Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
Security has become a primary concern in order to provide protected communication between
mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics
of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as
open peer-to-peer network architecture, shared wireless medium, stringent resource constraints,
and highly dynamic network topology. These challenges clearly make a case for building
multifence security solutions that achieve both broad protection and desirable network
performance. So,we focus on the fundamental security problem of protecting the multihop
network connectivity between mobile nodes in a MANET. We identify the security issues related
to this problem, discuss the challenges to security design, and review the state of-the-art security
proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
Security has become a primary concern in order to provide protected communication between
mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics
of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as
open peer-to-peer network architecture, shared wireless medium, stringent resource constraints,
and highly dynamic network topology. These challenges clearly make a case for building
multifence security solutions that achieve both broad protection and desirable network
performance. So,we focus on the fundamental security problem of protecting the multihop
network connectivity between mobile nodes in a MANET. We identify the security issues related
to this problem, discuss the challenges to security design, and review the state of-the-art security
proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
More Related Content
Similar to Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
All over the world breast cancer is a major disease which mostly affects the women and it may also cause death if it is not diagnosed in its early stage. But nowadays, several screening methods like magnetic resonance imaging (MRI), ultrasound imaging, thermography and mammography are available to detect the breast cancer. In this article mammography images are used to detect the breast cancer. In mammography image the cancerous lumps/microcalcifications are seen to be tiny with low contrast therefore it is difficult for the doctors/radiologist to detect it. Hence, to help the doctors/radiologist a novel system based on deep neural network is introduced in this article that detects the cancerous lumps/microcalcifications automatically from the mammogram images. The system acquires the mammographic images from the mammographic image analysis society (MIAS) data set. After pre-processing these images by 2D median image filter, cancerous features are extracted from the images by the hybridization of convolutional neural network with rat swarm optimization algorithm. Finally, the breast cancer patients are classified by integrating random forest with arithmetic optimization algorithm. This system identifies the breast cancer patients accurately and its performance is relatively high compared to other approaches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks
1. Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 582~590
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1. pp 582-590 582
Journal homepage: http://ijeecs.iaescore.com
Secure dynamic source routing protocol for defending black
hole attacks in mobile Ad hoc networks
M. Mohanapriya1
, Nitish Joshi2
, Mohit Soni3
1
Associate Professor, Coimbatore Institute of Technology, Coimbatore, India
2,3
B.E. Scholars, M.B.M. Engineering College, Jai Narayan Vyas University, Jodhpur, Rajasthan, India
Article Info ABSTRACT
Article history:
Received May 10, 2020
Revised Jul 13, 2020
Accepted Jul 27, 2020
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Keywords:
Ad hoc networks
Network security
Routing protocols
Wireless networks
Wireless sensor networks
This is an open access article under the CC BY-SA license.
Corresponding Author:
M. Mohanapriya
Department of Computer Science Engineering
Coimbatore Institute of TEchnology
Avinashi Rd, Civil Aerodrome Post, Coimbatore, Tamil Nadu, India 641014
Email: mohanapriya.m@cit.edu.in
1. INTRODUCTION
Ad hoc wireless networks, also known as infrastructure less networks operates without the support
of any centralized infrastructure. Ad hoc networks utilize multi-hop radio relaying for communication among
the nodes. Unlike cellular networks, ad hoc networks lack base station and hence depend on cooperation of
the participating nodes to enable communication among themselves. Hence, in this network, every node acts
as both host and router. Due to the mobility of nodes the network topology is also dynamic in nature. The
features of Ad hoc networks including user mobility and less overhead in deployment, makes itself suitable
for deployment in several areas [1]. It includes military operations, collaborative and distributive computing,
wireless mesh networks, wireless sensor networks, hybrid wireless networks, vehicular networks, critical
operations such as search and rescue, crowd control, commando operations and also in natural calamities like
tsunami, earthquakes etc., where infrastructure cannot be established. The main task in these networks is to
find a secure and shortest path between the source and destination nodes. All participating nodes in the
network should cooperate with each other to find such routes between any source and any destination. The
2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad… (M. Mohanapriya)
583
routing protocols of ad hoc networks are mainly categorized into proactive (Table-Driven protocol) and
reactive routing protocol (On Demand routing protocol) [2]. The focus of these protocols such as DSDV
(Destination Sequenced Distance Vector), AODV (Ad hoc On-Demand Distance Vector) and DSR (Dynamic
Source Routing), OLSR (Open Source Link State Routing) is to find a path with less number of hops
between source and destination. There is no security mechanisms incorporated in the protocols to check for
secure routes. Also due to the lack of centralized infrastructure such as firewalls, it is difficult to employ
existing security mechanisms of wired networks for verification of intruders or attacks in the network. One
solution to protect ad hoc networks from security attacks is to make the participating nodes itself to verify the
presence of intruders or to check for the possibility of attacks during communication. The ad hoc network
usually consists of resource constrained mobile nodes. Hence any proposed solution for the security attacks
should not be highly resource intensive which requires much processing by each node in the network.
