MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
This document summarizes a research paper on a Secure Adaptive Distributed Topology Control Algorithm (SADTCA) for mobile ad hoc networks. The SADTCA aims to organize nodes into clusters, distribute keys, and dynamically determine quarantine regions to mitigate spam attacks. It operates in four phases: 1) detecting malicious nodes, 2) forming clusters headed by cluster leaders, 3) distributing keys to secure communication, and 4) renewing keys periodically. The SADTCA analyzes energy consumption and communication overhead. It also introduces the Elliptic Curve Digital Signature Algorithm to generate highly secure keys with small sizes for authentication. Simulation results show the approach effectively defends against spam attacks while remaining feasible and cost-effective for mobile
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...IJECEIAES
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
This document summarizes a research paper on a Secure Adaptive Distributed Topology Control Algorithm (SADTCA) for mobile ad hoc networks. The SADTCA aims to organize nodes into clusters, distribute keys, and dynamically determine quarantine regions to mitigate spam attacks. It operates in four phases: 1) detecting malicious nodes, 2) forming clusters headed by cluster leaders, 3) distributing keys to secure communication, and 4) renewing keys periodically. The SADTCA analyzes energy consumption and communication overhead. It also introduces the Elliptic Curve Digital Signature Algorithm to generate highly secure keys with small sizes for authentication. Simulation results show the approach effectively defends against spam attacks while remaining feasible and cost-effective for mobile
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the superior
authority or administration. The nodes in network are free to move in any other network at any time. That means
the nodes are join or leave the network at any instant, that's why the security is the major issue in MANET.
Routing protocols are not able to handle the malicious activities of attacker because their function is to provide
the path in between sender to receiver and route data from the path which is selected for transferring information.
This paper proposed the distributed security scheme for providing reliable path and secure communication. The
proposed bloom filtering technique is not only filtering the unwanted infected packets of routing attacker. It's
also recovered the modified data and protects IP modification with the help of new route establishment
mechanism. The proposed bloom filter is provides the secure communication and stop the attacker infection. The
Bloom filter removes the IP modified packets that shows the presence of malicious routing attacker in dynamic
network. The normal routing performance and proposed bloom filter is almost equivalent. The performance of
network is measured through performance metrics and proposed distributed security scheme provides better
performance.
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...IJECEIAES
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
Protocol and technology convergence, the core of near future communication, will soon be forming the interoperating heterogeneous networks. Attaining a strict secure authentication without risking the QoS performance and call success rates is a major concern when it comes to wireless heterogeneous
networks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocol is to be used; a version of which is to be implemented between each two technologies. In this research, different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA
(Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness, signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfying the New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol in
heterogeneous networks.
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET Journal
This document presents a conceptual approach for a cryptographic key distribution scheme for wireless sensor networks (WSN) that depends on the physical location of sensor nodes. The proposed scheme is a pre-distributed key scheme where each node calculates an encryption key based on public identifiers stored in its internal memory, such as coordinates from a global positioning system. The document provides background on WSNs and security issues like various types of attacks they face. It also discusses common security mechanisms used in WSNs, including cryptography and different approaches for key distribution schemes.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Novel framework using dynamic passphrase towards secure and energy-efficient ...IJECEIAES
At Mobile Adhoc Network (MANET) has been long-researched topic in adhoc network owing to the associated advantages in its cost-effective application as well as consistent loophopes owing to its inherent charecteristics. This manuscript draws a relationship between the energy factor and security factor which has not been emphasized in any existing studies much. Review of existing security approaches shows that they are highly attack specific, uses complex encryption, and overlooks the involvement of energy factor in it. Therefore, the proposed system introduces a novel mechanism where security tokens and passphrases are utilized in order to offer better security. The proposed system also introduces the usage of an agent node which communications with mobile nodes using group-based communication system thereby ensuring reduced computational effort of mobile nodes towards establishing secured communication. The outcome shows proposed system offers better outcome in contrast to existing system.
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
Offering a secure communication in wireless adhoc network is yet an openend problem irrespective of archives of existing literatures towards securityenhancement. Inclination towards solving specific forms of attack in adhocnetwork is majorly seen as an existing trend which lowers the applicability ofexisting security solution while application environment or attack scenario ischanged. Therefore, the proposed system implements an analytical securerouting modeling which performs consistent monitoring of the maliciousbehaviour of its neighboring node and formulates decision towards securerouting by the source nodes. Harnessing the potential ofconceptualprobabilistic modeling, the proposed system is capable as well as applicablefor resisting maximum number / types of threats in wireless network.The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
This document summarizes an article that investigates security algorithms for WiMAX networks. It begins by describing the architecture of WiMAX networks, including the user terminals, access service network, and connectivity service network. It then discusses vulnerabilities in the WiMAX standard, including issues at the physical layer and weaknesses in authentication and key management protocols. The document reviews some common denial of service attacks on WiMAX, such as attacks using ranging request/response messages. It also summarizes some existing encryption protocols like DES, TDES, RC2, and RC4. Finally, it suggests the need to address denial of service attacks prior to authentication as a way to improve WiMAX security.
