The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Security in Mobile Ad Hoc Network became very important due to the nature of wireless communication
between the nodes and the rapid movement of node which make Mobile Ad hoc Network vulnerable to
Attackers. Jamming is a DoS attack’s special category used in wireless networks. The attacker disrespects
the medium access control (MAC) protocol and transmits on the shared channel; either periodically or
continuously to target all or some communication, respectively. Distributed coordination function (DCF)
and Point coordination function (PCF) are the two different media access control (MAC) mechanisms
which are specified by the IEEE 802.11standard. PCF can achieve higher throughput than DCF due to the
nature of contention-free, therefore, this paper investigate the impact of PCF when integrated into the
TORA – Based MANET and how it can improve the performance of the network. OPNET – Based
simulation scenarios were created and the simulation was run and the results were collected which
investigate that PCF provided a good functionality to improve deficiency caused by the Jammers this by
increasing the throughput and decreasing the delay which is affected by the Jammers. PCF was a good
improvement with different levels of Jammers’ transmission power.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Security in Mobile Ad Hoc Network became very important due to the nature of wireless communication
between the nodes and the rapid movement of node which make Mobile Ad hoc Network vulnerable to
Attackers. Jamming is a DoS attack’s special category used in wireless networks. The attacker disrespects
the medium access control (MAC) protocol and transmits on the shared channel; either periodically or
continuously to target all or some communication, respectively. Distributed coordination function (DCF)
and Point coordination function (PCF) are the two different media access control (MAC) mechanisms
which are specified by the IEEE 802.11standard. PCF can achieve higher throughput than DCF due to the
nature of contention-free, therefore, this paper investigate the impact of PCF when integrated into the
TORA – Based MANET and how it can improve the performance of the network. OPNET – Based
simulation scenarios were created and the simulation was run and the results were collected which
investigate that PCF provided a good functionality to improve deficiency caused by the Jammers this by
increasing the throughput and decreasing the delay which is affected by the Jammers. PCF was a good
improvement with different levels of Jammers’ transmission power.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Source based Security Issues in WDM Systems IJECEIAES
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Source based Security Issues in WDM Systems IJECEIAES
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
This paper deals with protecting all-optical networks (AON) from security attacks at the physical level. It firstly presents an overall high level protocol for establishment, management and on-the-fly restoration of optimal secure lightpaths established by applying constraint-based open shortest path first (OSPF) source routing using proposed security databases of components. Secondly it presents a protocol for using fiber diversity between adjacent nodes to protect against attacks on fiber links. Thirdly it presents analytical models of propagation of security attacks on optical amplifiers and switches. These models are then used to develop security envelopes around these components, to calculate security indices and on-the-fly real-time restoration of components in case of an attack. Fourthly it presents simulation results for evaluation of the performance of these on-the-fly restoration schemes. These on-the-fly restoration schemes eliminate need for tearing down of attacked lightpaths and prevent consequent loss of large amount of data.
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
A security method for multiple attacks in sensor networks against the false r...ijitjournal
In a large scale wireless sensor network, various attacks rapidly spread damages in the network from
inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively.
