MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
This document summarizes research on injecting black hole and wormhole attacks in mobile ad hoc networks (MANETs). It provides background on MANETs and discusses their vulnerabilities to security attacks due to open wireless medium and dynamic topology. The document then describes how the researchers implemented black hole and wormhole attacks against the Ad Hoc On-Demand Distance Vector (AODV) routing protocol using the NS-2 network simulator. The simulation results showed that both attacks decreased network performance by reducing throughput and increasing packet loss. The research highlighted security as an ongoing challenge for MANET routing protocols.
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)IJERA Editor
Mobile wirelesses networks are generally open to various attacks like information and physical security attacks than fixed wired networks. Securing wireless ad hoc networks is particularly more difficult for many of the reasons for example vulnerability of channels and nodes, absence of infrastructure, dynamically changing topology etc. After that we initialize the number of nodes. Then implement protocol for the communication of nodes. Due to these protocols communication start. And this will be then implemented in CRNs which stand for cognitive radio network in which channel sensing is done. By the use of CRN security will be improved and performance will be enhanced. Find the malicious nodes occur in the network. One malicious node uses routing protocol to claim itself of being shortest path to last node but drops routing packets and doesn’t send packets to its neighbors. In last evaluate the parameters.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Centralized System in MANET with GRP Protocolijceronline
This document summarizes a research paper on implementing a centralized system in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol (GRP). It begins by introducing MANETs and their characteristics like dynamic topology. It then describes centralized systems and how they differ from decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs and challenges in routing. The GRP protocol is explained along with its advantages and disadvantages. The document outlines a simulation setup comparing network performance between a MANET and one with a centralized system using GRP with hello packet exchanges. Results showed the centralized system had better performance. The conclusion is that GRP protocol performs better in MANETs with a centralized system.
This document summarizes a student's research proposal titled "Investigating the effects of black hole attack in MANET under 802.11b and TDMA Protocols". The student, Muhammad Saleh Bhutto, proposes to use the Network Simulator 2 (NS2) to simulate a mobile ad-hoc network (MANET) under black hole attacks using different MAC protocols (TDMA and 802.11b) with the AODV routing protocol. The objectives are to study the impacts of black hole attacks on network performance metrics like network load, throughput, packet loss and delay, and to determine which MAC protocol is more vulnerable. Literature on black hole and other attacks in MANETs will be reviewed. NS2
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
This document summarizes research on injecting black hole and wormhole attacks in mobile ad hoc networks (MANETs). It provides background on MANETs and discusses their vulnerabilities to security attacks due to open wireless medium and dynamic topology. The document then describes how the researchers implemented black hole and wormhole attacks against the Ad Hoc On-Demand Distance Vector (AODV) routing protocol using the NS-2 network simulator. The simulation results showed that both attacks decreased network performance by reducing throughput and increasing packet loss. The research highlighted security as an ongoing challenge for MANET routing protocols.
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)IJERA Editor
Mobile wirelesses networks are generally open to various attacks like information and physical security attacks than fixed wired networks. Securing wireless ad hoc networks is particularly more difficult for many of the reasons for example vulnerability of channels and nodes, absence of infrastructure, dynamically changing topology etc. After that we initialize the number of nodes. Then implement protocol for the communication of nodes. Due to these protocols communication start. And this will be then implemented in CRNs which stand for cognitive radio network in which channel sensing is done. By the use of CRN security will be improved and performance will be enhanced. Find the malicious nodes occur in the network. One malicious node uses routing protocol to claim itself of being shortest path to last node but drops routing packets and doesn’t send packets to its neighbors. In last evaluate the parameters.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Centralized System in MANET with GRP Protocolijceronline
This document summarizes a research paper on implementing a centralized system in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol (GRP). It begins by introducing MANETs and their characteristics like dynamic topology. It then describes centralized systems and how they differ from decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs and challenges in routing. The GRP protocol is explained along with its advantages and disadvantages. The document outlines a simulation setup comparing network performance between a MANET and one with a centralized system using GRP with hello packet exchanges. Results showed the centralized system had better performance. The conclusion is that GRP protocol performs better in MANETs with a centralized system.
This document summarizes a student's research proposal titled "Investigating the effects of black hole attack in MANET under 802.11b and TDMA Protocols". The student, Muhammad Saleh Bhutto, proposes to use the Network Simulator 2 (NS2) to simulate a mobile ad-hoc network (MANET) under black hole attacks using different MAC protocols (TDMA and 802.11b) with the AODV routing protocol. The objectives are to study the impacts of black hole attacks on network performance metrics like network load, throughput, packet loss and delay, and to determine which MAC protocol is more vulnerable. Literature on black hole and other attacks in MANETs will be reviewed. NS2
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
This document summarizes various cross-layer attacks in mobile ad hoc networks (MANETs) and their defenses. It first introduces MANETs and discusses their vulnerabilities to security attacks. It then defines cross-layer attacks as attacks that are initiated at one layer but target another layer. The document surveys different types of cross-layer attacks that have been discovered, including interlayer attacks, denial of service attacks, and attacks against cooperation enforcement tools. It also discusses proposed defense mechanisms against these attacks. Finally, it suggests using particle swarm optimization instead of ant colony optimization to improve detection of cross-layer attacks in MANETs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks on MANETs using the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It found that the packet delivery ratio decreased significantly when black hole nodes were introduced that dropped packets instead of forwarding them as they should. Increasing the number of black hole nodes caused an even more dramatic decrease in the packet delivery ratio.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
This document discusses security considerations for a proposed marine communication network for fishermen. It outlines several potential security vulnerabilities at different layers of the network architecture, including physical, data link, network, transport and application layers. Specific issues for the marine environment are also discussed, such as signals crossing maritime borders, boats crossing borders, and spoofing of nodes like access points, customer premise equipment, smartphones and base stations. The document proposes that solutions are needed to address these security vulnerabilities and situational risks.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
This document proposes a defense framework called STREAM to defend against stream-based distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). STREAM works by continuously monitoring network traffic patterns between clustered nodes, comparing the real-time patterns to expected patterns, and detecting anomalies that could indicate a DDoS attack. When an attack is detected, STREAM generates alerts and filters illegitimate traffic while minimizing impacts on legitimate traffic. The framework forms node clusters to evaluate traffic patterns based on source and uses both offline and online detection methods to identify attacks.
18068 system software suppor t for router fault tolerance(word 2 column)Ashenafi Workie
This document discusses system software support for router fault tolerance. It begins with an introduction that describes how communication networks have shifted to rely more on software components and the importance of fault tolerance. The document then reviews literature on router fault tolerance techniques, including algorithms using redundancy. It discusses router architecture and functionality. The main objective is to develop a generalized algorithm for fault tolerance to handle different types of faults in routers. The proposed approach would classify network faults and use time, structure, and information redundancy to provide fault tolerance. More research is still needed to better address separating tolerance of temporary and permanent faults and to improve overall network reliability.
Routing is an important operation in ad hoc wireless networks that provides communication between wireless devices. This document discusses the challenges of routing in these networks due to their dynamic topology and lack of infrastructure. It describes several routing protocols for ad hoc wireless networks, including proactive protocols like DSDV, reactive protocols like AODV and DSR, and hybrid protocols like ZRP. Secure routing is challenging in ad hoc wireless networks due to their vulnerability to security attacks.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
This document summarizes various cross-layer attacks in mobile ad hoc networks (MANETs) and their defenses. It first introduces MANETs and discusses their vulnerabilities to security attacks. It then defines cross-layer attacks as attacks that are initiated at one layer but target another layer. The document surveys different types of cross-layer attacks that have been discovered, including interlayer attacks, denial of service attacks, and attacks against cooperation enforcement tools. It also discusses proposed defense mechanisms against these attacks. Finally, it suggests using particle swarm optimization instead of ant colony optimization to improve detection of cross-layer attacks in MANETs.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a study on the impact of black hole attacks on the performance of mobile ad hoc networks (MANETs). The study used the Network Simulator 2 (NS-2) to simulate black hole attacks on MANETs using the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It found that the packet delivery ratio decreased significantly when black hole nodes were introduced that dropped packets instead of forwarding them as they should. Increasing the number of black hole nodes caused an even more dramatic decrease in the packet delivery ratio.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
This document discusses security considerations for a proposed marine communication network for fishermen. It outlines several potential security vulnerabilities at different layers of the network architecture, including physical, data link, network, transport and application layers. Specific issues for the marine environment are also discussed, such as signals crossing maritime borders, boats crossing borders, and spoofing of nodes like access points, customer premise equipment, smartphones and base stations. The document proposes that solutions are needed to address these security vulnerabilities and situational risks.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
This document proposes a defense framework called STREAM to defend against stream-based distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). STREAM works by continuously monitoring network traffic patterns between clustered nodes, comparing the real-time patterns to expected patterns, and detecting anomalies that could indicate a DDoS attack. When an attack is detected, STREAM generates alerts and filters illegitimate traffic while minimizing impacts on legitimate traffic. The framework forms node clusters to evaluate traffic patterns based on source and uses both offline and online detection methods to identify attacks.
