in network
topology because of high degree of node mobility. A number of protocols have been developed
to accomplish this task.
Classification of routing protocols in MANET’s can be done in many ways, but most of these
are done depending on routing strategy and network structure. According to the routing strategy
the routing protocols can be categorized as Table-driven (Proactive) and source Initiated
(Reactive), while depending on the network structure these are classified as flat routing,
hierarchical routing and geographic position assisted routing. Both the Table-driven and source
initiated protocols come under the Flat routing.
2.1. Proactive Protocol
Each node maintains routing information to other nodes. The routing information is normally
kept in table. These table are updated whenever the network topology changes. Most flat routed
global routing protocols do not scale very well. The increase in scalability can be achieved by
reducing the number of rebroadcasting nodes. Some of the types of proactive routing protocols
are DSDV (Destination sequenced distance vector), WRP (Wireless Routing Protocol).
2.2. Reactive Protocol
In this case the topology information is transmitted by nodes on demand. Whichever node wants
to transmit will flood a route request in the network. A route establishment is created if the
request is received by the destination or through the intermediate route. The most popular
reactive algorithm is AODV (Ad-hoc On Distance Vector). As long as the route lasts it is in
active state when- ever it loses it path again RREQ is sent.
3. SECURITY THREATS TO ROUTING PROTOCOLS
3.1. Modification
The attack tries to modify the data by doing packet misrouting. The attack will do
impersonation and spoofing.
3.2. Fabrication
Sleep deprivation is one of the attacks in mobile ad hoc networks which put the battery in
exhaust condition. The attacker tries to consume the batteries of a node.
3.3. Interruption
An intruder tries to drop packets during forwarding of packets. One more attack is flooding of
packets.
3.4. Interception
Black hole attacks and worm hole attacks. Out of these attacks this paper evaluate wormhole
attack scenario.
4. WORM WHOLE ATTACK
Wormhole attack is the most severe attack in MANET routing. Figure 1 depicts a small
wormhole scenario. In this type two or more nodes collaborates each other thereby creating a
3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
132
Figure 1. Wormhole Scenario
shortcut between the packets through that link. The packets are forwarded between the
malicious nodes by encapsulation. Also forwarding the packets through additional hardware like
wired link and directional antenna. It can be launched in two modes hidden mode and
participation mode. Wormhole attacks can be used to drop packets. They are extremely difficult
to detect. Encryption or authentication cannot able to protect against hidden- mode worm holes
because malicious node won’t read or modify the packets it simply forwards. Participation
modes are very difficult to launch once they are launched.
5. RELATED WORK
In [1] wormhole scenario is explained. A wormhole is created in the mobile ad-hoc network
which can able to defend against any type of countermeasures. This attack can create a
malicious path even if the attacker has not malpractice the other host that is even if the other
hosts path is good. Similarly the attack can happen even if there is a good encryption and
decryption is happening.
In [2] surveys the types of complex wormhole attack in wireless
Ad-hoc networks. This paper refers attacks like spoofing, eaves dropping and packet leashes. In
this paper the wormhole is identified as two phase process launched by one or several malicious
nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them.
In the second phase, wormhole nodes could exploit the data in variety of ways. The wormhole
attack mode and classes, and point to its impact and threat on ad hoc networks.
In [3] two algorithms were proposed which will eliminate the wormhole attack faced when the
ad-hoc network is in mobility state called MOBIWORP. In this paper there is a special node
called Central Authority (CA) which monitors the node locally and if any malicious activity
occurs it isolates the node globally.
In [4] the wormhole attack is detected using the topology changes. This paper does not
concentrate on special hardware or artefacts for finding the attacks. The algorithm is
independent on wireless communication models. The proposed algorithm detects the wormhole
by using the information collected in the upper layer like routing layer. The detection algorithm
looks for forbidden structures which are not present in the legal connectivity.
Work [5] introduces a light weight counter measure for mobile ad-hoc networks (LITEWORP).
This algorithm listens to the neighbour node. In this algorithm every malicious node is detected
and isolated and it’s specially concentrates on resource constraints.
Work [6] examines the wormhole attack in WAHAS (Wireless Ad-Hoc and Sensor networks).