These attacks drain finite energy resources and devastate constructed routing paths via compromised
nodes. The security methods like SEF (statistical en-route filtering scheme) and LEAP (localized encryption
and authentication protocol) try to cope with these attacks. When these attacks occur at the same time, SEF
and LEAP should be operated simultaneously in the sensor network thus, it introduces some inefficiency. In
this paper, we propose a security method which improves the energy efficiency while maintaining the
security level compared to the simultaneous application of SEF and LEAP. The proposed method is
designed by identifying and eliminating the redundancies within the simultaneous application of the two
methods and providing more efficient functionalities. In the proposed method, two types of new keys are
designed and provided for simultaneous detection of the attacks. Four types of keys are used in each sensor
node – a P1 for encrypting information, a PK (pairwise key) for keeping secure paths, a P2 for verifying a
specific cluster, and a GK (group key) for encrypting message. Among these keys, P1 and P2 are newly
provided keys. We have evaluated the effectiveness of the proposed method compared to the simultaneous
application of SEF and LEAP when the multiple attacks occur. The experiment results show that our
proposed method saves energy up to 10% while maintaining the detection power
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security issues. One of the major security issues is the wormhole attack while finding the shortest path. The aim of this paper is to propose an algorithm to find a secure shortest path against wormhole attack. Existing algorithms are mainly concentrated on detecting the malicious node but they are hardware specific like directional antennas and synchronized clocks. But the proposed algorithm is both software and hardware specific. RTOS is included to make the ad hoc network a real time application.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
Similar to SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECURITY MECHANISM (20)
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECURITY MECHANISM
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
DOI : 10.5121/ijasuc.2012.3306 79
SECURING MOBILE AD-HOC NETWORKS AGAINST
JAMMING ATTACKS THROUGH UNIFIED SECURITY
MECHANISM
Arif Sari1
and Dr. Beran Necat2
1
Department of Management Information Systems, The American University of Cyprus,
Kyrenia, Cyprus
arifsarii@gmail.com
2
Department of Management Information Systems, The American University of Cyprus,
Kyrenia, Cyprus
bnecat@gau.edu.tr
ABSTRACT
The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-to-
Send (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
KEYWORDS
MANET, OPNET Simulation, PCF, RTS/CTS, Jamming Attack, Unified Security
Mechanism
1. INTRODUCTION
The IEEE 802.11 attacks are investigated in different studies by researchers. The most popular
attack model of IEEE 802.11 is Jamming Attacks. Jamming is defined as a Denial of Service
(DoS) attack that interferes with the communication between nodes. The objective of the
adversary causing a jamming attack is to prevent a legitimate sender or receiver from
transmitting or receiving packets on the network. Adversaries or malicious nodes can launch
jamming attacks at multiple layers of the protocol suite. In the later section of this research, the
jamming attacks are simulated on MANETs that result in collisions in the mobile wireless
network. The jamming is divided into two categories as Physical and Virtual Jamming attacks.
The physical jamming is launched by continuous transmissions and/or by causing packet
collisions at the receiver. Virtual jamming occurs at the MAC layer by attacks on control frames
or data frames in IEEE 802.11 protocol [1].
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
80
Physical or Radio jamming in a wireless medium is a simple but disruptive form of DoS attack.
These attacks are launched by either a continuous emission of radio signals or by sending
random bits onto the channel [2]. The jammers causing these attacks can deny complete access
to the channel by monopolizing the wireless medium. The nodes trying to communicate have an
unusually large carrier sensing time waiting for the channel to become idle. This has an adverse
propagating effect as the nodes enter into large exponential back-off periods.
Virtual Jamming Attacks can be launched at the MAC layer through attacks on the RTS/CTS
(Rate to Send/Clear to Send) frames or DATA frames [1, 3]. A significant advantage of MAC
layer jamming is that the attacker node consumes less power in targeting these attacks as
compared to the physical radio jamming. Here, we focus on DoS attacks at the MAC layer
resulting in collision of RTS/CTS control frames or the DATA frames. In virtual jamming
attack malicious node sent RTS packets continuously on the transmission with unlimited period
of time. During this entire process malicious node effectively jam the transmission with a large
segment of transmission on the wireless channel with small expenditure of power. This attack is
much effective than physical layer jamming as this attack consume less battery power compare
to the other physical layer jamming attack. For example node M is a malicious node and it
starting sending a false RTS packet to node R with a large frame. When nodes G and H receive
packet on wireless channel they both become blocked for a certain amount of time as apply for
node M as shown on the Figure 1 below [4].
Figure 1. Jamming Attack
On the other hand, there are variety of problems occurred during provision of security in Mobile
Ad Hoc Networks. A practically operating MANET must consider the trade-off between the
deployment feasibility of a security patch and the system efficiency. And often, the feasibility is
considered over the efficiency [5, 6]. The feasibility of a deployment (accessibility and cost)
mostly depends on the deployment location. Based on this concept, the security strategies are
classified as attacker-side strategies, victim-side strategies, and intermediate strategies in [7].