18068 system software suppor t for router fault tolerance(word 2 column)Ashenafi Workie
This document discusses system software support for router fault tolerance. It begins with an introduction that describes how communication networks have shifted to rely more on software components and the importance of fault tolerance. The document then reviews literature on router fault tolerance techniques, including algorithms using redundancy. It discusses router architecture and functionality. The main objective is to develop a generalized algorithm for fault tolerance to handle different types of faults in routers. The proposed approach would classify network faults and use time, structure, and information redundancy to provide fault tolerance. More research is still needed to better address separating tolerance of temporary and permanent faults and to improve overall network reliability.
Routing is an important operation in ad hoc wireless networks that provides communication between wireless devices. This document discusses the challenges of routing in these networks due to their dynamic topology and lack of infrastructure. It describes several routing protocols for ad hoc wireless networks, including proactive protocols like DSDV, reactive protocols like AODV and DSR, and hybrid protocols like ZRP. Secure routing is challenging in ad hoc wireless networks due to their vulnerability to security attacks.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter
by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
This document analyzes the performance of two routing protocols (AODV and DSR) in mobile ad hoc networks under different types of malicious attacks. It first provides background on MANETs and discusses security goals and common routing protocols. It then describes three types of attacks tested (selfish nodes, grey holes, and black holes) and how they can disrupt routing. The methodology section indicates that the performance will be evaluated based on throughput, delay, packet loss, and energy consumption under these attacks. In summary, the document aims to compare the impact of different routing attacks on the network performance of two important MANET routing protocols.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections. However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput, acket delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput. Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed
infrastructure, allowing nodes to move freely and serve as both routers and hosts. These nodes establish
virtual links and utilize routing protocols such as AODV, DSR, and DSDV to establish connections.
However, security is a significant concern, with the Blackhole attack posing a notable threat, wherein a
malicious node drops packets instead of forwarding them. To investigate the impact of Blackhole nodes and
assess the performance of AODV and DSR protocols, the researchers employed the NS-2.35 ns-allinone2.35 version for simulation purposes. The study focused on several metrics, including average throughput,
packet delivery ratio, and residual energy. The findings revealed that AODV demonstrated better energy
efficiency and packet delivery compared to DSR, but DSR outperformed AODV in terms of throughput.
Additionally, environmental factors and data sizes were taken into account during the analysis.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
This document discusses different prediction methods for route recovery in mobile ad hoc networks (MANETs). It begins with an abstract discussing multiple path routing infrastructures in various networks. The document then provides background on ad hoc networks and discusses features of MANETs such as dynamic topologies and variable capacity links. It also introduces the Ad Hoc On-Demand Distance Vector (AODV) routing protocol and discusses topics like route discovery, link availability, and distributed hash tables in MANETs.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
This document provides an overview of mobile ad hoc networks (MANETs), including their characteristics, applications, routing protocols, attacks, and performance metrics. Some key points:
- MANETs are temporary networks formed without centralized administration between mobile nodes. Routing is challenging due to frequent topology changes from node mobility.
- Common routing protocols include proactive (table-driven), reactive (on-demand), and hybrid. Proactive maintains routing tables even without need, while reactive establishes routes on demand.
- Attacks on MANETs include location disclosure, black holes, replays, wormholes, and denial of service. Performance is evaluated using metrics like throughput, packet delivery ratio, and end-to
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
Similar to Secure routing proposals in manets a review (20)
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
This investigation delves into incorporating a hybridized memetic strategy within the framework of English
composition pedagogy, leveraging Internet Plus resources. The study aims to provide an in-depth analysis
of how this method influences students’ writing competence, their perceptions of writing, and their
enthusiasm for English acquisition. Employing an explanatory research design that combines qualitative
and quantitative methods, the study collects data through surveys, interviews, and observations of students’
writing performance before and after the intervention. Findings demonstrate a beneficial impact of
integrating the memetic approach alongside Internet Plus tools on the writing aptitude of English as a
Foreign Language (EFL) learners. Students reported increased engagement with writing, attributing it to
the use of Internet plus tools. They also expressed that the memetic approach facilitated a deeper
understanding of cultural and social contexts in writing. Furthermore, the findings highlight a significant
improvement in students’ writing skills following the intervention. This study provides significant insights
into the practical implementation of the memetic approach within English writing education, highlighting
the beneficial contribution of Internet Plus tools in enriching students' learning journeys.
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
This investigation delves into incorporating a hybridized memetic strategy within the framework of English
composition pedagogy, leveraging Internet Plus resources. The study aims to provide an in-depth analysis
of how this method influences students’ writing competence, their perceptions of writing, and their
enthusiasm for English acquisition. Employing an explanatory research design that combines qualitative
and quantitative methods, the study collects data through surveys, interviews, and observations of students’
writing performance before and after the intervention. Findings demonstrate a beneficial impact of
integrating the memetic approach alongside Internet Plus tools on the writing aptitude of English as a
Foreign Language (EFL) learners. Students reported increased engagement with writing, attributing it to
the use of Internet plus tools. They also expressed that the memetic approach facilitated a deeper
understanding of cultural and social contexts in writing. Furthermore, the findings highlight a significant
improvement in students’ writing skills following the intervention. This study provides significant insights
into the practical implementation of the memetic approach within English writing education, highlighting
the beneficial contribution of Internet Plus tools in enriching students' learning journeys.
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
Messages routing over a network is one of the most fundamental concept in communication which requires
simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it
refers to the addition of a timing constraint in which messages should be received within a specified time
delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of
the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present
these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of
routing real-time messages on networks. We study whether it is possible to have an optimal on-line
algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message
routing’s algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual
examples. Next, we explore the Unidirectional Ring topology in finding the transmission’s
“makespan”.Lastly, we propose the same network modelling through the technique of Kinesthetic Learning
Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the
effectiveness of the KLA approach compared to the traditional teaching method.
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
A design of a sales system for professional services requires a comprehensive understanding of the
dynamics of sale cycles and how key knowledge for completing sales is managed. This research describes
a design model of a business development (sales) system for professional service firms based on the Saudi
Arabian commercial market, which takes into account the new advances in technology while preserving
unique or cultural practices that are an important part of the Saudi Arabian commercial market. The
design model has combined a number of key technologies, such as cloud computing and mobility, as an
integral part of the proposed system. An adaptive development process has also been used in implementing
the proposed design model.
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
Frank t-norms are parametric family of continuous Archimedean t-norms whose members are also strict
functions. Very often, this family of t-norms is also called the family of fundamental t-norms because of the
role it plays in several applications. In this paper, optimization of a linear objective function with fuzzy
relational inequality constraints is investigated. The feasible region is formed as the intersection of two
inequality fuzzy systems defined by frank family of t-norms is considered as fuzzy composition. First, the
resolution of the feasible solutions set is studied where the two fuzzy inequality systems are defined with
max-Frank composition. Second, some related basic and theoretical properties are derived. Then, a
necessary and sufficient condition and three other necessary conditions are presented to conceptualize the
feasibility of the problem. Subsequently, it is shown that a lower bound is always attainable for the optimal
objective value. Also, it is proved that the optimal solution of the problem is always resulted from the
unique maximum solution and a minimal solution of the feasible region. Finally, an algorithm is presented
to solve the problem and an example is described to illustrate the algorithm. Additionally, a method is
proposed to generate random feasible max-Frank fuzzy relational inequalities. By this method, we can
easily generate a feasible test problem and employ our algorithm to it.
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
Underwater detector network is one amongst the foremost difficult and fascinating analysis arenas that
open the door of pleasing plenty of researchers during this field of study. In several under water based
sensor applications, nodes are square measured and through this the energy is affected. Thus, the mobility
of each sensor nodes are measured through the water atmosphere from the water flow for sensor based
protocol formations. Researchers have developed many routing protocols. However, those lost their charm
with the time. This can be the demand of the age to supply associate degree upon energy-efficient and
ascendable strong routing protocol for under water actuator networks. During this work, the authors tend
to propose a customary routing protocol named level primarily based routing protocol (LBRP), reaching to
offer strong, ascendable and energy economical routing. LBRP conjointly guarantees the most effective use
of total energy consumption and ensures packet transmission which redirects as an additional reliability in
compare to different routing protocols. In this work, the authors have used the level of forwarding node,
residual energy and distance from the forwarding node to the causing node as a proof in multicasting
technique comparisons. Throughout this work, the authors have got a recognition result concerning about
86.35% on the average in node multicasting performances. Simulation has been experienced each in a
wheezy and quiet atmosphere which represents the endorsement of higher performance for the planned
protocol.