Security optimization of dynamic networks with probabilistic graph modeling a...Pvrtechnologies Nellore
This document summarizes a research paper that presents a probabilistic graph model and algorithms for analyzing network security. It aims to reduce the probability of successful attacks on complex networks that may change dynamically. The model represents network configurations probabilistically to capture uncertainties. It formulates the problem of optimizing network security resources as a linear program to compute optimal placements under constraints. Experiments on real network data show the model accurately computes vulnerability probabilities and efficiently finds optimal security configurations and quantifies risks from mobile devices.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
This document proposes a secure group key management technique for MANETs that uses a combination of broadcast encryption and cluster key agreement. It addresses challenges like restricted communication between group members and the sender, and the lack of a fully trusted third party key generation center. The technique assigns each cluster a public/shared key from a trusted third party. When a sender wants to broadcast to a subgroup, the message is encrypted with the subgroup's public key and broadcast. Non-intended members cannot decrypt the message. The technique provides an efficient way to add or remove members and a flexible rekeying strategy while maintaining security even if members collude. Simulation results using NS2 are presented.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
Engineers have been actively developing tools to detect tumors and to process medical images. Medical image segmentation is a powerful tool that is often used to detect tumors. Many scientists and researchers are working to develop and add more features to this tool. This project is about detecting Brain tumors from MRI images using an interface of GUI in Matlab. Using the GUI, this program can use various combinations of segmentation, filters, and other image processing algorithms to achieve the best results.
We start with filtering the image using Prewitt horizontal edge-emphasizing filter. The next step for detecting tumor is "watershed pixels." The most important part of this project is that all the Matlab programs work with GUI “Matlab guide”. This allows us to use various combinations of filters, and other
image processing techniques to arrive at the best result that can help us detect brain tumors in their early stages.
Process and product quality assurance are very important aspects in development of software. Process
and product quality assurance monitor the software engineering processes and methods to ensure quality.
It is the process of confirming and verifying that whether services and products meet the customer
expectation or not.
This research will identify general measures for the specific goals and its specific practices of Process and
Product Quality Assurance Process Area in Capability Maturity Model Integration (CMMI). CMMI is
developed by Software Engineering Institute (SEI) in Carnegie Mellon University in USA. CMMI is a
framework for assessment and improvement of computer information systems. The procedure we used to
determine the measures is to apply the Goal Questions Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance Process Area in CMMI.
This document summarizes a study on biclustering tools, bicluster validation, and evaluation functions. It begins with definitions of biclustering and types of biclusters in microarray data. It then discusses intra-bicluster and inter-bicluster evaluation functions that measure bicluster coherence and accuracy, respectively. The document outlines statistical and biological methods for validating biclusters, including using gene ontology. Finally, it lists some R tools for biclustering microarray data and association rule mining.
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
Relational Over the last two decades, the
advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper
use
Canny edge detection method for facial expression recognition. Image color space transfor
mation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's fe
atures
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach p
rovides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
Protocol and technology convergence, the core of near future communication, will soon be forming the interoperating heterogeneous networks. Attaining a strict secure authentication without risking the QoS performance and call success rates is a major concern when it comes to wireless heterogeneous
networks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocol is to be used; a version of which is to be implemented between each two technologies. In this research, different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA
(Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness, signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfying the New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol in
heterogeneous networks.
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET Journal
This document presents a conceptual approach for a cryptographic key distribution scheme for wireless sensor networks (WSN) that depends on the physical location of sensor nodes. The proposed scheme is a pre-distributed key scheme where each node calculates an encryption key based on public identifiers stored in its internal memory, such as coordinates from a global positioning system. The document provides background on WSNs and security issues like various types of attacks they face. It also discusses common security mechanisms used in WSNs, including cryptography and different approaches for key distribution schemes.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Novel framework using dynamic passphrase towards secure and energy-efficient ...IJECEIAES
At Mobile Adhoc Network (MANET) has been long-researched topic in adhoc network owing to the associated advantages in its cost-effective application as well as consistent loophopes owing to its inherent charecteristics. This manuscript draws a relationship between the energy factor and security factor which has not been emphasized in any existing studies much. Review of existing security approaches shows that they are highly attack specific, uses complex encryption, and overlooks the involvement of energy factor in it. Therefore, the proposed system introduces a novel mechanism where security tokens and passphrases are utilized in order to offer better security. The proposed system also introduces the usage of an agent node which communications with mobile nodes using group-based communication system thereby ensuring reduced computational effort of mobile nodes towards establishing secured communication. The outcome shows proposed system offers better outcome in contrast to existing system.