This taxonomy makes more practical sense to evaluate a security strategy than other
taxonomies, e.g. activity level or cooperation degree [8]. My thesis will discuss the proposed
solution based on this taxonomy by differentiating itself from the proposed solution
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
81
2. PROPOSED METHOD
The proposed method applied for preventing and mitigating jamming attacks is implemented at
the MAC layer that consist combination of different coordination mechanisms. The network
throughput may degrade due to the Request to Send (RTS) collision problem, for that reason
RTS/CTS fragmentation thresholds are also involved into this mechanism. Wireless medium
access control (MAC) protocols have to coordinate the transmissions of the nodes on the
common transmission medium. The IEEE 802.11 working group proposed two different
algorithms for contention resolution. These coordination functions of the MAC Layer are shown
on the Figure 2 below. The first one is Distributed Coordination Function (DCF) which is
completely distributed and the second one is Point Coordination Function (PCF) that has a
centralized access protocol. The PCF requires a central decision maker such as a base station
while DCF uses a carrier sense multiple access/collision avoidance protocol (CSMA/CA) for
resolving channel contention among multiple wireless hosts. The malicious or selfish nodes are
not forced to follow the normal operational functions of the protocols. The method implemented
in this research study is PCF since in the link layer; a selfish or malicious node could interrupt
either contention-based MAC protocols. A malicious jammer may also corrupt the frames easily
by injecting some bits into the radio channel or launch DoS attack by exploiting the binary
exponential backoff scheme.
Figure 2. PCF and DCF Functionalities
In order to prevent and secure the network from hidden jammer node attacks and prevent
collisions on the network, the Request to Send/Clear to Send (RTS/CTS) mechanism is also
implemented. The RTS/CTS mechanism is a handshaking process that minimizes the
occurrence of collisions when hidden nodes are operating on the network. The implementation
of RTS/CTS mechanism will be illustrated in the next section of the research through the
simulation experiment.
The working mechanism of RTS/CTS implementation is illustrated in Figure 3 below.
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
82
Figure 3. RTS/CTS working mechanism
As it is shown in Figure 3 above , the AP mobile node receives RTS data from Mobile node A
and replies to it with a CTS frame while authenticating it to send data. Meanwhile, the Mobile
Node B receives the CTS frame since the Mobile Node A is sending data and the mechanism
informs the mobile Node B that the AP is transmitting or receiving data at that time frame. This
makes Mobile Node B to wait for a particular time. When a jamming attack is launched on the
network, fake RTS frames are sent to the AP mobile node that keeps the medium busy and
prevents other nodes from being able to commence with legitimate MAC operations, or
introduces packet collisions causing forced and repeated back offs. Figure 4 below illustrates the
unified security mechanism implemented on the mac layer that consists of both RTS/CTS and
PCF mechanisms.
Figure 4. Structure of Proposed Unified mechanism
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
83
The proposed unified security mechanism is illustrated as a combined state in Figure 4 above.
The figure shows Short InterFrame Spacing (SIFS), PCF InterFrame Spacing (PIFS), DCF
InterFrame Spacing (DIFS) and Extended Inter Frame Spacing (EIFS). The interframe space
(IFS) is defined to provide priority-based access to the radio channel. The shortest Interframe
Space (SIFS) is used for Clear to Send (CTS) and poll response frames. DIFS is the longest IFS
and is used as the minimum delay for asynchronous frames contending for access. PIFS is the
middle IFS and is used for issuing polls by the centralized controller in the PCF scheme. This
model illustrates the combination of RTS/CTS mechanisms with the PCF mechanism to
enhance overall network throughput. In the next section, the mechanism is implemented on the
node specific node models through the OPNET simulation experiment.
3. SIMULATION MODEL AND EXPERIMENT DESIGN
The tool used for the simulation study is OPNET 14.0 modeller. OPNET is a network and
application based software used for network management and analysis [9-10]. OPNET models
communication devices, various protocols, architecture of different networks and technologies
and provides simulation of their performances in the virtual environment. OPNET provides
various research and development solutions which helps in the research of analysis and
improvement of wireless technologies like WIMAX, Wi-Fi, UMTS, analysis and designing of
MANET protocols, improving core network technology, providing power management
solutions in wireless sensor networks. In our case we used OPNET for modelling of network
nodes, selecting its statistics and then running its simulation to get the result for analysis.
