This document discusses security considerations for a proposed marine communication network for fishermen. It outlines several potential security vulnerabilities at different layers of the network architecture, including physical, data link, network, transport and application layers. Specific issues for the marine environment are also discussed, such as signals crossing maritime borders, boats crossing borders, and spoofing of nodes like access points, customer premise equipment, smartphones and base stations. The document proposes that solutions are needed to address these security vulnerabilities and situational risks.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
This document summarizes a survey of security attacks and solutions in vehicular ad hoc networks (VANETs). It discusses several types of attacks that can occur in VANETs, including Sybil attacks, wormhole attacks, and spoofing attacks. It also reviews related work on VANET security and categorizes existing attacks. The document outlines security requirements for VANETs such as confidentiality, integrity, availability, privacy, and non-repudiation. It provides examples of how different attacks can be carried out and potential solutions to counter each type of attack.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
This document summarizes and reviews several techniques for secure clustering in vehicular ad hoc networks (VANETs). It first provides background on VANETs and discusses why secure clustering is important. It then reviews five specific secure clustering techniques that have been proposed: 1) using public key infrastructure for key management between cluster heads, 2) Shamir's secret sharing scheme for data authentication, 3) using threshold cryptography for decentralized certificate authorities, 4) establishing trust through physical/logical domain grouping, and 5) methods for secure message aggregation and using onion signatures. The document aims to provide a comprehensive understanding and comparison of these different secure clustering techniques to help guide further research.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Security attacks and solutions in vehicular ad hoc networks a surveypijans
This document summarizes a survey of security attacks and solutions in vehicular ad hoc networks (VANETs). It discusses several types of attacks that can occur in VANETs, including Sybil attacks, wormhole attacks, and spoofing attacks. It also reviews related work on VANET security and categorizes existing attacks. The document outlines security requirements for VANETs such as confidentiality, integrity, availability, privacy, and non-repudiation. It provides examples of how different attacks can be carried out and potential solutions to counter each type of attack.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
This document summarizes and reviews several techniques for secure clustering in vehicular ad hoc networks (VANETs). It first provides background on VANETs and discusses why secure clustering is important. It then reviews five specific secure clustering techniques that have been proposed: 1) using public key infrastructure for key management between cluster heads, 2) Shamir's secret sharing scheme for data authentication, 3) using threshold cryptography for decentralized certificate authorities, 4) establishing trust through physical/logical domain grouping, and 5) methods for secure message aggregation and using onion signatures. The document aims to provide a comprehensive understanding and comparison of these different secure clustering techniques to help guide further research.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document presents an abstract of a research paper that proposes a new trust-based lightweight authentication routing protocol for mobile ad hoc networks (MANETs). It aims to improve reliability and security in MANET routing. The protocol initially uses a multipath route discovery technique to select the most reliable path based on packet success ratio. It then calculates a global trust value for each node based on direct and indirect trust assessments. If a node's trust value falls below a threshold, it is authenticated using secret sharing. Simulation results show the proposed protocol improves reliability and security compared to existing routing approaches.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
This document proposes an efficient key management scheme (KTR) for wireless broadcast services that supports secure access control. KTR has three main advantages: 1) It supports all subscription activities like joining, leaving and changing programs. 2) A user only needs one set of keys for all subscribed programs instead of separate keys for each program. 3) KTR identifies the minimum set of keys that need to be changed when a user's subscription changes to minimize rekey costs. Simulations show KTR can save about 45% of communication overhead and 50% of decryption costs compared to logical key hierarchy approaches.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
A comparative study of black hole attack in manet 2IAEME Publication
This document discusses security issues in mobile ad hoc networks (MANETs) and compares solutions to the black hole attack. It begins by defining MANETs and explaining that they rely on cooperation between nodes, making security an important concern. It then discusses different types of routing attacks against MANETs, focusing on the black hole, wormhole, and rushing attacks. Finally, it surveys existing solutions that have been proposed to detect and prevent black hole attacks in MANETs.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
The document discusses the need for network security on campus networks and some of the common risks faced at different layers of the TCP/IP model. It proposes using the SAPPDRR dynamic security model, which incorporates risk analysis, security policies, defense systems, real-time monitoring, response, disaster recovery and countermeasures. The model aims to provide comprehensive security and stability for campus networks through active defense against threats.
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document presents an abstract of a research paper that proposes a new trust-based lightweight authentication routing protocol for mobile ad hoc networks (MANETs). It aims to improve reliability and security in MANET routing. The protocol initially uses a multipath route discovery technique to select the most reliable path based on packet success ratio. It then calculates a global trust value for each node based on direct and indirect trust assessments. If a node's trust value falls below a threshold, it is authenticated using secret sharing. Simulation results show the proposed protocol improves reliability and security compared to existing routing approaches.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
This document proposes an efficient key management scheme (KTR) for wireless broadcast services that supports secure access control. KTR has three main advantages: 1) It supports all subscription activities like joining, leaving and changing programs. 2) A user only needs one set of keys for all subscribed programs instead of separate keys for each program. 3) KTR identifies the minimum set of keys that need to be changed when a user's subscription changes to minimize rekey costs. Simulations show KTR can save about 45% of communication overhead and 50% of decryption costs compared to logical key hierarchy approaches.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
A comparative study of black hole attack in manet 2IAEME Publication
This document discusses security issues in mobile ad hoc networks (MANETs) and compares solutions to the black hole attack. It begins by defining MANETs and explaining that they rely on cooperation between nodes, making security an important concern. It then discusses different types of routing attacks against MANETs, focusing on the black hole, wormhole, and rushing attacks. Finally, it surveys existing solutions that have been proposed to detect and prevent black hole attacks in MANETs.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
The document discusses the need for network security on campus networks and some of the common risks faced at different layers of the TCP/IP model. It proposes using the SAPPDRR dynamic security model, which incorporates risk analysis, security policies, defense systems, real-time monitoring, response, disaster recovery and countermeasures. The model aims to provide comprehensive security and stability for campus networks through active defense against threats.