This paper introduces a protocol called SECOS which provides a secure route between any two
A
B
C
D
M1
M2
Malicious path
Legitimate path
M1 M2 Malicious nodes
4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
133
nodes despite of compromise of any number of other nodes. The algorithm uses a low key-
management and authentication technique
Work [7] mainly concentrates on a specific local monitoring when the ad-hoc network is
vulnerable to stealthy packet dropping. The stealthy packet dropping do a packet dropping by
intermediate node by avoiding the packets to reach the destination. This creates as if the
malicious node is performing a legitimate action thereby creating a suspicious to the legitimate
path. Here there is a protocol called DISA (Detection and Isolation of sneaky attackers in
locally-Monitored Multi-hop wireless networks).
Paper [8] proposed an efficient algorithm called (Wormhole attack prevention algorithm) WAP.
This algorithm avoids the use of specialized hardware. It first monitors the neighbour nodes by
using timer and by maintaining a neighbour node table. The next phase of work is to detect the
wormhole route by flooding the RREQ and getting the false route reply.
Paper [9] runs the AODV in a secure way. The AODV is made to run against wormhole attack.
A mechanism called Wormhole Attack Detection Reaction (WADR) is made to run with
conventional AODV. This paper reduces overhead and the packet loss caused by malicious
nodes.
Paper [10] proposed a concept of monitoring nodes only as end - to -end instead of monitoring
each corresponding neighbour node in a multi-hop environment. Hence the proposal will only
look after the source and destination path and it reduces overhead mechanism. The proposed
algorithm is cell based open tunnel avoidance (COTA) to manage the information. COTA
achieves an equal space for each node between the source and destination through geographic
information. The proposed algorithm can be combined with existing routing algorithm to protect
the MANETS against wormhole attacks.
Paper [11] analyzes the obstacle faced in the conventional cryptographic methods because the
wormhole attack cannot be defeated as the malicious nodes do not send separate packets. In this
paper, we present a cluster based counter-measure for the wormhole attack which alleviates
these drawbacks and efficiently mitigates the wormhole attack in MANET.
6. RTOS (Real Time Operating System) BASED SECURITY ALGORITHM
Already existing routing algorithm is made to run on a geographical area of few kilometres.
Since the area is small the nodes assumed to be less.
A wormhole scenario will be created. The malicious activity created by the wormhole attack
will be monitored and the malicious node will be isolated
The idea of shortest path algorithm will be studied. A probabilistic method of analysis will be
studied
The cryptographic analysis will be made to run in a real time environment using a real time
operating system.
7. PROPOSED WORK
i) Traditional AODV is made to run on the system.
ii) Wormhole scenario is created and monitored.
iii) Node Isolation.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
134
8. WORK COMPLETED
The following code describes the traditional AODV. This program deals with 20 nodes. The
nodes are placed by using a random number generator and the nodes are assumed to be
transmitting randomly. Node 1 is taken in to consideration and is distributing the signal to the
nodes whose minimum distance is 1.
8.1. MATLAB SIMULATION
8.1.1. Node Distribution
A=randint (20);
% Making matrix all diagonals=0 and A(i,j)=A(j,i),i.e. A(1,4)=a(4,1),
% A(6,7)=A(7,6)
for i=1:20
for j=1:20
if i==j
A(i,j)=0;
else
A(j,i)=A(i,j);
end
end
end
disp(A);
t=1:20;
%disp( ' a b ' )
disp(t);
disp(A);
status(1)='!';
dist(1)=0;
next(1)=0;
Figure 2. Node Distribution
Figure 2 explains the random integer matrix which contains matrix elements whose values
consists of only 1’s and zeros generated randomly for every t seconds of simulation. In order to
make the nodes to be distributed uniformly the diagonal elements are assumed to be 0. At time
t1 node 1 is assumed to distribute randomly to the corresponding nodes whose minimum
distance is 1 for the above Figure 2 the corresponding nodes are 2, 4, 8, 9, 10, 11, and 18. The
following code explains the node 1 transmission.
6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
135
for i=2:20
status(i)='?';
dist(i)=A(i,1);
next(i)=1;
disp(['i== ' num2str(i) ' A(i,1)=' num2str(A(i,1)) ' status:=' status(i) ' dist(i)=' num2str(dist(i))]);
for i=4
plot(i,A(i,1),'-mo')
end
flag=0;
for i=2:20
if A(i,1) == 1
disp([' node 1 sends RREQ to node ' num2str(i)
end
end
The above code explains the transmission of route request to the corresponding nodes whose
minimum distance A (i, 1) = 1. Hence the simulated output is as shown in Figure 3.