The security attacks launched in MANET are called as passive and active attacks. When the
compromised nodes silently listen the traffic and learn valuable information such as originator and receiver
of the message, duration of communication and so on, then it is a passive attack. The active attackers in
addition to learning the traffic pattern also modify or drop the packets in the network. Some of the security
attacks launched on MANET are black hole attacks, Cooperative Black Hole attacks, Gray hole attacks,
Flooding Attacks, Routing Table Overflow attack, Wormhole attacks, and so on [3, 4]. When setting up the
MANET, the participating nodes are properly authenticated and have proper credential requirements for
being a part of the network. Hence these security attacks are mostly launched by malicious nodes that have
proper credentials to participate in the target network. Hence the security attacks launched by these nodes are
called inside attacks. Because the authorized nodes are the source of the inside attacks they are very hard to
detect. Black hole attack is an inside attack and it can be easily deployed on on-demand routing protocols like
AODV and DSR [5]. In reactive routing protocols, during the route set-up process, the source node broadcast
a control packet called RouteREQuest (RREQ) packets in the network. A RouteREPly control packet
(RREP) is sent back to the source host by any intermediate node only if it has a latest or shortest path to the
destination. Using the path information in RREP packet, the source host sends data packets to the destination
host. In black hole attack, the attacking node exploits this feature to its advantage. In black hole attack, the
attacker can redirect all the data packets to itself by sending false RREP packet advertising a shortest or latest
route to the destination host and then drops the data packets without forwarding it to the destination [6]. In
cooperative black hole attack, multiple attackers work in collusion and launch the black hole attack. This is to
avoid promiscuous monitoring or overhearing by other nodes when the attacker drops packet.
In this paper, a non cryptographic and a light weight technique called SEC-DSR is proposed for
detecting black hole attack in the network. In this method, every node in the ad hoc network when receiving a
RREQ packet, records the node ids contained in the route field of the RREQ packet. Also when an
intermediate node receives a RREP checks for the active participation of the replying node in the RREQ
forwarding process and decides whether the replying node is a black hole attacker or a normal node. Based
on its judgment, it assigns a weight value for the replying node and forwards the RREP. Similarly all
intermediate nodes in the RREP path, assigns a weight value for the replying node. When receiving the
RREP packet, the source node decides whether to select that route for data transmission or not based on the
cumulative weight value assigned. The black hole attack can be easily deployed on one of the commonly
used reactive routing protocols called Dynamic Source Routing protocol; hence the proposed method is
implemented and tested on DSR based ad hoc networks. The significant merit of the proposed method when
compared to other related works; it detects the black hole attack without any computational overhead and
also with minimum packet loss rate.