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
Albanese + Lutzke's Award Winning Sweetgrass Golf Club, Michigansamthomas01
The recently opened Sweetgrass Golf Club, Michigan. Measuring 7,300yds from the tips and 5,000yds from the forward tees it offers a stunning game of golf for all players.
This document provides guidance for public entities and non-profits on purchasing foreclosed homes owned by Fannie Mae using Neighborhood Stabilization Program funds. It outlines the "First Look" initiative which gives these buyers exclusive access to properties for the first 15 days on the market. It also describes benefits like waived or reduced earnest money deposits, extended due diligence periods, and discounted purchase prices required by the NSP. The document provides an overview of the NSP and guidance on identifying suitable properties, making offers, conducting appraisals, finalizing contracts, and closing on purchases. Contact information is provided for Fannie Mae representatives who can assist with the process.
Spain, Brazil, and Saudi Arabia are three countries mentioned in the document. No other details are provided about these countries or their relationship to each other within the given text. The document only lists the names of these three countries without any other context.
A UTOMATIC L OGO E XTRACTION F ROM D OCUMENT I MAGESIJCI JOURNAL
Logo extraction plays an important role in logo ba
sed document image retrieval. Here we present a
method for automatic logo extraction from the docum
ent images that works for scanned documents
containing a logo. Proposed method uses morphologic
al operations for logo extraction. It supports
extraction of a logo with its gray level and color
information
The document discusses Florida's Homeless Prevention and Rapid Re-Housing Program (HPRP). It provides details on HPRP grantees in Florida, including the amounts awarded to different counties and organizations. It also outlines how the state's grant will be distributed, including allocating $8.6 million to unfunded counties and $12.9 million in June 2009 based on a state formula. Contact information is provided for questions.
Este documento es una factura que detalla la venta de libros, cuadernos, cartulina y esferos a un cliente identificado por su cédula. La factura incluye el número de factura, los datos del cliente, los códigos y detalles de los productos vendidos, los precios unitarios y cantidades, los subtotales, el IVA y el total a pagar tras aplicar un descuento del 10%.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area
to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile
Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node
which is dynamically moves from one location to another location. Both attacks Active as well as Passive
attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as
compare to wired networks. In last few years many security and attacks issue are face many researchers in
MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks
and Packet modification attacks found in MANET. At the time of data communication all the above mentioned
attacks access data easily without permission. To solve the problem of attacks in MANET and secure data
communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks
on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid
algorithm for secure intrusion detection in MANET.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...IJNSA Journal
In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data tampering, crucial for secure communication in dynamic, resource-limited MANET environments. Our proposed system utilizes a combination of face and fingerprint biometrics for encryption, enhancing network security. Through testing, our system demonstrates a high authentication rate of 92.42% with minimal processing times: 0.042 ms for key generation, 0.019 ms for encryption, and 0.032 ms for decryption, based on a 1024-bit key size. These practical results showcase the resilience and efficiency of our secure system.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
The document proposes a technique to detect flooding attacks in MANETs using a multi-agent system. It begins by introducing MANETs and some of their vulnerabilities like flooding attacks. It then discusses using a multi-agent approach to both detect flooding attacks and maintain network resilience by identifying malicious nodes and using alternative routes. The paper presents an algorithm to optimally determine the number of agents to launch, detect flooding in message buffers, and avoid attacks by blocking malicious nodes and removing affected routes. Simulation results show the approach improves throughput, packet delivery ratio, and reduces end-to-end delay and packet drops compared to AODV.
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure solutions proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and dependence on energy efficiency.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure approaches proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and deployment environments.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...IJNSA Journal
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
This document summarizes a research paper on a Secure Adaptive Distributed Topology Control Algorithm (SADTCA) for mobile ad hoc networks. The SADTCA aims to organize nodes into clusters, distribute keys, and dynamically determine quarantine regions to mitigate spam attacks. It operates in four phases: 1) detecting malicious nodes, 2) forming clusters headed by cluster leaders, 3) distributing keys to secure communication, and 4) renewing keys periodically. The SADTCA analyzes energy consumption and communication overhead. It also introduces the Elliptic Curve Digital Signature Algorithm to generate highly secure keys with small sizes for authentication. Simulation results show the approach effectively defends against spam attacks while remaining feasible and cost-effective for mobile
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Similar to S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISHERMEN (20)
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISHERMEN
1. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
DOI: 10.5121/ijci.2015.4202 17
SECURITY CONSIDERATIONS IN A MARINE
COMMUNICATION NETWORK FOR FISHERMEN
Dhaneesh B Nair1
, Dhanesh Raj2
, Sethuraman Rao3
Amrita Center for Wireless Networks and Applications, Amrita School of Engineering,
Amrita Vishwa Vidyapeetham, Kollam, Kerala, India.