In this simulation experiment, 3 different scenarios are created and illustrated through the
OPNET simulation package. All scenarios and nodes in these scenarios share the same global
attributes during the simulation experiment. These attributes and parameters are set for creation
of the simulation environment in the OPNET simulation package. Table 1 below shows the
simulation parameters used in OPNET simulation in more detail.
Table 1. Global Simulation Parameters for the Experiment
Parameters Attributes
Protocol AODV
Simulation Time 300 (seconds)
Simulation Area 1000 x 1000 (meters)
Pause Time 100 Seconds
Mobility Model Random Waypoint
Mobility m/s 10meters/seconds
Performance Parameters Throughput, Delay, Load, Data Drop Rate
Transmit Power(W) 0.005
RTS Threshold (bytes) 1024 (bytes)
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
84
Data Rate (Mbps) 11Mbps
Pkt. Reception power Threshold -95
Buffer Size 1024000
Pkt. Size (bits) 2000 (exponential)
Pkt. Interarrival time (seconds) .03 (exponential)
Trajectory VECTOR
Start time (seconds) 10
End Time Infinity (End of Simulation time)
No of Seeds 300
Table 3 above represents the global simulation parameters for this experiment. The protocol is
selected as AODV. AODV is one of the reactive protocols. In this protocol when a node wishes
to start transmission with another node in the network to which it has no route; AODV protocol
provides topology information for the node. AODV use control messages to find a route to the
destination node in the network. As it has been mentioned before, there are 3 different scenarios
created in this research.
Figure 5 illustrates the simulation setup of three scenarios comprising of 50 mobile nodes
moving at a constant speed of 10 meters per seconds. All of the scenarios are configured with
mobility of 10 m/s. Number of nodes was constant to detect the impact of attacks and the
simulation time took 300 seconds. The simulation area taken is 1000 x 1000 meters. Packet
Inter-Arrival Time (sec) is taken exponential (0.3) and packet size (bits) is exponential (2000) as
shown on the Table 1. The data rates of mobile nodes are 11 Mbps with the default transmitting
power of 0.005 Watts. Random way point mobility is selected with constant speed of 10
meter/seconds and with pause time of constant 100 seconds. This pause time is taken after data
reaches the destination only. The aim of this simulation experiment was to determine the impact
of jamming attacks on mobile ad hoc networks with ADOV-based protocol and impact of our
prevention mechanism. The protocol is selected as AODV which is a reactive protocol.
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
85
Figure 5. Simulation Scenarios for 50 Mobile Nodes
As shown in Figure 5 there are three different scenarios for a mobile network that is formed
with a 50 MANET node on the area of 1000x1000, mobile network with 50 MANET nodes and
2 mobile jammers within the same area and 50 MANET nodes, 2 mobile jammers with
configured security nodes according to unified security mechanism. The simulation run time is
set as 300 seconds which is equal to 20 minutes. Seed value is set as 300. Simulation Kernel is
set as optimization. Application profile, Profile configuration, and Mobility are configured to
work the network according to our requirements specified in Table 1. The network model
consists of three scenarios. The first scenario is a standard scenario without any misbehaving
node or attack on the network. In this scenario, one of the participating mobile nodes acting as
an access point that represented as “mobile_node_14_AP”. The basic service set identifier value
for the access point is “1” which is global for all other mobile nodes. The basic service set
identifier represents that the all other mobile nodes participate under the same cluster. The
Independent basic service set is used in this research that has no backbone infrastructure and
consists of at least two wireless stations. This type of network is very suitable for the MANET
environment since it can be constructed quickly without much planning. The second scenario
illustrates the Jammer attack with routing implementation AODV. The third scenario illustrates
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
86
the implementation of the proposed security mechanism to prevent jamming attacks on AODV-
based mobile ad-hoc networks.