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
This research paper examined and re-evaluates the technological innovation, theory, structural dynamics
and evolution of Pill Camera(Capsule Endoscopy) technology in redirecting the response manner of small
bowel (intestine) examination in human. The Pill Camera (Endoscopy Capsule) is made up of sealed
biocompatible material to withstand acid, enzymes and other antibody chemicals in the stomach is a
technology that helps the medical practitioners especially the general physicians and the
gastroenterologists to examine and re-examine the intestine for possible bleeding or infection. Before the
advent of the Pill camera (Endoscopy Capsule) the colonoscopy was the local method used but research
showed that some parts (bowel) of the intestine can’t be reach by mere traditional method hence the need
for Pill Camera. Countless number of deaths from stomach disease such as polyps, inflammatory bowel
(Crohn”s diseases), Cancers, Ulcer, anaemia and tumours of small intestines which ordinary would have
been detected by sophisticated technology like Pill Camera has become norm in the developing nations.
Nevertheless, not only will this paper examine and re-evaluate the Pill Camera Innovation, theory,
Structural dynamics and evolution it unravelled and aimed to create awareness for both medical
practitioners and the public.
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
Path finding algorithm addresses problem of finding shortest path from source to destination avoiding
obstacles. There exist various search algorithms namely A*, Dijkstra's and ant colony optimization. Unlike
most path finding algorithms which require destination co-ordinates to compute path, the proposed
algorithm comprises of a new method which finds path using backtracking without requiring destination
co-ordinates. Moreover, in existing path finding algorithm, the number of iterations required to find path is
large. Hence, to overcome this, an algorithm is proposed which reduces number of iterations required to
traverse the path. The proposed algorithm is hybrid of backtracking and a new technique(modified 8-
neighbor approach). The proposed algorithm can become essential part in location based, network, gaming
applications. grid traversal, navigation, gaming applications, mobile robot and Artificial Intelligence.
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
The Major Occupation in India is the Agriculture; the people involved in the Agriculture belong to the poor
class and category. The people of the farming community are unaware of the new techniques and Agromachines, which would direct the world to greater heights in the field of agriculture. Though the farmers
work hard, they are cheated by agents in today’s market. This serves as a opportunity to solve
all the problems that farmers face in the current world. The eAgro crop marketing will serve as a better
way for the farmers to sell their products within the country with some mediocre knowledge about using
the website. This would provide information to the farmers about current market rate of agro-products,
their sale history and profits earned in a sale. This site will also help the farmers to know about the market
information and to view agricultural schemes of the Government provided to farmers.
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
This Paper provides a brief description of the Genetic Algorithm (GA), the Simulated Annealing (SA)
Algorithm, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm and attempts to
explain the way as how the Proposed Genetic Algorithm (GA), the Proposed Simulated Annealing (SA)
Algorithm using GA, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm can be
employed in finding the best solution of N Queens Problem and also, makes a comparison between these
four algorithms. It is entirely a review based work. The four algorithms were written as well as
implemented. From the Results, it was found that, the Proposed Genetic Algorithm (GA) performed better
than the Proposed Simulated Annealing (SA) Algorithm using GA, the Backtracking (BT) Algorithm and
the Brute Force (BF) Search Algorithm and it also provided better fitness value (solution) than the
Proposed Simulated Annealing Algorithm (SA) using GA, the Backtracking (BT) Algorithm and the Brute
Force (BF) Search Algorithm, for different N values. Also, it was noticed that, the Proposed GA took more
time to provide result than the Proposed SA using GA.
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
In recent years, the complex event processing technology has been used to process the VANET’s temporal
and spatial event streams. However, we usually cannot get the accurate data because the device sensing
accuracy limitations of the system. We only can get the uncertain data from the complex and limited
environment of the VANET. Because the VANET’s event streams are consist of the uncertain data, so they
are also uncertain. How effective to express and process these uncertain event streams has become the core
issue for the VANET system. To solve this problem, we propose a novel complex event query language
PSTeCEQL (probabilistic spatio-temporal constraint event query language). Firstly, we give the definition
of the possible world model of VANET’s uncertain event streams. Secondly, we propose an event query
language PSTeCEQL and give the syntax and the operational semantics of the language. Finally, we
illustrate the validity of the PSTeCEQL by an example.
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
This document describes the ClustBigFIM algorithm for frequent itemset mining of big data using pre-processing based on the MapReduce framework. The ClustBigFIM algorithm first applies k-means clustering to generate clusters from large datasets. It then mines frequent itemsets from the generated clusters using the Apriori and Eclat algorithms within the MapReduce programming model. Experimental results on several datasets show that the ClustBigFIM algorithm increases execution efficiency compared to the BigFIM algorithm by applying k-means clustering as a pre-processing step before frequent itemset mining.
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
This document discusses mutation testing and regression testing. Mutation testing involves intentionally introducing small errors or mutations into code and then testing if test suites can detect the errors. Regression testing is done after code changes to ensure the changes did not unintentionally break existing functionality. The document provides examples and algorithms to illustrate how mutation testing and regression testing work. It also discusses advantages like improving test quality and disadvantages like time required. Overall, the document examines these two software testing techniques.
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork compression and multiple query synthesis at the base-station and modification of query syntax
through introduction of Static Variables. These approaches are general approaches which can be used in
any WSN irrespective of application.
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
Accurate and realistic estimation is always considered to be a great challenge in software industry.
Software Cost Estimation (SCE) is the standard application used to manage software projects. Determining
the amount of estimation in the initial stages of the project depends on planning other activities of the
project. In fact, the estimation is confronted with a number of uncertainties and barriers’, yet assessing the
previous projects is essential to solve this problem. Several models have been developed for the analysis of
software projects. But the classical reference method is the COCOMO model, there are other methods
which are also applied such as Function Point (FP), Line of Code(LOC); meanwhile, the expert`s opinions
matter in this regard. In recent years, the growth and the combination of meta-heuristic algorithms with
high accuracy have brought about a great achievement in software engineering. Meta-heuristic algorithms
which can analyze data from multiple dimensions and identify the optimum solution between them are
analytical tools for the analysis of data. In this paper, we have used the Harmony Search (HS)algorithm for
SCE. The proposed model which is a collection of 60 standard projects from Dataset NASA60 has been
assessed.The experimental results show that HS algorithm is a good way for determining the weight
similarity measures factors of software effort, and reducing the error of MRE.
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
Mining biological data is an emergent area at the intersection between bioinformatics and data mining
(DM). The intelligent agent based model is a popular approach in constructing Distributed Data Mining
(DDM) systems to address scalable mining over large scale distributed data. The nature of associations
between different amino acids in proteins has also been a subject of great anxiety. There is a strong need to
develop new models and exploit and analyze the available distributed biological data sources. In this study,
we have designed and implemented a multi-agent system (MAS) called Agent enriched Quantitative
Association Rules Mining for Amino Acids in distributed Protein Data Banks (AeQARM-AAPDB). Such
globally strong association rules enhance understanding of protein composition and are desirable for
synthesis of artificial proteins. A real protein data bank is used to validate the system.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of interest include, but are not limited to the following:
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Secure routing proposals in manets a review
1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
DOI:10.5121/ijfcst.2016.6102 21
SECURE ROUTING PROPOSALS IN MANETS:
A REVIEW
Amit Kumar1
, Vijay K. Katiyar2
and Kamal Kumar3
1,2
Department of Computer Engineering, M. M. University, Ambala, Haryana, India
3
Centre for Information Technology (CIT), UPES, Dehradun, Uttarakhand, India
ABSTRACT
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
KEYWORDS
Routing, Security Issues, Security Goals, Secure Routing in MANETs, Historic Perspective.
1. INTRODUCTION
Wide spread wireless digitization has become the need of hour. Evolution of MANETs on the
horizon of wireless and infrastructure networking solutions offered a platform for materializing
wireless digitization dreams. MANETs are peer to peer networks without any central control.