ABSTRACT
With the recent advancements in and popularity of wireless networks, the security based issues are also
increasing considerably. In this paper, we look at the data security and situational security vulnerabilities
in the communication network for fishermen at sea being developed by our research center. We are
proposing certain solutions and algorithms for avoiding some of the situations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution for preventing unauthorized users at
the maritime border, along with border alert and distress alert. The algorithms are implemented using a
network of MICAz motes.
KEYWORDS
MANET, ACTPC, CPE, AP, NOC
1. INTRODUCTION
Currently, Indian fishermen need to use either handheld wireless radio or satellite phones for
communication. Neither of these options are cost-effective. In addition, handheld radios are
broadcast based and their range is also restricted to LoS. Hence, no viable means of
communication exist for the majority of Indian fishermen when they spend several days together
at sea. For this reason, a project is underway at our research center to develop a communication
network to serve their needs. The project is titled Mobile Infrastructure for Coastal Region
Offshore Communications & Networks (MICRONet). The network will consist of clusters of
boats forming a wireless mesh network amongst them. These clusters will be connected to the
base station on the shore using hierarchical point to multi-point backhaul links based on Long-
Range (LR) Wi-Fi technology [2] [4]. Note that LR Wi-Fi uses TDMA MAC [3] [5]. The base
stations on the shore will be connected to the internet thereby providing internet connectivity to
the whole network. Each boat will have an Access Point (AP) to which the users in the boat will
connect their devices such as smart phones, laptops, etc., wirelessly. Some boats will have a CPE
(Customer Premises Equipment), which will provide the LR Wi-Fi backhaul link to the base
station on the shore. A Network Operations Center (NOC), used for proper authorization, tracking
and other network management services, will also be located on the shore. A boat may also act as
a base station and provide a P2MP link in order to extend the coverage of the backhaul network.
This is how hierarchical P2MP backhaul is achieved. A brief overview of the basic architecture is
shown in Figure 1.
Thus, whenever any user in a boat needs to communicate with the land base station, the data will
pass through the AP and one or more CPEs located on separate boats before it reaches the base
station on the shore. The boats are mobile at a speed of 8-15 kmph. This will result in boats
2. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
18
frequently joining and leaving the clusters which form the wireless mesh networks. This will also
mean CPEs associating and disassociating with the base stations frequently. Even though there
are several infrastructure nodes in this network such as APs and base stations, the dynamic nature
of both the access and the backhaul layers of the network make it susceptible to some of the
security issues prevalent in a MANET [6]. In addition, there are certain security considerations
that are specific to this application scenario. These pertain to both data security and situational
security. This paper describes all these issues in detail and also proposes solutions to some
situational security issues.
In our proposed communication network for fishermen at sea, an attacker boat can access or
change the wirelessly transmitted data, malicious nodes in the network can damage the network
topology and can destroy the communication, any attacker boat can route the transmitted data to
different destinations, etc. So, a proper security system is required for the proposed network. We
need to address the potential security vulnerabilities in the proposed network and provide
effective solutions for security drawbacks in different layers of protocol stack. In addition we
need to address situational security issues such as preventing unauthorized users at the maritime
border, border alert, distress alert, etc.
Figure 1. MICRONet Architecture
2. RELATED WORK
Since MANET suffers from lack of infrastructure, there are many security vulnerabilities in
MANET. These have been studied thoroughly over the years. In the case of MANET, there will
be different types of attacks [8] happening from Physical layer to Application layer.
Jiwen CAI [1] proposed an efficient algorithm for detecting black hole and gray hole attacks in
ad-hoc networks, which is tested using DSR protocol in ns-2 simulator. Here, they proposed a
path based method to overhear the next hop’s action and false positive rate is reduced by
establishing a collision rate reporting system. The paper presents an innovative approach for
detecting black hole and gray hole attacks by modifying the detecting threshold according to the
network overload and using cross layer design to improve the performance. They compared their
3. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
19
method to other strategies, and confirmed that their proposal provided better detection. We can
use a similar approach in this project to detect network layer attacks.
Mohammad Wazid [19] surveyed attacks at different layers and some of the available detection
techniques such as intrusion detection technique, Cluster based intrusion detection technique and
misbehavior detection through cross layer analysis. In the intrusion detection technique, every
node participates in the detection process. It has four functional modules such as Local data
collection module, Local detection engine, Cooperative detection engine and Intrusion response
module. In order to avoid the participation of every node, Cluster based intrusion detection
technique is established and to detect the cross layer attacks, cross layer mechanism is established
in misbehavior detection through cross layer analysis method. Some of the attacks analyzed in
this survey are applicable to our scenario.