The modified nodes with PCF and RTS/CTS mechanisms are shown in Figure 6 below. The
modification implemented on the selected guard nodes, including AP node are in order to detect
the communication on the network. The guard nodes deployed on the network are to coordinate
the network functionalities each with assigned same basic service set functions.
Figure 6. Guard Node Implementation modification
As it is shown in Figure 6 above, the PCF functionality of the guard nodes and AP node are
enabled. The data packages that are routed among nodes are transmitted through guard nodes.
The 2 mobile jammers deployed on the network inject malicious traffic through 802.11 radio
channel and cause collision. The mobile guard nodes deployed on the network detect the
malicious traffic and drop the traffic from the corresponding node. The hidden jammer node
problem rises on MANETs when the PCF mechanism is implemented on the network. The
hidden node is a mobile node that communicates with only the AP node and does not
communicate with other mobile nodes within the range. For that reason, the RTS/CTS
mechanism is also enabled and modified with a specific value set.
3.1 MANET TRAFFIC MODEL
The specific MANET traffic parameters are set for this simulation experiment. The traffic
model is used to generate traffic on the network and has a set of applications that generates the
packet in both exponential and constant form when the simulation time starts, with random
destinations or defined destination packet delivery. Furthermore, it is essential to specify a
trajectory for mobile nodes to provide mobility where nodes in the network are constantly
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
87
moving. Table 2 illustrates the parameters defined for the MANET traffic model of this
simulation experiment.
Table 2. MANET Traffic Model Parameters
Attribute Value
Trajectory VECTOR
AD-HOC Routing Parameters
Ad Hoc Routing Protocol AODV
MANET Traffic Generation Parameters
Start Time 10 seconds
Packet Interarrival time .03 seconds (exponential)
Packet Size (bits) 2000 (exponential)
Destination IP Address Random
Stop Time End of Simulation
WLAN Parameters
Data Rate (bps) 11 Mbps
Channel Settings Auto Assigned
Transmit Power 0.005 Watt
RTS Threshold 1024 bytes
Buffer size 1024000 bits
3.2 SCENARIO CREATION
This section describes the different scenarios, and attributes and parameters used in these
scenarios. In the 1st
scenario, the mobile ad hoc network is simulated without any jammers or
misbehaving – malicious traffic. This scenario is created in order to compare the other scenarios
and situations and understand the impact of attack and effectiveness of the detection mechanism
on the network. The 2nd
scenario contains 2 jammers that inject unauthorized traffic into the
network and affect the mobile network that has no specific detection or prevention mechanism
against jamming attacks. The 3rd
scenario which is specifically designed to prevent jamming
attacks on the network has the same characteristics with the proposed prevention mechanism.
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
88
Table 3 below shows the detailed information about scenario parameters. The table shows
different parameters for each scenario.
Table 3 Simulation Parameters for Specific Scenarios
Scenario 1
Parameters Values
Protocol AODV
Simulation
Duration
300sec.
Number of
Seeds
300
Number of
Nodes
50
Transmit Power
(W)
0.005
Data Rate 11Mbps
Packet Size 2000
Number of
Jammers
0
Scenario 2
Parameters Values
Protocol AODV
Simulation
Duration
300sec.
Number of
Seeds
300
Number of
Nodes
50
Transmit Power
(W)
0.005
Data Rate 11Mbps
Packet Size 2000
Number of
Jammers
2
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
89
Scenario 3
Parameters Values
Protocol AODV
Simulation
Duration
300sec.
Number of
Seeds
300
Number of
Nodes
50
Transmit Power
(W)
0.005
Data Rate 11Mbps
Packet Size 2000
Number of
Jammers
2
Number IDS
Node
5
The main reason for simulating the scenario 1 where no malicious node or jammer were used, is
to identify the state of the network under normal conditions and this will help us to compare and
differentiate the impact of a jamming attack on the network in later stages. In the 2nd
scenario,
the jamming attack is simulated on MANET. This scenario is created with 50 mobile nodes like
the 1st
scenario, but 2 jammers are used in this scenario. Each of the jammers are modified
according to the specifications and requirements of the project. The jammer specifications are
illustrated in Table 4 below. The jammers used in this scenario are mobile jammers that are used
to continuously emit a radio signal in order to inject a specific amount of packages to the
network. These jammers are considered to be the most effective type of jammer since they drop
the throughput of the network to zero and when launched they attack for a long period of time
until it runs out of energy. Figure 7 below illustrates the jammer’s source and transmitters that
are used to inject data packets into the network.