An accusation-based scheme was proposed in [7] where each node assign trust value for other nodes
in the network by continuous monitoring of neighbors and forwarding accusations to other nodes when it
detects an abnormal activity in its neighborhood. The malicious nodes certificates are revoked when the sum
of accusations is greater than a assigned threshold. This method of detection increases control packets
overhead in the network and also require promiscuous monitoring which results in fast depletion of energy in
nodes. Similarly in [8], the authors proposed a neighbourhood watch mechanism, which sends accusation
messages about suspected nodes to a predefined set of controller nodes. These controller nodes are
responsible for deciding whether a node is an attacker or not based on the incoming accusation messages. A
fuzzy based approach is proposed in [9] for trust prediction, by considering the previous data transmission
history of every node for predicting the trustworthiness of a transmitter node. But this approach needs
domain experts for tuning parameters and setting fuzzy rules. In [10], the authors proposed the concept of
maintaining a trust bias for each node by taking into account the weights associated with direct trust based on
observations and indirect trust based on recommendations by other nodes. Also the trust bias is adjusted and
minimized based on these two weights. In [11], the authors proposed a trust model for securing the network.
In this approach a decision for penalizing the malicious node is done using a voting scheme by other nodes in
3. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 582 - 590
584
the network. In [12] the authors used multipath forwarding technique to defend malicious packet dropping in
the network. However there is no mechanism suggested to identify the compromised nodes in the network. In
[13] a method proposed that involves only exchange of control packets to detect the black hole attack. In this
approach the source node confirms the validity of the RREP path by extracting the next hop node information
from RREP and confirms with the next hop node about its connectivity to the intermediate node that sends
the route reply and also with the destination. The approach used by the authors of [14] employs explicit
acknowledgements for fault detection. For every successfully received data packets the destination sends an
acknowledgement back to the source. In [15] a guarding mechanism is proposed for detection of black hole
nodes in the network. Here every node acts as a Guard node and maintains trust value for its neighbors and
for the route selected. The trust value for a neighbor is calculated both by direct observation and also by the
opinion of other nodes in the network. Promiscuous monitoring is employed by this approach which results
in higher energy consumption. In [16] an approach for black hole attack detection using AODV protocol is
proposed. Here the destinationsequence number value for a given RREP packet is verified by the source and
if it exceeds the calculated threshold, the replying node is taken as suspicious node. Then the source sends a
fake request packet with a non-existent destination address to the suspected node and checks whether it is
receiving the reply for that fake request packet from the suspected node. In [17] a solution using control
packets for malicious node detection is proposed. Before sending the data on the selected path, a data control
packet is sent to the path, in order to check the path validity. The black hole node present in that path will
drop the packet and in this way the malicious node is detected, else the path is chosen. Routing overhead is
higher in this approach. In [18] watch dog method is proposed for monitoring the transmission of next hop
neighbor. The approach increments the failure counts of the node if it does not forward the packet. The node
is marked as attacker when the failure count exceeds some threshold value and the information is intimated to
source node. In [19], an approach using timers and bait control packets is proposed for detecting black hole
attack. The bait timer of each is set randomly and each time the timer expires the node broadcasts a request
packet for a nonexistent node in the network. When the source node receives a RREP for the bait request it
immediately marks the replying node as a black-hole and adds it to the black-hole list. In [20], a voting
scheme for isolation of black hole nodes is proposed. The detection mechanism is divided into local and
global context. Decisions about suspicious activity from the local context are passed to global context and
based on the received information the global context punishes the suspicious node. In [21], The author
proposed TEMAODV which is an extension of Multipath Ad hoc on Demand Routing protocol that uses
local monitoring and control packets to establish two way trust on the route. In [22], the authors proposed a
promiscuous monitoring of neighbor nodes to detect packet dropping by malicious nodes in AODV protocol.
As it employs constant overhearing of neighborhood, the energy consumption of participating nodes in the
network will be higher. In [23] an trust method called ESCT is proposed to prevent security attacks. In
ESCT, each node makes the decision of suspected nodes by themselves and notify its direct neighbors. Then
each node perform cooperative detection and finds additional trust information to distinguish normal and
black hole nodes. Similar to our approach, ESCT employs self detection but then it notifies the trust
information to all nodes in the network for cooperative detection of the attacker that results in high overhead.
But in SEC-DSR, every node shares the trust information only with the source of the route to reduce control
packet transmission overhead.