Amol A. Bhosle [20] proposed a method for detecting black hole and wormhole attacks in routing
protocol AODV in MANET. In this, he has proposed a watchdog mechanism and a time of flight
technique for avoiding black hole attack and wormhole attack. The paper presents a good routing
algorithm for improving the data security. In modified AODV, each node needs to have more
memory and if transmission failure occurs in a node due to any reason, there is a chance for other
nodes to treat it like a misbehaved node.
J. Godwin Ponsaml [21] surveys the overall security challenges or issues and their solutions in
every layer in a communication path starting from physical layer to application layer in MANET
communication. In the physical layer, spread spectrum technologies such as FHSS or DHSS can
be used to prevent eavesdropping attacks. Traffic analysis is prevented by encryption at Data link
layer. LLSP is used to provide security at Link layer. SLSP is used to prevent DOS attack and
man in the middle attack. In network layer, ARAN is used to defend impersonation and
repudiation attacks. Security protocol SEAD is used against modification attacks. In Transport
layer, SSL protocol implements end to end security for a session. In the application layer,
firewalls can prevent many attacks. Also an IDS system can be used as a second line of defense.
From this survey, many security challenges and solutions pertinent to our scenario can be
identified.
Dr. M.S. Aswal [22] wrote a review paper discussing the challenges in Wireless Mesh Networks
and recommended some of the possible counter measures such as cryptography, pair-wise key
sharing and secure routing. Hariom Soni [11] surveys different routing protocols in MANET,
Mike Burmester [16] details about the route discovery security in MANET and talks about the
route discovery algorithm endairA. Satria Mandala [12] does a survey of the intrusion detection
algorithms in MANET. Sarvesh Tanwar [18] surveys various problems and security issues in ad-
hoc networks.
P. Visalakshi [17] discusses about the various security issues in MANETs and some of its
countermeasures. The paper describes about the behavior of malicious nodes. Then various
vulnerabilities in MANET like unsecured boundaries, compromised nodal threat, non-availability
of centralized management facility, limited power supply and scalability are discussed. Existing
security solutions such as traffic flow monitoring, trust, cluster based IDS and cross layer
detection mechanisms are evaluated. The paper describes some of the attacks and their solutions
and the authors are generalizing the MANET attacks.
U. Sharmila Begam [15] talks about secure intrusion detection systems in MANET and describes
a new intrusion detection technique, EAACK. B.Praveen Kumar [13] presented a survey on
different MANET security problems and different MANET routing protocols. Manjeet Singh [14]
surveys different types of attacks that are possible in MANET irrespective of different layers. K.
4. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
20
Muthukumaran [9] evaluates different issues and security vulnerabilities in different layers of
MANET. Alex Hinds [10] reviews different routing protocols for MANET.
Saloni Sharma [7] does an all round evaluation of different security issues and different routing
protocols and issues in MANET.
Based on these papers, we are analyzing various potential threats that can happen in the network
being formed at sea and also proposing solutions for certain situational security issues in the
communication network.
3. ISSUES IN THE COMMUNICATION ENVIRONMENT
3.1 Generic Attacks at Various Layers of MICRONet Architecture
3.1.1 Physical layer attacks
3.1.1.1 Jamming attack
The messages sent to the Access node or CPE can be lost or corrupted by jamming attack. The
attack is done by sending powerful radio signals to the Access node or CPE so as to block any
signals coming towards it.
3.1.1.2 Eavesdropping attack
From Smart phone to Access node or from CPE to CPE, any intruders can tune to the same
frequency and listen to the transmitted signals during message transfer.
3.1.1.3 Malicious message injecting
In this attack, attackers inject fake messages along with the actual message during the
transmission of the signals. Thus the functionality of the network will get interrupted by the
intruders.
3.1.2 Data link layer attacks
3.1.2.1 MAC Denial of Service attacks
Any attacking boat or node can continuously keeps the channel busy or the intruder can
continuously send unnecessary packets to any particular access node or CPE so as to drain its
battery.
3.1.2.2 Bandwidth Stealth
Congestion will happen in the network when an attacker steals a large fraction of the bandwidth.
3.1.2.3 Resource exhaustion
Intruder nodes make continuous repeated collision to drain the battery power.
3.1.2.4 WPA2 targeted attack
WPA2 is the strongest security protocol available for the wireless network. Still there are some
loopholes such as Hole196 to breach the security provided by the protocol.
5. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
21
3.1.2.5 Traffic monitoring
By monitoring the traffic flow, an intruder can perform analysis of the type of communication
happening in the network.
3.1.3 Network layer attacks
3.1.3.1 Flooding attack
Network performance degradation is done by continuously sending RREQ messages to any
particular node in a short duration of time by any attacker element or continuously engaging the
access node or CPE to work without an interval so as to exhaust the network resources and
bandwidth.
3.1.3.2 Routing table poisoning attack
Routing tables can be modified by any intruder so as to have improper routing and routing
towards any particular destination.
3.1.3.3 Sleep deprivation attack
By asking for non-existing node destinations, any attacker node can waste the resources like
bandwidth and battery power of any particular node.
3.1.3.4 Impersonation attack
Any attacker boat can impersonate as a registered boat and can cause attacks.