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
Offering a secure communication in wireless adhoc network is yet an openend problem irrespective of archives of existing literatures towards securityenhancement. Inclination towards solving specific forms of attack in adhocnetwork is majorly seen as an existing trend which lowers the applicability ofexisting security solution while application environment or attack scenario ischanged. Therefore, the proposed system implements an analytical securerouting modeling which performs consistent monitoring of the maliciousbehaviour of its neighboring node and formulates decision towards securerouting by the source nodes. Harnessing the potential ofconceptualprobabilistic modeling, the proposed system is capable as well as applicablefor resisting maximum number / types of threats in wireless network.The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
This document summarizes an article that investigates security algorithms for WiMAX networks. It begins by describing the architecture of WiMAX networks, including the user terminals, access service network, and connectivity service network. It then discusses vulnerabilities in the WiMAX standard, including issues at the physical layer and weaknesses in authentication and key management protocols. The document reviews some common denial of service attacks on WiMAX, such as attacks using ranging request/response messages. It also summarizes some existing encryption protocols like DES, TDES, RC2, and RC4. Finally, it suggests the need to address denial of service attacks prior to authentication as a way to improve WiMAX security.
Security optimization of dynamic networks with probabilistic graph modeling a...Pvrtechnologies Nellore
This document summarizes a research paper that presents a probabilistic graph model and algorithms for analyzing network security. It aims to reduce the probability of successful attacks on complex networks that may change dynamically. The model represents network configurations probabilistically to capture uncertainties. It formulates the problem of optimizing network security resources as a linear program to compute optimal placements under constraints. Experiments on real network data show the model accurately computes vulnerability probabilities and efficiently finds optimal security configurations and quantifies risks from mobile devices.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
This document proposes a secure group key management technique for MANETs that uses a combination of broadcast encryption and cluster key agreement. It addresses challenges like restricted communication between group members and the sender, and the lack of a fully trusted third party key generation center. The technique assigns each cluster a public/shared key from a trusted third party. When a sender wants to broadcast to a subgroup, the message is encrypted with the subgroup's public key and broadcast. Non-intended members cannot decrypt the message. The technique provides an efficient way to add or remove members and a flexible rekeying strategy while maintaining security even if members collude. Simulation results using NS2 are presented.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
Engineers have been actively developing tools to detect tumors and to process medical images. Medical image segmentation is a powerful tool that is often used to detect tumors. Many scientists and researchers are working to develop and add more features to this tool. This project is about detecting Brain tumors from MRI images using an interface of GUI in Matlab. Using the GUI, this program can use various combinations of segmentation, filters, and other image processing algorithms to achieve the best results.
We start with filtering the image using Prewitt horizontal edge-emphasizing filter. The next step for detecting tumor is "watershed pixels." The most important part of this project is that all the Matlab programs work with GUI “Matlab guide”. This allows us to use various combinations of filters, and other
image processing techniques to arrive at the best result that can help us detect brain tumors in their early stages.
Process and product quality assurance are very important aspects in development of software. Process
and product quality assurance monitor the software engineering processes and methods to ensure quality.
It is the process of confirming and verifying that whether services and products meet the customer
expectation or not.
This research will identify general measures for the specific goals and its specific practices of Process and
Product Quality Assurance Process Area in Capability Maturity Model Integration (CMMI). CMMI is
developed by Software Engineering Institute (SEI) in Carnegie Mellon University in USA. CMMI is a
framework for assessment and improvement of computer information systems. The procedure we used to
determine the measures is to apply the Goal Questions Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance Process Area in CMMI.
This document summarizes a study on biclustering tools, bicluster validation, and evaluation functions. It begins with definitions of biclustering and types of biclusters in microarray data. It then discusses intra-bicluster and inter-bicluster evaluation functions that measure bicluster coherence and accuracy, respectively. The document outlines statistical and biological methods for validating biclusters, including using gene ontology. Finally, it lists some R tools for biclustering microarray data and association rule mining.