Output
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
Figure 3. Node 1 Transmission
8.1.2. Creation of Wormhole
Output
Our agenda is to create a wormhole so that the corresponding node which is going to act as a
wormhole will transmit the route request. Wormhole can be created in different methods we
have created the malicious node by increasing the power factor. Hence the modified code is
7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
136
for j = 0:1:3
power = power+1;
if power>1
flag = 0;
for i=2:20
if A(i,1) == 1
disp([' node 1 sends RREQ to node ' num2str(i)])
end
end
else if power>3
for i = 2:20
status(i)='?';
dist(i)=A(i,2);
next(i)=1;
disp(['i== ' num2str(i) ' A(i,2)=' num2str(A(i,2)) ' status:=' status(i) ' dist(i)=' num2str(dist(i))]);
end
end
end
end
for i = 2: 20
if A(i,2) == 1
disp([' node 2 sends RREQ to node ' num2str(i)])
end
end
Here an additional parameter power is included whose value is fixed to 3. Whenever the node
trying to transmit is going to have a power factor of more than 3 that corresponding node is
made to act as a malicious node and is going to perform malicious activity. In our case we have
made node 2 to be a malicious node. Hence the output will show node 1 activity till the power
factor becomes greater than 3. Also node will send the packets to its own destinations that got
their own minimum distance.
Output
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
node 2 sends RREQ to node 5
node 2 sends RREQ to node 6
node 2 sends RREQ to node 7
node 2 sends RREQ to node 8
node 2 sends RREQ to node 12
node 2 sends RREQ to node 14
node 2 sends RREQ to node 15
node 2 sends RREQ to node 16
node 2 sends RREQ to node 18
node 2 sends RREQ to node 19
8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
137
Figure 4. Wormhole Creation
Hence the above Figure 4 shows the malicious activity of node 2 when its i value is 3 since the
minimum distance is 0 for i = 3 node 2 is not transmitting to 3. But for i = 5 node 2 will transmit
because the minimum distance is 1 and the graph is as shown below in Figure 5.
Figure 5. Node 2 Transmission
9. NODE MONITORING
The next important issue is once the wormhole is created it needs to be monitored. This
operation is done using the combination of hardware and software. A counter is made to run at
a specific clock period while the nodes start transmitting. Whenever a malicious activity
happens at any clock period the counter starts incrementing and whenever its value exceeds the
maximum count the counter will set an alarm so that the malicious activity can be predicted
explicitly.
for k=0:1:5
counter = counter + 1;
if counter >3
for i = 2: 20
9. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
138
if A(i,2) == 1
disp(['couter value exceeds maximum hence malicious activity starts'])
plot(k, counter, '-mo')
disp([' node 2 sends RREQ to node ' num2str(i)])
%for i = 5
%plot(i,A(i,2),'-mo')
end
end
end
end
Output
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 5
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 6
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 7
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 8
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 12
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 14
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 15
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 16
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 18
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 19
10. NODE ISOLATION
The next step is once the wormhole is created and monitored we need to check how the
communication is taking place. It is well known that node should be permanently cut off from
the communication link at the time instant say t1. In the same time we are creating a path
between the malicious node and its corresponding receiving nodes. Hence only node 2 should
come in picture. Hence the above code has been modified and the node 1 communication is
stopped and node 2 only transmitting.
10. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
139
next(i) = 2
for newi= next(i)
count = count + 1;
if count >1
disp ([num2str(newi) 'sends RREP to ' num2str(i)])
%disp([ num2str(i) 'Sends message to node ' num2str(newi)]) end
end
end
end
end
end
Output
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
node 1 sends RREQ to node 2
node 1 sends RREQ to node 4
node 1 sends RREQ to node 8
node 1 sends RREQ to node 9
node 1 sends RREQ to node 10
node 1 sends RREQ to node 11
node 1 sends RREQ to node 18
node 2 sends RREQ to node 5
next =
0 1 1 1 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 6
next =
0 1 1 1 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1
6sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 7
next =
11. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
140
0 1 1 1 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1
7sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 8
next =
0 1 1 1 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1
8sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 12
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 1 1 1 1 1 1 1
12sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 14
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 2 1 1 1 1 1 1
14sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 15
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 2 2 1 1 1 1 1
15sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 16
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 2 2 2 1 1 1 1
6sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 18
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 2 2 2 1 2 1 1
18sends rep to node2
counter value exceeds maximum hence malicious activity starts
node 2 sends RREQ to node 19
next =
0 1 1 1 2 2 2 2 1 1 1 2 1 2 2 2 1 2 2 1
19sends rep to node2
12. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
141
CONCLUSION AND FUTURE WORK
The work will be formulated to an advanced mathematical concept. This can be extended to a
Wide area Network. This can be applicable to any wireless application. We can extend this
project to connect group of classroom, places and buildings apart from the calculated
geographical area.