3.1.3.5 Node Isolation attacks
In this attack, isolation of the registered boats is done to prevent communication between boats.
3.1.3.6 Message modification
Modification of the transmitted message can be done by adding false stream of messages as
pulses along with the actual information.
3.1.3.7 Black hole attack
Any intermediate attacker node can act as an element in the routing path and can drop all the
packets passing through it.
3.1.3.8 Wormhole attack
In this type of dangerous attack, attacker node establishes a virtual high speed route to the
destination so that the attacker can take away and modify the data from the route without any
knowledge of the actual nodes.
3.1.3.9 Link Spoofing attack
The malicious nodes advertise fake route links to other nodes in order to disrupt routing
operations.
6. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
22
3.1.3.10 Byzantine attacks
In this attack, one or several malicious nodes form a group and produce combined attacks.
3.1.4 Transport layer attacks
3.1.4.1 TCP session hijacking
The malicious node takes the characteristics of the victim node by spoofing its IP address and
steals the information communicated with the victim node.
3.1.4.2 Jelly Fish attack
This attacker gets into the routing path and drops or delays the packets passing through it. Thus it
causes packet drops, delay or jitter at the receiver.
3.1.5 Application layer attacks
3.1.5.1 Repudiation attack
Due to this attack, whole communication is affected from denial of participation.
3.1.5.2 Attack by virus and worms
Operating system installed in CPE and access node can be affected by virus and worms.
3.2 Issues Specific to MICRONet Marine Communication Environment
3.2.1 Signal crossing the maritime border
In the case of boats close to the maritime border, signals going from the boat can go beyond the
maritime border, since the transmission range of each antenna will be very high due to the usage
of Long range Wi-Fi technology. Thus, the signals going out of the border can be accessed by
malicious people from any neighbouring country. Also, boats from neighboring country will be
able to access the internet connection provided from the shore assuming they could somehow
authenticate themselves. Thereby, neighboring country boats will be able to access certain sites
that should be accessible only within the country.
3.2.2 Boats crossing the maritime border
Fishing boats will be moving deep into the sea so that if the boats don't get any maritime border
information, there is a high chance for the boats to cross the maritime border.
3.2.3 On-boat AP attacks
3.2.3.1 Local Wi-Fi security attacks
Communication between smart phone and access node takes place by short range Wi-Fi
technology with WPA2 as the security protocol and will be facing the common security issues.
3.2.3.2 AP Spoofing
Attacks like Hole 196 can happen in the network which is due to spoofing of AP by any of the
users in the boat or by any malicious node nearby.
7. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
23
3.2.4 Off-boat AP attacks
3.2.4.1 AP Spoofing
3.2.4.2 Delaying of packets
Packets from other boats can be delayed by the boats in the routing path while having on-boat AP
to off-boat AP connection.
3.2.4.3 Attacks like Black hole and Wormhole attacks
While routing packets from any source boat to destination server, the nodes like boat APs or
CPEs can drop, modify or mislead the packets.
3.2.5 Cluster forming by malicious boats
Attackers can form a boat cluster as in the MICRONet architecture and can make other boats
believe that it is a registered cluster and can produce attacks.
3.2.6 Physical distress
3.2.6.1 Attack by intruders in a registered boat
When some people with malicious intention get into a registered boat, they will be able to route
their own packets through the access node of the boat. Also, they can capture packets passing
through the router.
3.2.6.2 Natural issues happening to boats
Problems such as boat sinking, fire in the boat, etc can damage the boat and cause node failure.
3.2.7 CPE, Access node, Smartphone and Base station spoofing
Each of the nodes in the network such as CPE, Access node, Smartphone and base station can get
spoofed by any malicious nodes.
3.2.8 Attacks in the AP to AP and AP to CPE transmission path
Any intruder nodes can produce attacks on the transmission path in the network.
3.2.9 Problem with the TDMA approach
Different CPEs contact the onshore base station using TDMA approach. In the centralized TDMA
approach, one central coordinator node takes full responsibility for coordinating transmission in
the whole network. So, by controlling the particular node, any malicious intruder can take control
of the data flow of all other boats.
4. SOLUTIONS TO SOME SITUATIONAL SECURITY ISSUES
4.1 Adaptive Context-aware Transmission Power Control (ACTPC)
In order to prevent unauthorized access by intruders, as described in section 3.2.1, it is a good
idea to ensure that the data traffic does not cross the maritime borders of the country. We do this
by dynamically adjusting the transmission power level by sensing the location of the maritime
8. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
24
border and the locations of neighboring boats with respect to the maritime border. The algorithm
used for this is Adaptive Context-aware Transmission Power Control (ACTPC).
There are two scenarios to consider. (i) When a boat acts as a base station to increase the range of
the backhaul network. In this case, it is trying to serve boats that are in between itself and the
maritime border. (ii) When a boat close to the maritime border is part of a wireless mesh network
formed by a cluster of boats, i.e. access points. Scenario (i) is much more critical than scenario
(ii). This is because while the backhaul link is expected to span 10-15 km, the wireless mesh
network is expected to have a radius of 100-500 m. Refer Figure 1, Figure 2 and Figure 6.