MANETs are networks with self-configurability and self-organization. These characteristics of
MANETs make them a preferred network, whenever and wherever a quick and temporary
network deployment is required. Mere easier deployment is not that all. The highly Ad-hoc
nature, depleting energy of nodes, mobility of nodes and physical obstacles of a terrain, affects
the topology of the MANETs every now and then. This mandates the availability of self-
configurable feature in MANETs. The deployment of MANETs in Military applications, border
fencing, traffic monitoring, and production line control etc. deals with sensitive data. Data is
relayed through intermediate nodes. The air is used as transmission medium. This mode of
operations makes MANETs as targets for intruders and attackers. The security challenges in
MANETs are stringent than that of wired networks. The limited capabilities of nodes, mobility,
dynamic topology and lack of central control make it even difficult to provide a single security
solution [1]. The native requirements of security like confidentiality, integrity, authentication,
non-repudiation, availability, freshness etc. are difficult to achieve through single solution. The
very nature of MANETs doesn’t even allow the security solutions for wired networks to be used.
To patch the security gaps in MANETs researchers around [2] the globe has proposed many
solutions that not only try to customize wired network solutions to MANETs but also presented
few MANETs specific solutions. Solutions proposed address different security requirements and
offer defence against some of known security attacks. In this paper we present the challenges,
open issues, current and historic perspective in security of the MANETs.
2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
22
Figure 1 Mobile Ad hoc Network
In Section 2 we present classification of routing protocols. Section 3 & 4 discuss various security
issues and security goals respectively. Section 5 introduces security approaches in MANETs.
Section 6 explains different secure routing protocols in MANETs. We conclude this paper in
Section 7.
2. ROUTING PROTOCOL IN MANETS
Routing Schemes in MANETs are classified into Reactive, Proactive and Hybrid category on the
basis of mode of operation. Further classification is due to network structure and classes
identified are Flat, Hierarchical and Location or Geography based routing schemes. Another
Classification is due to Routing strategy and schemes in this class can be studied under QoS
based and Multipath Routing schemes. Figure 2, presents a classification of routing protocols in
MANETs.
Figure 2 Classification of routing protocols in Ad hoc Networks
2.1 Proactive Routing Protocols
Proactive class of routing schemes stores the routing information gathered from neighbouring
nodes through periodic or event based updates. Information received via updates is maintained as
routing tables.
The change in the topology due to node movement, energy drain or physical obstacles or physical
security attacks initiate next round of updates. Each node may maintain partial or total network
topology and thus time and energy spent in convergence of routing information in nodes consume
a lot of time and energy. There are times when nodes in the network may possess unstable routing
information. Routing protocols like DSDV (Destination Sequenced Distance Vector) [3], OLSR
3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
23
(Optimized Link State Routing) [4], WRP (Wireless Routing Protocol) etc. are representative
protocols in this category.
2.2 Reactive Routing Protocols
Proactive routing schemes suffer performance limitation due to frequent route updates due
dynamic topology changes. To overcome these limitations and frequent topology changes, routes
may be computed only when it is actually required. Reactive routing schemes follow the suit of
temporal update and prevent the instances of unstable network state. DSR (Dynamic Source
Routing) [5], AODV [1] (Ad hoc On demand Distance Vector) and TORA (Temporary Ordered
Routing Protocol) [6] etc. are the representative routing schemes in this category.
2.3 Hybrid Routing Protocols
Often single feature routing protocols suffers from limitation due to its very mode of operations.
Combining the best of two or more classes of protocols often covers the limitation of other class.
Hybrid routing protocols combines the features of both reactive and proactive routing protocols
and attempt to overcome the limitations of each class of protocols through some customizations
in basic operation modes of constituting members. ZRP (Zone Routing Protocol), SHARP (Sharp
Hybrid Adaptive Routing Protocol, DHAR (Dual-Hybrid Adaptive Routing) & ADV (Adaptive
Distance Vector Routing), TORA etc. are the representative proposal in this categories.
3. SECURITY ISSUES IN MANETS
MANETs are most challenging networks. Due to its very nature of using hostile environments
and air-as-medium, MANETs are exposed to different types of active and passive attacks. Active
attacks are performed by adversaries who are sufficiently equipped with sophisticated tools. They
can not only change the data relayed through networks but also corrupt network’s functioning by
altering routing, topology and link related updates. Actives attacks like DoS, DDoS,
Impersonation, Worm-hole attack, Black-hole attack, Byzantine attacks etc. Other possible
attacks are launched by adversaries with limited capabilities. Such attacks can be classified into
passive attacks, like eves-dropping, overhearing etc. Some basic constraints [7], [8], [9] and open
challenges security aspects in MANETs may be describes as below:
Distributed management: Due to peer-to-peer nature of nodes and Ad hoc installation of
MANETs, no centralized control can be established. Distributed nature of MANETs affects the
authentication of new nodes, maintaining different generations of nodes, secure distribution of
data and keying information, loose control on topology changes etc. are all affected due to lack of
centralized control.
Limited resource: Due to Ad hoc and temporal deployment in resource constrained and difficult
surrounding, Ad hoc networks suffer from lack of power resources, bandwidth and computational
limitations. Due to limited resources Ad hoc networks are paly ground for attackers and
developers. Resource limitation has greatly affected the solution space in Ad hoc networks.
Cooperativeness: Due to peer to peer architecture and lack of any centralized control has changed
MANETs from client-server to cooperative networks. The cooperation seeks trust among nodes
during exchange of any data or routing. Any deviation from cooperative behavior and turning into
selfish or compromised nodes establishes the requirements of customized security solutions and
forced cooperation among nodes in MANETs.
4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
24
Dynamic topology: Mobility of nodes, depletion of energy in nodes, nodes revocation due to
action against malicious and selfish nodes, physical obstacles and physical node compromise
resulted into dynamic nature of wireless network topology requires adaptive security solutions.
4. SECURITY GOALS IN MANETS
Similar to other networks, Ad hoc networks require that security policy and implementation
should be a step forward towards realization of certain security goals. Theses may be highlighted
as below:
• Authentication
• Integrity
• Confidentiality
• Non-repudiation
• Availability
• Data Freshness
Most of the goals are common with other networks except freshness. Data Freshness is important
in Ad hoc networks as Ad hoc networks lacks centralized control. Lack of centralized control and
poor synchronization has exposed such networks to collusions at the part of malicious or selfish
nodes. This is why data freshness in Ad hoc security policy has found its place in security goals
of MANETs.
5. SECURITY APPROACHES IN MANETS
There are different security threats in MANETs at each layer of protocol and to counter them
various approaches are used. These approaches fulfil security requirements at each layer of a
protocol in MANETs. In MANETs’ security provisioning is made available through or using
either of the key management, Intrusion Detection System (IDS) or secure routing.
5.1 Key Management Schemes
Key management involves, key distribution, key refreshing and key revocation. Through various
keys for encryption, decryption and Message Authentication Codes (MAC) generation, node’s
authentication and data freshness, security breaches can be identified well in time, before such
breach leads to large scale attacks. Use of symmetric or asymmetric keys cryptography in Ad hoc
is exercised in various proposals. Further to it, network key, group key or pair wise keys are used
to address network level, group level or node-to-node interaction respectively.
When single key is used across the network for securing the information exchange, it is classified
as network key. When group of mobile nodes in MANETs are assigned a single key this is called
group key. Generation, distribution and revocation of group keys are all distributed processes by
its very nature as group keying is managed by a group of logical or physical neighbour nodes
[10]. Various proposals have further classified group keying as centralized, distributed and
decentralized.
5.2 Intrusion Detection System (IDS)
Another approach for attack detection only is called Intrusion Detection System (IDS). IDS [11],
[12] can be classified as either Rule Based or Signature Based and Anomaly Detection Based.
Rule based IDS detect the intrusion by comparing the signatures against signature data base. The
freshness of signature data base and missing entries against new attacks can’t be classified as
5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
25
intrusion. Anomaly based detection system is able to detect any deviation from normal behaviour
by comparing traffic patterns, energy consumptions or delays in acknowledgement etc. [13], [14],
[15] and [16]. Several solutions reviewed in this paper can be simultaneously classified in IDS
category as well as secure routing. A proposal in [17] is used to detect anomaly by computing the
deviation from normal behaviour in terms of forwarding behaviour. Authors in [18] proposed a
IDS for reactive routing schemes.
6. SECURE ROUTING
6.1 Secure Routing: Historic Perspective
With security gaining as QoS parameter in Ad hoc networks, secure routing is gaining as
playground for security provisioning in Ad hoc networks. Secure routing is either achieved
through fixing pre-existing routing schemes or by proposing security aware routing proposals.
This section presents historic and current perspective in secure routing solutions proposed in
MANETs.