Figure 7. Jammer Node Inner Module
Table 4. Jammer Configurations
Parameters Attributes
12. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
90
Transmit
Power(W)
0.005
Trajectory VECTOR
Jammer
Bandwidth
100,000
Jammer Band-base
Frequency
2,402
Pulse Width 2.0
Start time
(seconds)
10
End Time Infinity (End of
Simulation time)
Since the prevention mechanism aims to prevent “jamming attacks”, the jammer designed here
shares the common characteristics of some of the jammer types mentioned in the previous
chapter. However, due to the scope of this work, jamming is any attack to deny service to
legitimate users by generating high Radio Frequency (RF) noise or fake /legitimate protocol
packets with spurious timing effect on the network.
3.3 PERFORMANCE METRICS
The performance metrics chosen for the evaluation and prevention of jamming attacks on
MANETs are network throughput, network load and packet end-to-end delay. Table 5 illustrates
the selected performance metrics for the simulation experiment.
Table 5. Simulation Performance Metrics
Performance
Metrics
Network
Throughput
WLAN Delay
Network Load
WLAN Data
Dropped
The network throughput is the overall performance of the network. It represents the total
number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN
nodes of the network. The WLAN Delay represents the end to end delay of all the packets
13. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
91
received by the wireless LAN MACs of all WLAN nodes in the network and forwarded to the
higher layer. This delay includes medium access delay at the source MAC, reception of all the
fragments individually, and transfers of the frames via AP, if access point functionality is
enabled. The network load represents the statistic that is dimensioned in order to measure the
network load separately for each BSS. Hence, each dimension is a global statistic covering one
WLAN BSS of the network. The statistic represents the total data traffic (in bits/sec) received
by the entire WLAN BSS from the higher layers of the MACs that is accepted and queued for
transmission. This statistic doesn't include any higher layer data traffic that is rejected without
queuing due to full queue or the large size of the data packet. Any data traffic that is relayed by
the AP from its source to its destination within the BSS is counted twice for this statistic (once
at the source node and once at the AP), since such data packets are double-loads for the BSS
because both the source node and the AP have to contend for their transmissions via the shared
medium. The WLAN Data Dropped rate is the total size of the higher layer data packets (in
bits/sec) dropped by all the WLAN MACs in the network due to, full higher layer data buffer, or
the size of the higher layer packet, which is greater than the maximum allowed data size defined
in the IEEE 802.11 standard.
4. SIMULATION RESULTS AND DISCUSSION
After compilation of 3 scenarios with 50 mobile nodes and different parameters for each
scenario, the simulation results are gathered and analyzed in this section. The 3 scenarios are
compiled within a Discrete Event Simulation (DES) environment, and collected information is
analyzed based on the performance metrics mentioned in the section 3.3. According to the
simulation experiment outcomes, the following figures are generated. Figure 8 shows the
throughput performance evaluation of the 3 scenarios.
Figure 8. Average WLAN Throughput Statistics
As it is clearly shown in the Figure above, the WLAN Throughput of the entire network is
analyzed with DES. Scenario 1, represents the scenario with no malicious event and normal
network state, scenario 2 represents the network that is under the jamming attack and scenario 3
represents the mobile jammers and implementation of the proposed method. It can be clearly
seen, that the jamming attack decreases the overall network throughput in comparison to the
14. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
92
normal network state. However, the entire network throughput is increased once the proposed
unified mechanism is implemented. In addition to this, the state of the throughput has increased
more than the no attack scenario after implementing the unified security mechanism. Figure 9
below illustrates the WLAN Delay among scenarios.
Figure 9. Average WLAN Delay Statistics
As it is shown in Figure 9, there is a significant increase observed on MANET delay for
scenario 3 where the proposed mechanism is implemented. However, due to jamming attack on
the network, the increase in MANET delay differs slightly from the normal state of the network
which means that, implementation of such a mechanism leads to an increase in WLAN Delay.