Note that while the nodes in the backhaul network will have directional sector antennas, the nodes
in the access network (wireless mesh network) will have Omni-directional antennas.
The proposed algorithm for scenario (i) works as follows:
a) All the boats being served by a base station (which could also be a boat) calculate their distance
from the maritime border and send it to the base station at regular intervals (d(S_B)). For the sake
of efficiency, they could piggy-back this information on some other control frame such as PS-Poll
frame. The algorithm for calculating the distance from the maritime border is explained in section
4.1.1.
b) The base station boat calculates its distance from the maritime border (d(R_B)) using the
distance calculation algorithm.
c) Then it calculates the difference value, d(S_R) of different boats and checks whether it is less
than its distance from maritime border and calculates the maximum d(S_R) value, Max(d(S_R)
such that it is less than its own distance from maritime border.
i.e., Difference, d(S_R) = Base station boat's distance from the border – CPE boat's distance from
the border, as in Figure 2.
So, d(S_R) = d(R_B) – d(S_B)
d) Then the base station sets its transmission power level such that its range extends to
Max(d(S_R)). An appropriate fade margin may be incorporated to account for the channel fade
conditions.
The proposed algorithm for scenario (ii) is as follows:
a) The boats (access points) within a wireless mesh network exchange their distance from the
maritime border at regular intervals preferably piggy-backing on a control message.
b) When a boat wants to send data back to the shore, it ensures that its nearest neighbor towards
the shore is closer to it than its own distance from the maritime border and controls its
transmission power level to reach its nearest neighbor towards the shore.
i.e., Difference, d(S_R) = Neighbor boat's distance from the border – Sender boat's distance from
the border.
So, d(S_R) = d(R_B) – d(S_B)
S adjusts its transmission power level to cover Min(|d(S_R)|) provided.
Min(|d(S_R)|) < d(R_B) AND d(S_R)) > 0
c) If it does not find any neighbor within that range, it does not transmit any data. Instead, it
generates an alarm to notify the boat to move further away from the maritime border towards the
shore. This could be an audio or visual alarm or a combination of the two.
9. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
25
Figure 2. Cluster of boats near the Border Figure 3. Variation of Border distance
4.1.1 Distance Calculation Algorithm
Every boat will be having on-boat GPS device for finding its location. So, using the GPS device,
every boat will be getting its location co-ordinates (latitude and longitude co-ordinates). The
maritime border for a country is always fixed and constant. Also, the border is not a straight line,
which will be a well defined imaginary curve through the sea (Figure 3). When a CPE associates
with a base station, it will get the maritime border segment corresponding to that region as an
array of coordinates. Thus by knowing the maritime border co-ordinates and its current location
co-ordinates, a boat will calculate its displacement from the maritime border by doing a binary
search of the array of maritime border coordinates. The algorithm is described below:
a) Initially, choose the coordinates of the middle element of the array of border co-ordinates and
calculate the distance from the co-ordinate to the boat.
b) Then, choose the immediate left and right co-ordinate points of the middle element and
calculate the distance to those points.
c) If the distance of any one side is lesser, then continue with that half of the border.
d) Take the selected half as the whole border to be considered and perform steps (a) to (c) until
the time you are left with an array size of 1 or 2 for the border.
e) If the array size is 1, calculate the distance of the boat from that point. If there are two points in
the array, take the mean of the two distances.
4.2 Distress Alert
There can be different physical distress situations that can happen in a boat, as described in the
previous section and the following procedure is used for broadcasting alert signals to all other
boats and to the shore. Whenever any intruders get into the boat or any other distress situation
arises, the fishermen can trigger an alarm by launching an app on their smart phone. This alarm
message will be broadcast through the access node and CPE in the boat to every other registered
boat at maximum power level. The alarm message will contain the type of alarm and the GPS
coordinates of the boat under attack in addition to some other information. Thus, all other boats
will learn about the attack on the particular boat and will relay the message to the appropriate
security personnel through the base station. They will also stop routing their traffic through that
boat by removing the particular boat’s id from the forwarding tables. Refer Figure 4.
10. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
26
4.3 Border Alert
The distance from the maritime border will be periodically calculated using the distance
calculation algorithm mentioned above and using that, whenever the distance from the border is
less than a threshold value, say 100m, the boat will be alerted using an alarm in the boat as shown
in Figure 5. This could be an audio or visual alarm or a combination of the two.
Figure 4. Distress alert flowchart Figure 5. Border alert flowchart
4.4 Other common solutions
a) WPA2 security protocol is used for authentication and encryption, which will avoid node id
spoofing attack, and other message decoding attacks.
b) Whenever an external unregistered boat is identified by a registered boat, it will send the
information to NOC and all other boats.
c) Some of the physical layer attacks can be prevented by spread spectrum techniques.
d) Link layer attacks can be avoided by WPA2 encryption.
e) SAODV routing protocol can be used to prevent some of the network layer attacks.
f) In application layer, firewalls can effectively provide better security.