6.1.1 Authenticated Routing for Ad hoc Networks (ARAN)
ARAN uses the concept of certificates from trusted server for the authentication of nodes [19].
Primarily Route discovery requests are verified using Digital Signature Authentication and
equivalent of end-to-end authentication.
Route Discovery is message is propagated through broadcast but replies from destinations are
unicast. The process of DSA is applied not only during route discovery but also during route
reply. ARAN has certificate revocation procedure in place. The certificates are assumed to serve
for limited time and should be renewed with trusted certificate server. Each route discovery
message is signed using private key and contains a nonce (monotonically increasing), current
time-stamp, and IP. Nodes keeps track of nonce and time-stamp for each node from which they
receive route discovery message. A message with same nonce but different time stamp is
acceptable. Nodes refrain from forwarding duplicate RDP from same source IP. Nodes on route
from source to destination verify and re-sign RDP with its own private key. This same process is
phase two and ensures end-to-end authentication. Third phase is optional in the sense that a costly
procedure is adopted to ensure shortest path between source and destination.
6.1.2 Secure Efficient Ad hoc Distance Vector Routing (SEAD)
SEAD [20] is proposed to secure the proactive or table driven Ad hoc routing protocol called
DSDV [21]. DSDV principally works on the principle of sequence number of update assigned by
source and hop count field. Sequence number helps nodes to keep the track of duplicate packets
and hop count is used to prevent the infinite looping of packets in the network. The incorporation
of DSDV in Bellman’s-Ford algorithms adds to miseries of DSDV as distributed version of all-
pair-shortest-path algorithm is computationally very costly. It takes lot of time and
communication overhead to maintain consistent state across the nodes in whole network. The
manipulation of sequence number of update packets and hop count leads to erroneous functioning
of DSDV. SEAD provides security by preventing unauthenticated nodes from updating mutable
field in the packets. Nodes are compulsorily assumed to obtain cryptographic information like
Authentication key and adopt Secure Key Exchange methods like Diffie-Hellman etc.
6.1.3 Secure Routing Protocol (SRP)
SRP is generic security extension module and can be used to extend any reactive Ad hoc routing
protocol which uses route request broadcasting approach while querying for route on demand
6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
26
basis [22]. Only DSR is considered in the proposal for most suitable extension. SAR uses
symmetric key cryptography for achievement of authentication between neighbouring nodes.
Keying material is presumed to be pre-distributed among nodes. The existence of certification
authority is assumed for secure key distribution. Symmetric keying approach is faster as
compared to asymmetric keying approach, but to ensure high degree of connectivity, each node
needs to maintain sufficiently large number of keys. Reducing on number of keys may either
hamper the connectivity. Considering either group-key concept or network wide secure keys leads
to chances of network-segment or network wide compromise in case of single node compromise.
Proposal fails to consider the performance against leading active attacks.
6.1.4 Ariadne
Ariadne is a security extension to reactive routing protocols in Ad hoc networks. Ariadne [23] is
available for DSR protocol. Instead of using the concept of hop-by-hop approach, Ariadne
preferred to offer semantic security by opting end-to-end security between pair of nodes called
source and destination. The Message Authentication Code (MAC) is used to authenticate senders
and receivers for point to point messages. Another provision made by Ariadne is to secure
broadcast messages like RREQ. Broadcast Authentication scheme called TESLA is exploited to
achieve authentication of broadcast messages. The incorporation of TESLA leads to stringent
requirements on clock synchronization. This is very weird assumption which is difficult to
achieve. Besides these Ariadne offers a new approach to ensure the validity of route error
messages in the route maintenance phase. Some leading attacks like wormhole attack, feedback
loop and honest node manipulation, detection of compromised node etc. are the open challenges
for Ariadne to consider.
6.1.5 Secure Ad hoc On-demand Distance Vector Routing (SAODV)
SAODV [24] is customized AODV for security provisioning. One way hash chaining and Digital
Signature Authentication is used to enhance security of AODV. As each packet contains mutable
and non-mutable fields, non-mutable fields are encrypted using digital signature while mutable
fields like hop-count are secured using hash-chaining. Hash chaining is irreversible in nature.
Every route request packet is associated with new hash chain. SAODV assumes the existence of
trusted certification authority CA, for issuing certificate. SAODV works on asymmetric key
based digital signature, public keys of nodes are sent along with each route request packet being
sent. The limitation in SAODV is that hop-by-hop authentication leads to increase not only
computational overhead but also increases communication overhead. Another limitation is the
assumption of CA, which by its very nature very defunct assumption. The failure of SAODV
against feedback loop attack and manipulation of honest nodes on the route replies by
compromised or malicious nodes is not considered in the proposal.
6.1.6 Secure Link State Routing Protocol (SLSP)
Authors in [25] proposed a mechanism to securely discover the neighbouring nodes and secure
the dissemination of topology of the network known to them. Nodes in SLSP are aware of local
topology within the range of R hops. Nodes in SLSP broadcast their public key in their zone of R-
hops. Nodes sign the Link State Updates and Link Information and broadcast. Each new node
entering in the zone broadcast its public key. Only nodes in the zone are validated for their
broadcasts and thus nodes maintain only few keys. The consistent information on a particular
links by nodes incident on link established the validity of the link correctness and its acceptance
as new information to be further propagated. SLSP binds the IP and MAC of a node. This helps
the protocol to avoid the node replication at MAC Level. To accommodate these features a
Neighbour Lookup Protocol is added. Binding of multiple IPs with same MAC, overloading the
7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
27
network with extra traffic, malicious and selfish behaviour can be easily isolated by using MAC-
IP bindings. SLSP is able to counter DoS attack by prioritizing the nodes on the basis of rate of
querying. Nodes with least querying rate are given highest priority.
6.1.7 On-demand Secure Routing Protocol Resilient to Byzantine Failures (OSRP)
Byzantine attacks hamper the normal functioning of the routing protocols by altering routing
information, dropping and modifying etc. [26]. Such nodes are classified as Malicious and routes
containing such nodes are given more weight than others provided that route selection is oriented
towards least weight route selection. Byzantine behaviour is reflected by authenticated nodes. The
detection of faults is after log (n) faults where n represents number of nodes in the route. To
implement the detection of node originating the fault, source node uses binary search until the
fault location is confirmed to single link. The probe in-fact is query to be acknowledged by each
node on the legitimate routes. Failing to acknowledge on successive binary search instances helps
to identify the link with problem.
6.1.8 Watchdog and Pathrater
Watchdog and Pathrater [2] are the proposal for almost intrusion detection and identification of
non-cooperating nodes. Non-cooperating nodes may be either selfish or compromised nodes.
Compromised nodes may selectively drop the messages or selfish node may drop due to
overloading in broadcast environment. The path-rater module rates the paths among the nodes on
the basis of message forwarding behavior of the nodes on the path. The proposal was considered
for extending DSR, but both Pathrater and Watchdog can be used to extend any routing protocol
in ad-hoc wireless networks environment.
6.1.9 Cooperation of Nodes: Fairness InDynamic Ad hoc NeTworks (CONFIDANT)
CONFIDANT is security fortification of DSR by promoting nodes for cooperation. Non-
cooperative nodes are isolated from network activities. This motivates each node to cooperate
actively in the routing activities. The routing decision and trust relationships are decided on the
basis of nodes experience, observations, routing and forwarding behaviour of nodes [27]. Nodes
in CONFIDANT maintain a finite state machine with four major components, called Monitor,
Reputation Manager, Trust Manager and Path Manager. Monitor closely maintains
neighbourhood watch and reports any deviation from model behaviour. Trust Manager
Component sends ALARM messages about node’s experience about malicious activities of other
nodes. ALARM received by node is treated as per sender node’s trust level. Trust is given
importance at the time of deciding in routing decisions. Reputation Manager maintains the trust
levels as per node’s experience, observation and routing behaviour.
6.1.10 Security-aware Ad hoc Routing (SAR)
SAR [28] extends QoS set by including security in routing. Instead of several other parameters
like distance, delay or security is used to rate any routing scheme. Proposal can be safely applied
to any proactive, reactive or hybrid routing schemes.
6.1.11 Security Protocol for Reliable Data Delivery (SPREAD)
In [29] authors proposed reliability aware secure and multi-path routing schemes with desired
optimality criteria. The proposal caters multiple objectives. The confidentiality of secure
messages is ensured by using multiple shares of a message routed through multiple optimal paths
across the hostile and insecure network. To obtain shares the optimality criteria of routes is
8. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
28
considered. The loss or compromise of one or more shares of a secret message doesn’t expose the
contents as unless all the shares are joined together. The multi-path routing scheme is also
proposed as part of work.