2. RESEARCH METHOD
The proposed method extends the existing DSR protocol and makes them less vulnerable to black
hole attacks. The low processing speed, available processing capacity and power constraints of the ad hoc
nodes are taken into account in the proposed solution. The normal protocol operation of DSR for route
discovery is used in this method to identify the black hole attack. The assumption of the proposed solution is
that all the nodes are legitimate nodes with proper credentials for participation in the network. The other
assumptions are: If two nodes are in the coverage range of each other, then bidirectional communication is
possible; the source host and the destination host of the generated traffic are always trusted nodes.
2.1. Dynamic source routing protocol
The two main functionalities of Dynamic Source Routing Protocol are route discovery and route
maintenance. In the route discovery phase between any source and any destination, the Route Request
(RREQ) packets are broadcasted in the network. The RREQ packets are generated by the source host in need
of discovering a fresher route to a destination. When the destination receives the RREQ packet, it creates a
Route Reply (RREP) packet for the first RREQ it receives (shortest path) and sends it back to the source by
reversing the path information stored in the RREQ Packet. However, on receiving the RREQ, an intermediate
node also can create and send the RREP back to the source node if it has a path to reach the destination. The
4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad… (M. Mohanapriya)
585
DSR protocol also has Route maintenance phase where the link breaks are handled. A link break occurs after
establishing a route when a participating node in the route moves out of the transmission range of its
upstream neighbor. Then the upstream neighbor sends a route error (RERR) message back to the source
informing about the link break. The source node either forwards data using an alternate path available or if no
path available then initiates again the route discovery phase.
2.2. Proposed method
In the proposed work, any node receiving a RREP control packet will assign a weight to the
intermediate node that creates and send the Route Reply on behalf of any destination host. The proposed
method adapts the same approach followed by DSR for the route discovery process in the forward direction
i.e., from the source to the destination. As in Figure 1, initially any host needs to send data to any other host,
it broadcasts a RREQ packet to find route for that particular destination. The other nodes on receiving the
RREQ packet will either broadcast the RREQ packet, or drops the packet and send RREP if they have the
route to that particular destination. Also in the proposed method, all nodes maintain a table named as RREQ
forwarding table. The node receiving RREQ packets enters the node ids of particular source and destination
pair mentioned in the RREQ packet in the table along with the node ids of all the nodes involved so far in
forwarding the request packet. When a RREP comes for the corresponding RREQ, every node receiving the
RREP verifies if the replying node is an intermediate node or the destination node. If the reply is from an
intermediate node, then the nodes check in their RREQ forwarding table, whether the intermediate node is
involved in RREQ forwarding process for the same source and destination pair. If so, then it will be assigned
with the weight 1. If not, then the nodes receiving the RREP check in their table, whether the intermediate
node that generated the RREP is involved in RREQ forwarding process of any other source - destination pair.
If so, then its node id is present in the table, and hence it will be assigned with the weight of 0.5. As the
behavior of black hole node is to drop all RREQ packets it receives and to send a RREP immediately for
every RREQ it receives, the node id of the black hole node will not present in the RREQ forwarding table of
other nodes and the weight assigned for the black hole node by other nodes for forwarding the RREQ will be
always 0. For ex, the RREQ forwarding table maintained by node X is given in Table 1. From the cumulative
weight value assigned for the replying node, the source node calculates its trust value. If the trust value of the
replying node is below 0.5 threshold value, the source node drops the RREP packet and selects the next
RREP with assigned threshold value exceeds or equals 0.5. If the RREP comes from destination node, the
intermediate nodes forwarding RREP does not verify the table and directly assigns weight value 1 for the
replying node.