5. IMPLEMENTATION AND RESULTS
The algorithms for ACTPC, distress alert and border alert were implemented with the help of
MICAz motes and MIB 520. We tested it with different number of nodes under various situations
such as Sender boat having different distant neighbors, nodes facing distress condition, boat
reaching nearer to the border and were able to successfully evaluate the scenario proposed. For
the implementation, we have taken four different nodes, Sender node (node which needs to send
the data), Receiver nodes (nodes which are in closest range to the Sender node), Receiver_0,
Receiver_1, and Receiver_2 having node id’s 1, 5, 2 and 4 and corresponding distance from the
Maritime Border, 10, 5, 15 and 16. Each MICAz mote has its Power levels starting from 3 to 31
corresponding to the power levels -25 dBm to 0 dBm as shown in Table 1. The subset of
implementation contains ACTPC algorithm procedures (Figure 6).
11. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
27
Every particular occurrence of the events will be shown by blinking appropriate LED. Initially,
Sender node sends an ’init’ message showing its request for establishing a route through any of
the Received nodes. After getting the request, Receiver nodes acknowledge the signal received.
The acknowledgement signals sent out by the Receiver nodes to Sender node will also be having
their corresponding distance values from the maritime border.
Figure 6. Main steps in ACTPC Algorithm
But the reply of Receiver node_0 will be received by Sender node initially since it is the nearest
node. Then the Sender node takes the difference between Receiver node’s distance and Sender
node’s distance and since it is negative (so, by sending data to the node will let the data to go
towards the Border), the Sender node will not send the data to the Receiver node_0. Then, Sender
node will get acknowledgment from Receiver node_1.
After calculating the difference, Sender node finds that it is between Sender node and shore. Then
the Sender node will send its data from minimum to maximum power levels to the Receiver
node_1 to arrive at the optimum power level. This value along with the corresponding distance of
the neighbor is cached by the Sender for later use. The acknowledgment coming at a later time
from the Receiver node_2 will be discarded as the Sender node already found the nearest node for
sending its data. After reception, Receiver node_1 forwards the data to the Receiver node_2 for
sending towards the shore. After 25 seconds of time, it is assumed that some distress event
occurred in the Receiver node_1. So, it will broadcast the distress alert to all other nodes with
maximum power and will stop further reception. After reception of the alert signal, all other
nodes will forward the alert signal towards the shore. After analyzing occurrence of some distress
event in the Receiver node_1, the Sender node will stop transmitting towards Receiver node_1
and starts forwarding data to the Receiver node_2.
12. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
28
Table 1. Discrete power Table 2. Actual output Table 3. RSSI readings w.r.t levels of
MICAz mote readings actual power levels
After 30 seconds from the starting of communication, it is assumed that Receiver node_0 has
reached towards the border. That is, the border distance from the Receiver node_0 will be less
than 100m. The Received Signal Strength Indicator (RSSI) readings as seen by the Sender mote
along with Transmit Power level to reach the particular Receiver mote will be calculated and sent
through UART to Cutecom interface in TinyOS operating system. There is an inverse correlation
between the distance of the neighbor and the RSSI of the received signal. Thus at the time of
reception of any signal by the Sender node, by looking at the Cutecom display screen, we will be
able to see the RSSI readings and its corresponding Transmit Power level readings. The output
readings with respect to MICAz power level and RSSI (dBm) value are shown in Table 2. The
readings and corresponding graph of RSSI and Transmit Power obtained after the experiment are
shown in Table 3 and Figure 7 respectively. RSSI From the Transmit Power v/s RSSI graph, we
can see that as the RSSI value decreases, the Transmit power increases.
Figure 7. Transmit Power v/s RSSI graph
Thus, as shown by our implementation using MICAz motes, by using the Adaptive Context-
aware Transmission Power Control algorithm, we can make the communication network of
fishing boats more secure and robust against intrusions and other types of attacks.
13. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
29
6. CONCLUSION
Marine Communication Network for fishermen has many security issues and some of the major
situational and data security issues and solutions were described. The proposed solutions for some
situational security issues include Adaptive Context-aware Transmission Power Control
(ACTPC) algorithm, distress alert and border alert mechanisms. ACTPC algorithm prevent boats
from neighboring countries from accessing the internet service provided by this marine network.
Border alert and distress alert mechanisms serve to improve the situational security of boats.
ACKNOWLEDGEMENT
This project is partly funded by a grant from Information Technology Research Agency (ITRA),
Department of Electronics and Information Technology (DeitY), Govt. of India.