6.1.12 Miscellaneous Historic Solutions:
Techniques for Intrusion Resistant Ad hoc Routing Algorithms (TIARA) [30] identified and
presented a collection of design rules that can be applied to overcome the impact of malicious
nodes and ensure acceptable level of operation of network under DoS attack. A proposal called
BISS in [31] improvised existing routing schemes wit incomplete Security Associations (SAs) by
using MACs and digital signatures. Similar to Ariadne BISS affects only RREQ. In [32], [33],
[34] authors endorse IPSec as default solution for Ad hoc networks for providing confidentiality,
authentication and integrity. IPSec suffers from computational overhead due to several
encryptions and verification steps. Secure Message Transmission (SMT) [31] ensures to achieve
multiple security goals by using Information Dispersal Algorithm (IDA) [35]. Each message was
divided into statistically related fragments containing limited redundancy. To address the integrity
and confidentiality of each fragment, MAC was also routed along with through multiple paths.
MAC also ensured the authentication of the source. Another proposal in [36] proposed to use
multiple paths between a pair of senders and receivers. Multiple paths are used to segment the
message into pieces and route across network via multiple paths. The process certainly enhances
the confidentiality by making it useless to capture any piece unless all the pieces are joined
together. This requires a highly infected network with omnipresent adversary to break into
messages. Authors in [37] proposed Jigsaw Puzzle scheme for Ad hoc networks and ensure
confidentiality and integrity. A proposal in [38] uses Jigsaw Puzzle [37] to obtain pieces of the
message to be routed across the network through multiple paths. No information can be retrieved
from any captured piece unless all the pieces are joined together.
6.2 Secure Routing: Current Perspective
This section presents the current research directions in secure routing in MANETs. Many
promising proposal proposed in recent times have been reviewed and discussed below.
6.2.1 Secure Route Discovery Protocol (SRDP): In [39] authors proposed Secure Route
Discovery Protocol (SRDP) for minimizing communication overhead and computation overhead.
SRDP relies on MAC and Digital Signatures. Novelty of the SRDP is aggregation of signatures
and multi-signatures. Authors proposed a new adversary model with feedback loop and
considered attacks which manipulates honest nodes between a pair of compromised nodes and
may insert a node between a pair of compromised nodes. Such attacks results into manipulated
routes in the RREP in DSR. SRDP considered only active adversaries. A concept of putative
routes is introduced in the proposal where source nodes are able to verify the presence of each
honest node on the route and each honest node has the same view of the topology. Instead of
using authentication tags during RREQ, intermediate nodes in SRDP keeps a hash of prefix of the
route on RREQ. It helps the nodes to identify the duplicate RREQ. Backward authentication is
ensured through attaching a MAC or Signature of route on the RREP. It can be any time
compared with the cached information to identify any discrepancy.
6.2.2 Exhaustive Topology Evaluation: In [40] authors proposed new automated approach for
evaluation of secure routing protocols. Most of the routing protocols till date consider the
standard network topology and few standard message exchange scenarios. Most evaluation
techniques lack exhaustive and automated evaluations. A new model based approach was
proposed in [40] that evaluates the given routing protocols for all potential network topologies
and attacks. The optimizations have been applied by using equivalence classes for classifying
9. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
29
reducing the number of possible topologies to be considered for analysis. The results of the
proposal are motivational.
6.2.2 Modified DSR (MDSR): In [41] authors proposed a Modified DSR (MDSR) routing
protocols that note only detect intrusion, but also classifies the nodes as malicious nodes and
finally ensure that malicious nodes no longer considered as part of the routes. Each time new
node which is suspected to be malicious is confirmed for its suspicious behavior it is added to
black list of each node. MDSR considers a special kind of black hole attack called Selective
Black Hole attack. MDSR uses Intrusion Detection System (IDS) nodes placed across the
network and remain in promiscuous mode. These nodes come into action only when these nodes
are first informed of malicious nodes by destination nodes. MDSR consider four new kind of
packets called Query REQest (QREQ), Query REPly (QREP), Malicious Node REQest
(MNREQ) and ALARM. Destination nodes initiates suspicious node detection with QREQ which
is replied through QREP.
Table 1 Parametric Analysis of Secure Routing Protocols
Reference Keys RRE
Q
RRE
P
Node
Authen
tication
Reactive/
Proactive
/Hybrid
Attacks Identify
Sanzgiri, K.
et.[19]
1. PKI Yes Yes Yes Reactive 1. Malicious
Hu, Y. C.
et.[20]
1. PKI -- -- Yes Proactive 1. Modification
Papadimitra
tos, P. et
[22]
1.
Symmetric
key
Yes No Yes Reactive
Hu, Y. C.
et.[23]
Yes No Yes Reactive 1. Wormhole
2. Feedback loop
3. Honest node manipulation,
4.Detection of compromised node
Zapata et
[24]
1. PKI Yes Yes Yes Reactive 1. Modification
2. Fabrication
Mouftah,
H. et.[25]
1. PKI Yes No Yes Reactive 1. DoS
Awerbuch,
B. et.[26]
1. Fault
Detection
Based
Yes Yes Yes Reactive 1. Byzantine
2. Malicious Nodes
Marti, S.
et.[2]
1.
Reputation
Based
Yes No Yes Reactive 1. Malicious Nodes
2. Selfish Nodes
Buchegger,
S. et.[27]
1. Trust and
Reputation
Based
Yes Yes Yes Reactive 1. Selfish Nodes
Lou, W. et.
[29]
1. Multiple
Shares via
Multipath
---- ---- ----- Reactive 1. Modification
2. Fabrication
Ramanujan,
R.et. [30]
1. Intrusion
Detection
Modelling
Yes No Yes Reactive 1. DoS
2. Malicious Nodes
Kim, J. et.
[39]
1. PKC Yes Yes Yes Reactive 1. Feedback Loop
2. Honest Node Manipulation
Andel, T.
R. et al.
[40]
-------- Yes Yes Yes Reactive
Mohanapriy
a, M. Et.
[41]
1. IDS based
Modelling
2. PKI
Yes Yes ---- Reactive 1. Malicious Nodes
2. Black hole
Adnane, A.
et. [42]
1. Trust
based on
----- ----- ---- Reactive 1. Malicious Node
2. Selfish Node
10. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
30
Trust
Language
3. Identity Spoofing
4. Black hole
Qazi, S.,
Raad et.
[43]
1. Round
Trip Time
based
----- ----- ----- Reactive 1.Wormhole attack
Kargl, F.
et. [44]
1.
Asymmetric
key
Yes Yes Yes Reactive 1. Information Leakage
2. Malicious Nodes
3. Selfish Nodes
Choudhury,
D. R. et.
[45]
------ ------ ------ ------ Reactive 1. Black hole
Das, D.
et.[46]
------ ------ ------ ------ Reactive 1. Selfish Nodes
Dholey, M.
K. et.[47]
1. PKI
2.Group key
------ Yes Yes Reactive 1. Malicious
Raza, I.
et.[48]
1. Trust
Based
RREQ RRE
P
Yes Reactive 1.Impersonation
2. Collusion
3. Black hole
4. Malicious
Von
Mulert, J.
et.[49]
1.Simulation
analysis
------ ------
-
------- Reactive 1. Misbehaviour
2. Resources limitation effects
3. Black-hole
4. Wormhole
QREQ is for a node two hop away, and helps each node in concluding whether intermediate node
can be put into suspicious category provided Probably Malicious (PM) scores of node reached a
threshold level. Once a node is suspected as malicious, IDS nodes placed near to PM node switch
into promiscuous state. Source is asked to send another series of data packets. If malicious node
still drops the packets, IDS nodes circulates this information to all the nodes through nearby IDS
nodes. The performance degradation due to increase in Communication overhead was reported
8% compared to DSR. The MDSR was evaluated for end-to-end and packet drop ratio and
overhead (bits/sec).
6.2.3 Trust based Secure OLSR: In [42] authors proposed a new approach to secure OLSR
routing protocol called trust based secure OLSR. OLSR is link state routing protocol with
selective broadcast forwarding through forwarders. Considering Trust based approach is justified
by very nature of Ad hoc network which functionally depends upon the co-operations with
neighbouring nodes. Authors referred trust language specified in [43] and specify trust classes.
Trust classes are defined on the basis of role of nodes and context of operation. As Multi Point
Relay (MPRs) are functional specification of OLSR, secure version consider trust based
forwarding by MPRs. OLSR routing tables maintain single and shortest route towards each node.