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
Relational Over the last two decades, the
advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper
use
Canny edge detection method for facial expression recognition. Image color space transfor
mation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's fe
atures
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach p
rovides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
Due to the environmental pressures on organizations, the demand on Business Process Management
(BPM) automation suites has increased. This led to the arising need for managing process
-
related risks.
Theref
ore the management of risks in business processes has been the subject of many researches during
the past few years. However, most of these researches focused mainly on one or two stages of the BPM
life
cycle and introduced a support for it. This paper aim
s to provide a reference model for Risk
-
Aware BPM
which addresses the whole stages of the BPM life cycle, as well as some current techniques are liste
d for
the implementation of this model. Additionally, a case study for a business process in an Egyptian
university is introduced, in order to apply this model in realworld environment. The results will be
analyzed and concluded
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
The document proposes a dynamic K-means clustering algorithm to improve routing in mobile ad hoc networks (MANETs). It aims to address limitations of the basic K-means algorithm like fixed cluster heads and members. The dynamic algorithm elects cluster heads periodically based on distance to cluster center and node energy. It allows any node to serve as cluster head for a time slot to address head mobility. Experimental results show the dynamic approach enhances MANET routing performance metrics like route discovery time, delay, and packet delivery rate compared to basic K-means routing.
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
M
obile computing
and
Mobile Commerce is
most popular now a days because of t
he service offered during
the mobility
.
Mobile computing has become the reality today rather than the luxury.
Mobile wireless market
is increasing by leaps and bounds. The quality and speeds available in the mobile environment must
match the fixed network
s if the convergence of the mobile wireless and fixed communication network is to
happen in the real sense. The
challenge for mobile network lies
in providing very large footprint of mobile
services with high speed and security. Online transactions using m
obile devices must ensure high security
for user credentials
and it
should not be possible for misuse.
M
-
Commerce is the electronic commerce
performed using mobile devices.
Since user credentials to be kept secret, a high level of security should be
ensured
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
Automatic Fingerprint authentication for personal identification and verification has received considerable
attention over the past decades among various biometric techniques because of the distinctiveness and
persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being
used to secure smart phones and to authorize payments in online stores. The main objective of this paper is
to review the extensive research work that has been done over the past decade and discuss the various
approaches proposed for fingerprint matching. The proposed methods were based on 2D correlation in the
spatial and frequency domains, Artificial Neural Networks, Hough transform, Fourier transform, graphs,
local texture, ridge geometry etc. All these different techniques have their pros and cons. This paper also
provides the performance comparison of several existing methods proposed by researchers in fing
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
The aim of this paper is to design a convenient system that is helpful for the people who have hearing difficulties and in general who use very simple and effective method; sign language. This system can be used for converting sign language to voice and also voice to sign language. A motion capture system is used for sign language conversion and a voice recognition system for voice conversion. It captures the
signs and dictates on the screen as writing. It also captures the voice and displays the sign language meaning on the screen as motioned image or video.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
One common cause of visual impairment among people of working age in the industrialized countries is
Diabetic Retinopathy (DR). Automatic recognition of hard exudates (EXs) which is one of DR lesions in
fundus images can contribute to the diagnosis and screening of DR.The aim of this paper was to
automatically detect those lesions from fundus images. At first,green channel of each original fundus image
was segmented by improved Otsu thresholding based on minimum inner-cluster variance, and candidate
regions of EXs were obtained. Then, we extracted features of candidate regions and selected a subset which
best discriminates EXs from the retinal background by means of logistic regression (LR). The selected
features were subsequently used as inputs to a SVM to get a final segmentation result of EXs in the image.
Our database was composed of 120 images with variable color, brightness, and quality. 70 of them were
used to train the SVM and the remaining 50 to assess the performance of the method. Using a lesion based
criterion, we achieved a mean sensitivity of 95.05% and a mean positive predictive value of 95.37%. With
an image-based criterion, our approach reached a 100% mean sensitivity, 90.9% mean specificity and
96.0% mean accuracy. Furthermore, the average time cost in processing an image is 8.31 seconds. These
results suggest that the proposed method could be a diagnostic aid for ophthalmologists in the screening
for DR.