ACKNOWLEDGEMENTS
The authors would like to acknowledge financial support of Council of Scientific & Industrial
Research (CSIR), Govt. of India.
REFERENCES
[1] Yih-Chun Hu, Adrian Perrig, Member, & David B. Johnson, (2006) “Wormhole Attacks in
Wireless Networks” IEEE Journal on selected areas in Communications, Vol. 24, No. 2.
[2] Mohit Jain &Himanshu Kandwal, (2009)“A Survey on Complex Wormhole Attack in Wireless
Ad Hoc Networks”. International Conference on Advances in Computing, Control, and
Telecommunication Technologies.
[3] Issa Khalil, Saurabh Bagchi & Ness B. Shroff, “MOBIWORP: Mitigation of the Wormhole
Attack in Mobile Multihop Wireless Networks”.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4198824
[4] Ritesh Maheshwari, Jie Gao &Samir R Das,” Detecting Wormhole Attacks in Wireless Networks
Using Connectivity Information”.http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04068262
[5] Issa Khalil, Saurabh Bagchi& Ness B. Shroff,(2007) “LITEWORP: Detection and Isolation of the
Wormhole Attack in Static Multihop Wireless Networks”. The International Journal of Computer
and Telecommunications Networking, Vol. 51, Issue 13, pp 3750- 3772.
[6] Issah Khalil,(2008)“Mitigation of Control and data traffic attacks in wireless ad-hoc and sensor
networks” IEEE Vol. 6, Issue 3, pp 344-362.
[7] Issa Khalil, Saurabh Bagchi, Najah AbuAli & M. Hayajneh, “DISA: Detection and
Isolation of Sneaky Attackers in Locally-Monitored Multi-hop Wireless Networks”
http://onlinelibrary.wiley.com/doi/10.1002/sec.152/abstract
[8] Sun Choi, Doo-young Kim, Do-hyeon Lee &Jae-il Jung(2008) “WAP: Wormhole Attack Prevention
Algorithm in Mobile Ad Hoc Networks” IEEE International Conference on Sensor Networks,
Ubiquitous, and Trustworthy Computing SUTC’08. pp 343- 348
[9] Emmanouil A. Panaousis, Levon Nazaryan & Christos Politis(2009) “Securing AODV Against
Wormhole Attacks in MANET” Proceedings of the 5th International ICST Mobile Multimedia
Communications Conference, Article 34.
[10] Weichao Wang ,Bharat Bhargava & Yi XiaoxinWu(2006) “Defending against Wormhole Attacks in
Mobile Ad Hoc Networks” Wireless Communications & Mobile Computing, Vol. 6, Issue 4,pp
483-503
13. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
142
[11] Debdutta Barman Roy, Rituparna Chaki, &Nabendu Chaki (2009) “A new `cluster-based wormhole
intrusion detection algorithm for mobile ad-hoc networks” International Journal of Network
Security & Its Application , Vol. 1, No.1.
Authors
Dr Ramesh pursued his B.E. Degree in Electrical and Electronics
Engineering at University of Madras, Chennai, and completed his M.E
degree in power systems Engineering at Annamalai University
Chidambaram. He received Ph.D degree at Anna University Chennai, and
has been a faculty of Electrical and Electronics Engineering Department
Of College of Engineering , Guindy, Anna University, Chennai since
2003. His areas of interest are Real –Time Distributed Embedded Control,
On-line Power System Analysis and solar power system.
Ms Gayathri pursued her B.E. Degree in Electrical and Electronics
Engineering at University of Madras, Chennai, and completed her M.E
degree in Embedded System Technologies at Anna University Chennai.
She is currently pursuing Ph.D at Anna University Chennai, and has been a
Teaching Research Associate of Electrical and Electronics Engineering
Department of College of Engineering, Guindy, Anna University, Chennai
since 2008. Her areas of interest are Real Time Operating Systems,
Cryptography and Network Security, and Nanotechnology.