This is exploited by malicious or compromised nodes to provide false information about the
topology of network and disrupt normal functioning of OLSR. To detect any anomaly in the
topology being circulated and to identify malicious nodes OLSR messages, TC and Hello, are
checked for consistency. Nodes in the proposed secure OLSR has to check its trust relationship
with MPRs via MPR’s behaviour in generation of TC messages about the topology and
forwarding of data packets and TC messages. If the behaviour of nodes resembles to as expected
in OLSR then nodes have correct relationship with their MPRs otherwise, an incorrect
relationship. This approach classifies nodes with malicious behaviour. Authors called it trust
based reasoning. On the basis of trust based reasoning nodes themselves validate their trust
relationships with nodes. The simulation of the proposed work was done in Glomosim and
various attacks like flooding, hello message, Identity spoofing, Black Hole attacks were
considered for analysis.
6.2.4 RTT based Wormhole Detection in Reactive Routing: In [43] authors presented a
solution against wormhole attack on the basis round trip time (RTT) for packets. Authors replaced
11. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
31
complex solution with limited usability with a feasible solution. RTT calculations also include the
computations on queuing and processing delays across multiple hops in the network. Authors
assumed fixed number of malicious nodes M>1. Each packet like RREQ and RREP is divided
into two parts, Fixed and Dynamic. Dynamic parts carry information like time stamp and packet
size etc. On the basis prevailing data rates RTT is computed and conclude if any wormhole is
present. The proposal considered the evaluations against packet encapsulation wormhole, out-of-
band, high-power-transmission and packet relay wormholes. This proposal considered multi-rate
Ad hoc networks which were not considered earlier. The detection of wormholes in each instance
of wormhole type was highly promising.
6.2.5 Secure DSR (SDSR): In [44] authors presented Secure DSR (SDSR) protocol. To address
the issues related to malicious behaviour, selfish behaviour and information leakage like attacks
SDSR sets several goals like ensuring integrity of routes, freshness of routes, exchange of session
keys and authentication of participating nodes. MANET-ID based concept which in-fact RSA key
pair that prevent against forging new node Id. SDSR is based on asymmetric key cryptography.
The RREQ with several static information and nonce is signed with private key called MANET-
ID and across the nodes on source to destination nonce is transformed by each node. During
RREP traversal, intermediate nodes may verify the source route and revert the transformations to
nonce. For secure data exchange session keys are exchanges using Diffie –Hellman key
exchange. The use of nonce transformations prevents against any route modifications. SDSR
attempts validation using BAN formalism and proves that SDSR is better approach to secure
DSR.
6.2.6 Detection of Black Hole in DSR: In [45] also authors presented a proposal to counter black
hole attack. A modification is applied to the source of any RREQ. A table called RREQ_Tab for
storing more than one RREP corresponding to a RREQ, a timer M_WAIT_TIME upto which
source will receive RREP and arrange them in RREQ_Tab. M_WAIT_TIME is set to half of the
RREP_WAIT_TIME. An implementation of the proposal was carried out in ns2. Authors lacked
the clarity of the idea and its presentation in the proposal.
6.2.7 Least Cost Total Factor (LCTF) based Reactive Routing: In [46] authors presented a
solution to identify the selfish nodes and guarantee of shortest path between source and
destination by using game theoretic approach and Least Cost Total Factor (LCTF) respectively. If
any route is broken, then proposal guarantee of selection next least cost path between source and
destination. Game theoretic approach uses the relationship between players and can predict the
decisions of players optimally. This approach is used to predict the behaviour of nodes and
classify selfish nodes. The network and all its nodes will benefit only if there is cooperation. This
proposal considered non-cooperative game model. Each node has associated Cost Factor (CF)
which is calculated on the basis of distance from other nodes, power availability, bandwidth etc.
To route a packet via this node other nodes has to pay cost CF to this node. The objective
function of this game theoretic approach is maximizing utility or CF payoffs for each node. As
only forwarding packets earn benefits and dropping causes payoffs during sending own packets,
selfish nodes leads to own bankruptcy, so nodes are by default pushed for cooperation and avoid
boycott as selfish nodes. Nodes not forwarding RREQ packets are allowed to repeat selfish
behaviour until their potential misbehaviour not reached upper threshold value. Reaching to
threshold value helps source to conclude on the selfish behaviour and propagate to blacklist node
as selfish node. Using same concept proposal identifies selfish nodes which deny to forward data
and acknowledgement packets. The simulation based implementation is not discussed in the
proposal and lacks the ground.
6.2.8 Group key based Malicious Node Detection in Reactive Routing: In [47] authors
proposed an algorithm to overcome the challenge of malicious node between source and
12. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
32
destination during RREP. Cryptographic material like public key, private key and group key is
used to tackle the challenge. The group key is updated when a new node joins the group. Nodes
establish a group with the nodes in its neighbourhood. This prevents the intruder from obtaining
any information of who is the source and present wrong information to the source. The exchange
of the keys is established using Group Diffie-Hellmen key exchange protocol. The ability of the
proposal to defend was established through conceptual steps.
6.2.9 Distributed Trust based Secure AODV: In [48] authors proposed to protect AODV
against impersonation, collusion and black hole attacks. All these solution are handled using
malicious node detection based on reputation of a node. Reputation is other node’s opinion about
a particular node. Trust level below a threshold is alarming situation and factor out a node from
taking part in any route determination in AODV. AODV packet format was not altered and no
overhead thus introduced. Nodes behave as a guard nodes as well as normal nodes. Nodes
compute trust of other nodes and routes on the basis of their behaviour by over-hearing their
transmissions. A simple approach in terms of concept and overhead is proposed in fact.
6.2.10 Security Analysis of AODV and SAODV: In [49] authors presented a review on the
strengths and security limitations of AODV and SAODV. SAODV is security extension of
AODV using some symmetric key cryptography and end-to-end security provisioning. Authors
conducted vulnerability tests of SAODV and identified some unresolved issues like such as MAC
layer misbehaviour, resources limitation effects, Black-hole attack, and different types of
wormhole attacks etc. This analysis was extended to compare the schemes under self-healing
category, trust based schemes, directional antennae based proposals and IDS based approaches.
The review presented by authors identified the gaps left in various proposals.
7. CONCLUSION
This paper has discussed security issues, goals along with a detailed review of historic and current
perspective in secure routing schemes for MANETs. Table 1 presents the conclusions in tabular
form. Each protocol has different operational requirements and provides protection against
different attacks by using specific approaches. Secure routing protocols are method of choice over
IDS and key management. Historic proposals either stressed to improve the RREP or RREQ.
Historic solutions don’t consider the extra transmission by nodes which are not going to be the
part of the routes, misbehaviour of nodes, and honest node manipulation by malicious nodes.
Current solutions consider security provisioning in both, RREP and RREQ. Trust based solutions
have also been proposed with reputations of nodes being computed on the basis of forwarding
behaviours of nodes. Overhead of security provisioning in existing or new routing protocols adds
overhead in terms of communication, storage and computation. Future work on secure routing
schemes may consider location specific keying information for reduced storage and
communication overheads. Heterogeneity of nodes may be considered for resource harness.
REFERENCES
[1] Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV)
routing (No. RFC 3561).
[2] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile
ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and
networking (pp. 255-265). ACM.
[3] Perkins, C. E., & Bhagwat, P. (1994, October). Highly dynamic destination-sequenced distance-
vector routing (DSDV) for mobile computers. In ACM SIGCOMM computer communication
review (Vol. 24, No. 4, pp. 234-244). ACM.
[4] Clausen, T., & Jacquet, P. (2003). Optimized link state routing protocol (OLSR) (No. RFC 3626).
[5] Johnson, D. B., Maltz, D. A., Hu, Y. C., & Jetcheva, J. (2003). The dynamic source routing (DSR)
protocol for mobile ad hoc networks. IETF Draft, draft-ietf-manet-dsr-009. txt.
13. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
33
[6] Park, V., & Corson, M. S. (1997). Temporally-ordered routing algorithm (TORA) version 1
functional specification (pp. 2-6). Internet-Draft, draft-ietf-manet-tora-spec-00. txt.
[7] LUNDBERG, J. Security in Ad hoc networks. 2000). http://citeseer. nj. nec. com/400961. html.
[8] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile
ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and
networking (pp. 255-265). ACM.
[9] Toner, S., & O’Mahony, D. (2003, January). Self-organising node address management in ad hoc
networks. In Personal Wireless Communications (pp. 476-483). Springer Berlin Heidelberg.
[10] Wu, B., Wu, J., & Dong, Y. (2009). An efficient group key management scheme for mobile ad hoc
networks. International Journal of Security and Networks, 4(1-2), 125-134.