Figure 1. Route discovery phase
The routing tables maintained by each ad hoc node are periodically refreshed in reactive routing
protocols since the ad hoc network made up of mobile nodes and the network topology will be constantly
changing. Similarly the RREQ forwarding table maintained by the ad hoc nodes is also periodically refreshed
in order to observe the behavior of nodes from time to time. In Figure 1, The host with node id 1 broadcasts a
RREQ packet to discover route for another host with node id 9. The normal nodes receiving the RREQ
5. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 582 - 590
586
forwards the packet again until it reaches destination. But the black hole nodes 8 and 10 will immediately
send RREP claiming they are having path to reach node 9. Node 9 also sends a RREP back to the source
node 1. The route reply packet RREP from black hole node 10 reaches node 1 first. In the scenario given in
Figure 1, the source node is the next hop node for Node 10, hence the source node when it receives the
RREP, it checks its RREQ forwarding table and identifies that node 10 is not involved in any RREQ
forwarding process and hence assigns a weight of 0 to the replying node. Then for the RREP from another
black hole node 8, both the forwarding nodes 5 and 2 as well as the source node 1 adds the weight value as 0
in the RREP. The trust value calculated for the replying nodes 8 and 10 from the cumulative weight value is
below 0.5 threshold value, so the source node 1 ignores the RREP coming from them and selects the next
RREP coming from the destination node 9.
Table 1. RREQ forwarding table of Node X
Source Node in RREQ Destination Node in RREQ Nodes in RREQ Path
A
B
G
I
A,B,G,D
G, H, B,A,F
The cumulative weight value and trust value for the replying node is calculated as follows:
Cumulative weight value = ∑ (1)
In (1) Wij is the weight assigned by node i for the replying node j. Assuming k nodes in the RREP
path, k-1 intermediate nodes and the kth node as source node, i varies from 1 to k.
Trust Value of the Replying node j is calculated as follows by the source node:
Trust Value (Tj) = Cumulative Weight value / Total No. of nodes in RREP path (2)
If Tj>= 0.5, the route is selected for transmitting data packets; otherwise not selected. Procedure 1
depicts the function of intermediate nodes when receiving RREQ packets. Procedure 2 explains the function
of nodes when receiving RREP packets.
Procedure 1: Action of nodes in forwarding RREQ packets
if source host
Generate a RREQ control packet and broadcast it to find route to reach a particular host.
else if an intermediate node
if a RREQ packet is received
1) For the source–destination pair in the RREQ packet, enters the node ids in the RREQ path into the
RREQ forwarding table.
2) Check for the path to reach destination in its routing table.
a) If found, drop RREQ and send back a RREP back to the source node using the same route.
b) If not found, forward the RREQ to its neighbor nodes.
else if a black hole node
On receiving a RREQ, drops it send a RREP immediately to the source host in the same path from
where it receives the RREQ.
else destination node
Drops RREQ, create and send a RREP back to the source host.
end if
Procedure 2: Action of nodes when receiving RREP Packets
if not the source host (any other nodes)
When RREP packet is received
1) Checks whether the RREP is from the intended destination host or from any intermediate node.
2) if RREP is sent by an intermediate node:
a) Verify whether the replying node is involved in any RREQ forwarding process by
checking its RREQ forwarding table
b) Add to the existing weight value of the replying node a weight of 1, if the replying node is
involved in the RREQ forwarding process of the same source-destination pair.
6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad… (M. Mohanapriya)
587
c) If not, add a weight of 0.5 to the weight value of the replying node, if the replying node is
participated in RREQ forwarding process but for some other source-destination pairs.
d) If the replying node is not participated in any RREQ forwarding, add a weight of 0 and then
forwards the RREP.
3) else if reply is from the destination node
a) Add a weight of 1 to the existing weight value in the Route REPly packet and forwards it.
else if source host
On receiving a RREP packet
A. if reply from destination, send the data packets in the same path.
B. else if reply from an intermediate node
a) Add weight of 1 or 0.5 to the existing weight value of the replying node based on its
participation in the RREQ forwarding process.
b) Calculate Trust value (Tj) for the replying node (say node j) using formula (2).
c) If Tj>=0.5, the RREP packet is accepted and the data packets are transmitted in the same
path.
d) If Tj<0.5, the RREP packet is not accepted and the source host accepts the next RREP with
Tj>=0.5.
e) Initiates black hole node isolation process.
end if
2.3. Black hole node isolation
Once the source node concludes from the calculated trust value and suspects that the replying node
may be a black hole attacker, then it broadcast the suspected node id information to the entire network by
sending a BHN (Black Hole Node) packet. All nodes receiving the BHN packet, checks whether the node id
mentioned in BHN packet is recorded in its RREQ forwarding table, if not, it confirms the node as black hole
and remove its entry from its routing table and discards any packets coming from it. Subsequently, the
isolation of black hole nodes is collectively done in the network.