REFERENCES
[1] Jiwen Cai; Ping Yi; Jialin Chen; Zhiyang Wang; Ning Liu, "An Adaptive Approach to Detecting
Black and Gray Hole Attacks in Ad Hoc Network, "2010 24th IEEE International Conference
on Advanced Information Networking and Applications”, April 2010
[2] Ab-Hamid, K.; Chong Eng Tan; Sei Ping Lau, "Self-sustainable energy efficient long range WiFi
network for rural communities," GLOBECOM Workshops (GC Wkshps), 2011 IEEE, vol., no.,
pp.1050,1055, 5-9 Dec. 2011
[3] Panigrahi, D.; Raman, B., "TDMA Scheduling in Long-Distance WiFi Networks," INFOCOM 2009,
IEEE , vol., no., pp.2931,2935, 19-25 April 2009
[4] Sheth, A.; Nedevschi, S.; Patra, R.; Surana, S.; Brewer, E.; Subramanian, L., "Packet Loss
Characterization in WiFi-Based Long Distance Networks," INFOCOM 2007, 26th IEEE International
Conference on Computer Communications, IEEE, pp.312, 320, 6-12 2007
[5] Rabin Patra, Sergiu Nedevschi, Sonesh Surana, Anmol Sheth, Lakshminarayanan Subramanian, Eric
Brewer, “WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance
Networks”, 4th USENIX Symposium on Networked Systems Design & Implementation, 2007
[6] IETF MANET work group. http://www.ietf.org/dyn/wg/charter/ manetcharter.html
[7] Saloni Sharma, Anuj Kumar Gupta “A Comprehensive Review of Security Issues in Manets”,
International Journal of Computer Applications (0975 – 8887) Volume 69– No.21, May 2013
[8] L.D. Zhou; Z.J. Haas, Securing Ad Hoc Networks[J], IEEE Network, 13(6), 1999.
[9] K. Muthukumaran, D. Jeyakumar, C. U.Omkumar “A Concise Evaluation of Issues and Challenges in
MANET Security”, International Journal of Emerging Technology and Advanced Engineering,
Volume 3, Issue 9, September 2013
[10] Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi “A Review of Routing
Protocols for Mobile Ad-Hoc NETworks (MANET)”, International Journal of Information and
Education Technology, Vol. 3, No. 1, February 2013
[11] Hariom Soni, Preeti Verma “A Survey of Performance based Secure Routing Protocols in MANET”,
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),
Volume 2, Issue 1, January 2013
[12] Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah “A Survey on MANET Intrusion Detection”,
International Journal of Computer Science and Security, Volume (2): Issue (1), February 2008
[13] B.Praveen Kumar, P.Chandra Sekhar, N.Papanna and B.Bharath Bhushan “A SURVEY ON MANET
SECURITY CHALLENGES AND ROUTING PROTOCOLS”, P Chandra Sekhar et al,
Int.J.Computer Technology & Applications, Vol 4 (2), 248-256, 2013
[14] Manjeet Singh, Gaganpreet Kaur “A Surveys of Attacks in MANET”, International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, 2013
[15] U. Sharmila Begam, Dr. G. Murugaboopathi “A RECENT SECURE INTRUSION DETECTION
SYSTEM FOR MANETS”, International Journal of Emerging Technology and Advanced
Engineering, Volume 3, Special Issue 1, January 2013
[16] Mike Burmester, Breno de Medeiros, "On the Security of Route Discovery in MANETs" IEEE
Transactions on Mobile Computing, vol. 8, no. 9, pp. 1180-1188, September 2009
14. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
30
[17] P.Visalakshi, S.Anjugam “Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-
A Survey”, International Journal of Computational Engineering Research, ISSN: 2250-3005 National
Conference on Architecture, Software system and Green computing, 2013
[18] Sarvesh Tanwar, Prema K.V. “Threats & Security Issues in Ad hoc network: A Survey Report”,
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Vol.2, 2013
[19] Mohammad Wahid, Rajesh Kumar Singh and R.H. Goudar “A Survey of Attacks happened at
Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques”, International
Conference on Computer Communication and Networks CSI-COMNET-2011
[20] Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre “Black-Hole and Wormhole Attack in
Routing Protocol AODV in MANET”, International Journal of Computer Science, Engineering and
Applications (IJCSEA) Vol.2, No.1, February 2012
[21] J. Godwin Ponsam, Dr. R. Srinivasan “A Survey on MANET Security Challenges, Attacks and its
Countermeasures”, International Journal of Emerging Trends & Technology in Computer Science
(IJETICS) Volume 3, Issue 1, January – February 2014
[22] Dr. M.S. Aswal, Paramjeet Rawat and Tarun Kumar “Threats and Vulnerabilities in Wireless Mesh
Networks”, International Journal of Recent Trends in Engineering, Vol 2, No.4, 2009
AUTHORS
Dhaneesh B Nair received his B.Tech degree in Electronics and Communication
Engineering from Musaliar College of Engineering and Technology, Pathanamthitta,
Kerala, India in July 2013. He is currently pursuing M.Tech in Wireless Networks and
Applications from Amrita Vishwa Vidyapeetham, Kollam, Kerala, India.
Dhanesh Raj received M.Tech. in Wireless Networks and Applications from Amrita
Vishwa Vidyapeetham, Kerala and B.E. degree in Electronics and Communication
Engineering from Anna University, Chennai. Since then, he has been working as a
Research Associate in Amrita Wireless Networks and Applications at Amrita Vishwa
Vidyapeetham. His current research interests include Cellular Networks, Mobile
Communications and TVWS.
Prof. Sethuraman Rao is an associate professor at Amrita Center for Wireless Networks
and Applications, Amrita University, Kollam, Kerala, India. He holds a Masters degree in
Computer Science and a Bachelor's degree in Mechanical Engineering from IIT Madras,
India. He has over 20 years of international experience in the networking industry having
held technical and management positions at Juniper Networks, Alcatel-Lucent and a few
startups. His areas of interest include wired and wireless LANs, wireless security,
software engineering and network management.