[11] Northcutt, S., & Novak, J. (2002). Network intrusion detection. Sams Publishing.
[12] Khan, S., Loo, K. K., & Din, Z. U. (2010). Framework for intrusion detection in IEEE 802.11
wireless mesh networks. Int. Arab J. Inf. Technol., 7(4), 435-440.
[13] Chen, T., Kuo, G. S., Li, Z. P., & Zhu, G. M. (2007).Intrusion detection in wireless mesh
networks (pp. 146-169). CRC Press, New York, NY, USA.
[14] Rafsanjani, M. K., Movaghar, A., & Koroupi, F. (2008). Investigating intrusion detection systems in
MANET and comparing IDSs for detecting misbehaving nodes. World Academy of Science,
Engineering and Technology, 20, 351-355.
[15] Ramanathan, S., & Steenstrup, M. (1996). A survey of routing techniques for mobile communications
networks. Mobile Networks and Applications, 1(2), 89-104.
[16] Zeng, Q. A., & Agrawal, D. P. (2002). Introduction to wireless and mobile systems. CENGAGE
Learning.
[17] Macker, J. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and
evaluation considerations.
[18] Forouzan, B. A. (2007). Cryptography & Network Security. McGraw-Hill, Inc.
[19] Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2005).
Authenticated routing for ad hoc networks. Selected Areas in Communications, IEEE Journal
on, 23(3), 598-610.
[20] Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for
mobile wireless ad hoc networks. Ad hoc networks,1(1), 175-192.
[21] Perkins, C. E., & Bhagwat, P. (1994, October). Highly dynamic destination-sequenced distance-
vector routing (DSDV) for mobile computers. In ACM SIGCOMM computer communication
review (Vol. 24, No. 4, pp. 234-244). ACM.
[22] Papadimitratos, P., Haas, Z. J., & Samar, P. (2002). The Secure Routing Protocol (SRP) for Ad Hoc
Networks: IETF Internet Draft draft-papadimitratos-secure-routing-protocol-00. txt.
[23] Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad
hoc networks. Wireless networks, 11(1-2), 21-38.
[24] Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE
Mobile Computing and Communications Review, 6(3), 106-107.
[25] Mouftah, H., & Ho, P. H. (2001, March). SLSP: A new path protection scheme for the optical
Internet. In Optical Fiber Communication Conference (p. TuO1). Optical Society of America.
[26] Awerbuch, B., Holmer, D., Nita-Rotaru, C., & Rubens, H. (2002, September). An on-demand secure
routing protocol resilient to byzantine failures. In Proceedings of the 1st ACM workshop on Wireless
security (pp. 21-30). ACM.
[27] Buchegger, S., & Le Boudec, J. Y. (2002, June). Performance analysis of the CONFIDANT protocol.
In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &
computing (pp. 226-236). ACM.
[28] Yi, S., Naldurg, P., & Kravets, R. (2001, October). Security-aware ad hoc routing for wireless
networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking &
computing (pp. 299-302). ACM.
[29] Lou, W., Liu, W., & Fang, Y. (2004, March). SPREAD: Enhancing data confidentiality in mobile ad
hoc networks. In INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and
Communications Societies (Vol. 4, pp. 2404-2413). IEEE.
[30] Ramanujan, R., Ahamad, A., Bonney, J., Hagelstrom, R., & Thurber, K. (2000). Techniques for
intrusion-resistant ad hoc routing algorithms (TIARA). In MILCOM 2000. 21st Century Military
Communications Conference Proceedings (Vol. 2, pp. 660-664). IEEE.
[31] Papadimitratos, P., & Haas, Z. J. (2003). Secure message transmission in mobile ad hoc networks.Ad
Hoc Networks, 1(1), 193-209.
14. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
34
[32] Atkinson, R., & Kent, S. (1998). Security architecture for the internet protocol.
[33] Raymond, J. F. (2001, January). Traffic analysis: Protocols, attacks, design issues, and open
problems. In Designing Privacy Enhancing Technologies (pp. 10-29). Springer Berlin Heidelberg.
[34] Sufatrio, K., & Lam, K. Y. (1999). Scalable Authentication Framework for Mobile IP (SAFE-MIP).
Internet Draft, draft-riomobileip-safe-mip-00. txt.
[35] Rabin, M. O. (1989). Efficient dispersal of information for security, load balancing, and fault
tolerance. Journal of the ACM (JACM), 36(2), 335-348.
[36] Raymond, J. F. (2001, January). Traffic analysis: Protocols, attacks, design issues, and open
problems. In Designing Privacy Enhancing Technologies (pp. 10-29). Springer Berlin Heidelberg.
[37] Vasudevan, R. A., & Sanyal, S. (2011). A novel multipath approach to security in mobile ad hoc
networks (MANETs). arXiv preprint arXiv:1112.2128.
[38] Rivest, R. L. (1997, January). All-or-nothing encryption and the package transform. In Fast Software
Encryption (pp. 210-218). Springer Berlin Heidelberg.
[39] Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in
MANETs. Ad Hoc Networks, 7(6), 1097-1109.
[40] Andel, T. R., Back, G., & Yasinsac, A. (2011). Automating the security analysis process of secure ad
hoc routing protocols. Simulation Modelling Practice and Theory, 19(9), 2032-2049.
[41] Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of
selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530-538.
[42] Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the OLSR routing
protocol. Computer Communications, 36(10), 1159-1171.
[43] Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2013). Securing DSR against wormhole attacks in multirate
ad hoc networks. Journal of Network and Computer Applications, 36(2), 582-592.
[44] Kargl, F., Schlott, S., & Weber, M. (2005, January). Secure dynamic source routing. In null (p. 320c).
IEEE.
[45] Choudhury, D. R., Ragha, L., & Marathe, N. (2015). Implementing and Improving the Performance of
AODV by Receive Reply Method and Securing it from Black Hole Attack. Procedia Computer
Science, 45, 564-570.
[46] Das, D., Majumder, K., & Dasgupta, A. (2015). Selfish node detection and low cost data transmission
in MANET using game theory. Procedia Computer Science, 54, 92-101.
[47] Dholey, M. K., & Biswas, G. P. (2015). Proposal to Provide Security in MANET's DSRRouting
Protocol.Procedia Computer Science, 48, 440-446.
[48] Raza, I., & Hussain, S. A. (2008). Identification of malicious nodes in an AODV pure Ad hoc
network through guard nodes. Computer Communications,31(9), 1796-1802.
[49] Von Mulert, J., Welch, I., & Seah, W. K. (2012). Security threats and solutions in MANETs: A case
study using AODV and SAODV. Journal of network and computer applications, 35(4), 1249-1259.
AUTHORS
Amit Kumar is presently working as Assistant Professor, in IT department, M.
M.University, Mullana, India. He is also looking after IT infrastructure i.e. data
center & university network etc. in the capacity of System Analyst. He has obtained
his M. Sc. in Computer Science from Kurukshetra University, India, in 2006. He
completed his Masters in Technology in IT Engineering from M.M. University,
Mullana, India, in 2010. He is a Cisco Certified Network Associate (CCNA-2011).
He is a candidate for Ph. D from Computer Sc. & Engineering Department in M.M
University. His Interest lies in Networks, Security and Optimization.
Dr. Vijay Kumar Katiyar born in Kanpur, India, on 30th June 1972. He received
his Ph.D degree from M. M. University Mullana, Ambala, Haryana and B.E & M.E.
degrees from Kumaon University Nainital (U.P) and NIITR, Chandigarh
respectively. He has supervised 25 M. Tech and 1 M. Phil candidates. His research
interests are in Wireless Sensor Networks, Reliability Theory and Artificial Neural
Networks, etc. He has about 18 years of experience in teaching. He has published
about 25 research papers in international journals of repute. Presently he is
supervising 8 Ph. D and 8 M. Tech candidates.
15. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
35
Dr. Kamal Kumar received his Ph. D in Wireless Sensor Networks, from Thapar
University in 2014. He received his M.Tech. as well as B.Tech degree from
Kurukshetra University, Kurukshetra, India. Presently he is working as Assistant
Professor (Selection Grade) in Centre for Information Technology (CIT) in
University of Petroleum and Energy Studies. He has also served as Associate
Professor in Computer Engineering Department in M.M. Engineering College,
Ambala, India. His research interest lies in WSNs, Adhoc Networks, MANETs,
Security Issues in Wireless Networks and Grid Computing. He has published 18
research papers in SCI Journals, Referred Journals and International Conferences.
He has served TPC member of many IEEE sponsored International Conferences. He has served as reviewer
in SCI Journals.