3. RESULTS AND DISCUSSION
Ns2 is used as the network simulation tool to validate the efficiency of the proposed method in the
presence black hole attack. 50 legitimate mobile nodes executing the proposed solution were randomly
distributed, and a couple of black hole attackers, are randomly selected to launch the attack. For simulation
the total coverage area used is 1500 X 1500 m2. Totally 50 mobile nodes are used as participating nodes in
the ad hoc network each following Random Mobility model for mobility. The nodes move in the speed of
20m/s. For the performance analysis, out of 50 nodes, 0 to 20 nodes are randomly selected as black hole
nodes for every simulation. 10 source and destination pairs are selected for generating data traffic. UDP-CBR
(Constant Bit Rate) is the data traffic type selected for data communication. An average of 10 experiments
results taken to represent the experimental data.
The performance of the proposed method is also compared with another approach, given in [23],
where every node detects the trust value on other nodes by itself. Similar to our approach, DSR is selected as
the routing protocol in [23]. The performance of the proposed work is evaluated using the metrics like Packet
Delivery Ratio, Routing overhead, End to End communication delay and Energy consumption. The energy
consumption by nodes is estimated using a wireless radio model as given in [23-25]. Let et and er be the
energy consumption measure of sender and receiver respectively. The value is measured in J/bit. The formula
for calculating the energy consumption in a node when transmitting a one bit data is given below:
= et + c. d2 (3)
In the (3), 'c' is the constant measured in J/bit/m2.
The distance d is set to 250m (transmission range of a node). The values of et and er are set to
50nJ/bit. Also the value of c is set to 10pJ/bit/m2 as recommended in [25]. The energy consumption for
receiving one bit data by a node is calculated as follows:
Erx = er (4)
Figure 2 shows the percentage of packets received by destination nodes in DSR, ESCT and in the
proposed approaches Secure DSR (Sec-DSR) under the same environmental setup. The packet delivery ratio
7. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 582 - 590
588
for DSR drops alarmingly with only 5 black hole nodes in the network. The black hole node attracts all the
data traffic towards itself and drops the data packets. So the packet delivery ratio of Dynamic Source Routing
Protocol is approximately 40% under attack. Both in ESCT and in Sec-DSR the packet delivery ratio is
approximately 90% even with 40 percent attackers inside the network. In our approach, the route will not be
strictly selected if the replying node not participated in any RREQ forwarding process. Hence PDR in our
approach is better than in traditional DSR and slightly improved over ESCT.
Routing overhead gives the percentage of control packets generated and forwarded for the total
number of data packets transmitted in the network. Under the attack the routing overhead in Sec-DSR is
around 20% which is an increase of 5% approximately when compared to DSR as shown in Figure 3. In Sec-
DSR there was no additional control packets transmitted during route discovery. Once the source evaluate
that the route reply packet is coming from a black hole attacker, then it will generate an additional BHN
packet and send to the network. Hence there is a slight increase in routing overhead when compared to DSR.
However, Routing overhead in ESCT is considerably higher. In ESCT, nodes periodically broadcast Hello
messages to discover the current topology and neighbors and share the self-detection results in the network.
Also it introduces the investigation request/reply control packets for self-detection. These additional control
packets results in increased routing overhead.
Figure 2. Packet delivery ratio in the presence of
black hole nodes
Figure 3. Control packets overhead in the presence of
black hole nodes
Figure 4 shows the end -to-end delay in data communication between a source and destination in the
presence of black hole nodes in the network. In ESCT and in Sec-DSR the nodes try to avoid routes with
black hole nodes even if it sometimes results in using longer paths than using the shortest path. Hence the
presence of more attackers inside the network increases the end-to-end delay both in Sec-DSR and in ESCT
as shown in Figure 4. But in DSR protocol in the presence of more attackers, most data packets cannot be
received by the destinations and they are dropped by the black hole nodes. The dropped or lost data packets
are not considered for measuring packet delay. Hence end-to-end delay of DSR is better than SEC-DSR and
ESCT.