Figure 10 below illustrates the Network Load, which was computed from WLAN.
Figure 10. Average WLAN Network Load
15. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
93
As it can be seen from the above figure, the WLAN Load level is increased when the jamming
attack is launched. On the other hand, the load is decreased when the mechanism is
implemented on the specific nodes in the network. The normal state of the network illustrated
that the network load is around 1,100,000 bits/sec. Figure 11 illustrates the average data
dropped on the WLAN.
Figure 11. Average WLAN Data Dropped Rate
This is the total size of higher layer data packets dropped by all the WLAN MACs in the
network due to full higher layer data buffer or a greater size of the higher layer packet which is
not allowed defined 802.11 standards. As it is shown, there is a significant decrease in buffer
overflow and data drop due to this problem when implementing PCF –RTS/CTS mechanism
together on the MANET. It also decreases the overall data drop rate in comparison to the normal
state of the network.
5. CONCLUSION
The goal of this simulation research study was to observe the impact of a combination of
security mechanisms against jamming attacks. The unified mechanism is implemented on the
selected nodes on the network and deployed in the specific area. The findings of the resarch
clearly states that, the implementation of such unified mechanisms have a significant impact on
the overall network through positively. On the other hand, the implementation of such
mechanisms does not only mitigate the jamming attack effects, it also increases the overall
performance above the normal state of the network. The unified mechanism that contains a
combination of RTS/CTS and PCF shows adequeate performance in MANET. Since 2 mobile
jammers used in this simulation experiment, the proposed security mechansim satisfactorly
mitigated the effects of the jamming attack on the network and increased the overall
performance of the network while improving data drop rate. The data dropped rate decreased
succsseffully. Since the jamming attack leads packet drop rate and low throughput impact on the
network, the rate of delay seems acceptable on the network. Future studies can be carried out to
modify the current model to decrease an overall delay on the network
16. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012
94
REFERENCES
[1] D. Chen, J. Deng, and P. K. Varshney, “Protecting wireless networks against a denial of service attack
based on virtual jamming,” in MOBICOM -Proceedings of the Ninth Annual International Conference
on Mobile Computing and Networking, ACM, 2003.
[2] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming
attacks in wireless networks,” in MobiHoc ’05:Proceedings of the 6th ACM international symposium
on Mobile ad hoc networking and computing, pp. 46–57, 2005.
[3] D. Thuente and M. Acharya, “Intelligent jamming in wireless networks with applications to 802.11b
and other networks,” in Proceedings of the 25th IEEE Communications Society Military
Communications Conference (MILCOM), October 2006.
[4] Ashikur Rahman, Pawel Gburzynski, 2006. Hidden Problems with the Hidden Node Problem.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.365&rep=rep1&type=pdf. [Accessed
Feb – 2012]
[5] S. Convery, D. Miller and S. Sundaralingam, Cisco SAFE: Wireless LAN Security in Depth 2003,
CISCO Whitepaper.
[6] Barbara Guttman, Computer Security Considerations in Federal Procurements: A Guide for
Procurement Initiators, Contracting Officers and Computer Security Officials. 1992, NIST Special
Publication 800-4.
[7] H. W. Fletcher, K. Richardson, M. C. Carlisle and J.A. Hamilton. “Jr. Simulation Experimentation
with Secure Overlay Services”. In Summer Computer Simulation Conference. 2005. Philadelphia, Pa.
[8] A. Habib, M. Hefeeda and B. Bhargava. “Detecting Service Violations and DoS Attacks”. In The 10th
Annual Network and Distributed System Security Symposium 2003. San Diego, California. pp. 177-
189.
[9] Cavin, D., Y. Sasson and A. Schiper, 2002. On the accuracy of MANET simulators. Proceedings of
the 2nd ACM International Workshop on Principles of Mobile Computing, Oct. 30-31, ACM Press,
Toulouse, France, pp: 38-43.
[10] Opnet Technologies, Inc. “Opnet Simulator,” Internet: www.opnet.com, [Accessed May - 2012]