Figure 4. End to end delay under black hole attack
8. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad… (M. Mohanapriya)
589
The total energy consumption by SEC-DSR is reduced by 62.7 percent in an average when
compared to ESCT as shown in Figure 5. Since SEC-DSR does not employ continuous overhearing or
promiscuous monitoring to monitor the neighborhood, energy consumption by individual nodes is reduced.
And also in our approach only BHN packet is the extra control packet introduced hence energy consumption
is only increased by 2% approximately when compared to DSR as shown in Figure 5. However, ESCT
generates and forwards more control packets which results in more energy consumption in each node.
Figure 5. Energy consumption under attack
4. CONCLUSION
In this paper, a light weight solution methodology called SEC-DSR is proposed to detect and isolate
black hole nodes in MANET. The method can be adopted with any on demand ad hoc routing protocols.
SEC-DSR uses only analysis of RREQ and RREP packets for detecting the black hole attackers which make
it suitable to deploy it in the resource constrained environment of MANET. The performance analysis of
SEC-DSR shows better packet delivery ratio and better end to end delay in the presence of attackers. The
method does not require any computational complexity or promiscuous listening.
REFERENCES
[1] Obidike, G. C., Nwabueze, C. A. and Onuzulike, V. C., “Concept And Characteristics Of Mobile Ad-Hoc
Network”, International Journal Of Innovative Engineering, Technology And Science, vol. 2, pp. 133-142, Mar
2018.
[2] A. Mehran, W. Tadeusz, D, "A review of routing protocols for mobile ad hoc networks", Ad Hoc Networks, vol. 2,
pp. 1-22, Feb 2004.
[3] Von Mulert J, Welch I, Seah WK, "Security threats and solutions in MANETs: a case study using AODV and
SAODV”, Journal of Networks and Computer Applications, vol. 35, pp. 1249-1259, Feb 2012.
[4] Garcia Teodoro P, Sanchez Casado L, Macia Fernandez G, "Taxonomy and holistic detection of security attacks in
MANETs", CRC Press, pp. 1-12, Apr 2014.
[5] D.B. Johnson, A.D. Maltz, J. Broch, "DSR: the dynamic source routing protocol for multi-hop wireless ad hoc
networks", In: Perkins, C.E. (ed.) In Ad Hoc Networking, ch. 5, Addison-Wesley, pp. 139-172, 2001.
[6] C. Perkins, E. Royer, "Ad hoc on demand distance vector (AODV) routing", Second IEEE Workshop on Mobile
Computing Systems and Applications. WMCSA ’99, pp. 90-100, Feb 1999.
[7] G. Arboit, C. Crepeau, C.R. Davis, M. Maheswaran, "A localized certificate revocation scheme for mobile ad hoc
networks", Ad Hoc Networks, vol. 6, pp. 17-31, Jan 2008.
[8] N.C. Fernandes, M.D.D. Moreira, O.C.M.B. Duarte, "A self-organized mechanism for thwarting malicious access
in ad hoc networks", 29th
Conference on Computer Communications. IEEE INFOCOM’10, pp. 266-270, Mar 2010.
[9] H. Xia, Z. Jia, L. Ju, and Y. Zhu, “Trust management model for mobile ad hoc network based on analytic hierarchy
process and fuzzy theory,” IET Wireless Sensor System, vol. 1, pp. 248-266, Dec 2011.
[10] I. R. Chen, J. Guo, F. Bao, and J. Cho, “Trust management in mobile ad hoc networks for bias minimization and
application performance maximization”, Ad Hoc Networks., vol. 19, pp. 59-74, Aug 2014.
[11] L. H. G. Ferraz, P. B. Velloso, and O. C. M. B. Duarte, "An accurate and precise malicious node exclusion
mechanism for ad hoc networks", Ad hoc Networks, vol. 19, pp. 142-155, Mar 2014.
[12] Karlof C, Wagner D, "Secure routing in wireless sensor networks: attacks and countermeasures", Adhoc Networks,
vol. 1, pp. 293-315, Feb 2003.
[13] H.Deng, P. Agarwal, “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, vol. 40,
pp. 70-75, Oct 2002.
[14] B.Awerbuch, D. Holmer, C. Nita Rotaru, H. Rubens, “An On-demand Secure Routing Protocol Resilient to
Byzantine Failures”, 1st
ACM Workshop on Wireless Security, Wise’02, pp. 21-30, Sep 2002.
9. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 582 - 590
590
[15] Imran Raza, S.A. Hussain, “Identification of malicious nodes in an AODV pure ad hoc network through guard
nodes”, Computer Communications, vol. 31, pp. 1796-1802, Dec 2007.
[16] Jhaveri, Rutvij H., and Narendra M. Patel, "A sequence number based bait detection scheme to thwart gray hole
attack in mobile ad hoc networks", Wireless Networks, vol. 21, pp. 2781-2798, Apr 2015.
[17] Dorri, Ali, Soroush Vaseghi, and Omid Gharib, "DEBH: detecting and eliminating black holes in mobile ad hoc
network", Wireless Networks, vol. 24, pp. 2943-2955, Apr 2017.
[18] Tarun Varshney, Tushar Sharma and Pankaj Sharma, “Implementation of Watchdog Protocol with AODV in
Mobile Ad HocNetwork”, 4th
International conference on communication systems and Network Technologies,
CSNT-2014, pp. 217-221, Apr 2014.
[19] Adwan Yasin, Mahmoud Abu Zant, "Detecting andIsolating Black-Hole Attacks in MANET using Timer Based
Baited Technique", Wireless Communications and Mobile Computing, vol. 1, pp. 1-11, Sep 2018.
[20] Lyno Henrique G. Ferraz, Pedro B. Velloso and Otto Carlos M.B. Duarte, “An accurate and precise malicious node
exclusion mechanism for ad hoc networks”, Adhoc Networks, vol. 19, pp. 142-155, Mar 2014.
[21] H. Xia, J. Yu, C. L. Tian, Z. K. Pan, and E. Sha, “Light-weight trust-enhanced on-demand multi-path routing in
mobile ad hoc networks,” Journal of Networks and Computer Applications, vol. 62, pp. 112-127, Feb 2016.
[22] G. Vaseer, G. Ghai, D. Ghai, and P. S. Patheja, “A Neighbor Trust-Based Mechanism to Protect Mobile Networks,”
IEEE Potentials, vol. 38, pp. 20-25, Feb 2019.
[23] Ruo Jun Cai, Xue Jun Li and Peter Han Joo Chong, “An Evolutionary Self-Cooperative Trust Scheme Against
Routing Disruptions in MANETs”, IEEE Transactions On Mobile Computing, vol. 18, pp. 42-55, Jan 2019.
[24] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for
wireless microsensor networks”, IEEE Transaction on Wireless Communication, vol. 1, pp. 660-670, Oct 2002.
[25] P. Zhou, S. Jiang, A. Irissappane, J. Zhang, J. Zhou, and J. C. M. Teo, “Toward energy-efficient trust system
through watchdog optimization for WSNs,” IEEE Transaction on Information Forensics Security, vol. 10, pp. 613-
625, Mar 2015.
BIOGRAPHIES OF AUTHORS
Dr M.Mohanapriya is working as Associate professor in the department of Computer Science
in Coimbatore institute of Technology. She completed her Ph.D in the area of Ad hoc Network
Routing Protocols Security in the year 2014. Her research interests are Network Security,
Internet of Things and Vehicular Networks.
Nitish Joshi is an energetic and great communicator with Networking, Web Development and
Database enthusiast, and Eager-to-learn personality, persuing his Bachelor's degree in
Engineering with IT stream at M.B.M Engineering College, Jodhpur, Rajasthan.
Mohit Soni is a data science and web development enthusiast and is a student of MBM
engineering college pursuing Bachelor of engineering focussed on Information technology.