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...IJCSES Journal
This paper presents a simulation and comparison analysis conducted to investigate the due-date
assignment methods through various scheduling rules. The due date assignment methods investigated are
flow time due date (FTDD) and total work content (TWK) method. Three scheduling rules are integrated in
the simulation for scheduling of jobs on machines. The performance of the study is evaluated based on the
configuration system of Hibret manufacturing and machine building Industry, subsidiary company of
Metals and Engineering Corporation were thoroughly considered. The performance of the system is
evaluated based on maximum tardiness, number of tardy jobs and total weighted tardiness. Simulation
experiments are carried in different scenarios through combining due-date assignment methods and
scheduling rules. A two factor Analysis of variance of the experiment result is performed to identify the
effect of due-date assignment methods and scheduling rules on the performance of the job shop system. The
least significant difference (LSD) method was used for performing comparisons in order to determine
which means differ from the other. The finding of the study reveals that FTDD methods gives less mean
value compared to TWK when evaluated by the three scheduling rules.
Detection system design of subsea tree controllerIJCSES Journal
To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts
the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL ".Using the configuration software,
completed the development and design of production tree detection system to monitor, control and data
communication. The monitoring function has realized the process simulation of oil tree, the control
function has realized the remote control of oil tree, and database SQL has realized the management and
analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and
reporting level of oil production engineering design .At the same time the design center can make full use
of the database to complete the design of required query, statistical analysis and the output function of
related form .
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files from the unallocated space based on file type-specific information (header and footer) and/or file contents is known as Data Carving. The research in this domain has witnessed various
technological enhancements in terms of tools and techniques over the past years. This paper surveys various data carving techniques, in particular multimedia files and classifies the research in the domain into three categories: classical carving techniques, smart carving techniques and modern carving
techniques. Further, seven popular multimedia carving tools are empirically evaluated. We conclude with the need to develop the new techniques in the field for carving multimedia files due to the fact that the fragmentation and compression are very common issues for these files
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
The Dynamic Software Product Line (DSPL) is becoming the system with high vulnerability and high confidentiality in which the adaptive security is a challenging task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of
security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical
security services and what level of adaptation they achieve. This work will be done following the Systematic
Review approach. Our results concluded that the research field of security approaches for DSPL is still
poor of methods and metrics for evaluating and comparing different techniques. The comparison reveals
that the existing adaptive security approaches widely cover the information gathering. However, comparative approaches do not describe how to decide on a method for performing adaptive security DSPL or how to provide knowledge input for adapting security. Therefore, these areas of research are promising.
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKScscpconf
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly based on its own characteristics and behaviour. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
In wireless mobile ad hoc network, mainly, two approaches are followed to protect the security such as prevention-based approaches and detection-based approaches. A Mobile Ad hoc Network (MANET) is a collection of autonomous wireless mobile nodes forming temporary network to interchange data (data packets) without using any fixed topology or centralized administration. In this dynamic network, each node changes its geographical position and acts as a router for forwarding packets to the other node. Current MANETs are basically vulnerable to different types of attacks. The multimodal biometric technology gives possible resolves for continuous user authentication and vulnerability in high security mobile ad hoc networks (MANETs). Dempster’s rule for combination gives a numerical method for combining multiple pieces of data from unreliable observers. This paper studies biometric authentication and intrusion detection system with data fusion using Dempster–Shafer theory in such MANETs. Multimodal biometric technologies are arrayed to work with intrusion detection to improve the limitations of unimodal biometric technique.
Performance Analysis in MANET Routing Protocol using Machine Learning Algorit...IRJET Journal
This document presents a machine learning approach for routing in mobile ad hoc networks (MANETs) to improve security and performance. The proposed approach uses reinforcement learning to establish the shortest and most stable path for routing packets from the source to destination. Simulation results show that the reinforcement learning approach reduces transmission delay, increases packet delivery ratio by up to 35%, and decreases energy consumption compared to traditional routing methods for MANETs. The document also discusses using machine learning for intrusion detection and trust evaluation in MANETs to enhance security against various attacks.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses routing and security issues for trust-based frameworks in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining that routing protocols play an important role in discovering optimal paths between nodes. However, the dynamic and unpredictable nature of MANETs makes routing difficult. The document then examines security issues for MANETs including attacks from malicious nodes. It argues that establishing trust between nodes is important for routing and security. However, existing trust-based routing proposals have issues that are not clearly addressed, such as how to calculate and establish trust between nodes. The document concludes by stating that addressing these open issues could help develop more efficient and robust trust-based routing protocols for MANETs.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
This document discusses security considerations for a proposed marine communication network for fishermen. It outlines several potential security vulnerabilities at different layers of the network architecture, including physical, data link, network, transport and application layers. Specific issues for the marine environment are also discussed, such as signals crossing maritime borders, boats crossing borders, and spoofing of nodes like access points, customer premise equipment, smartphones and base stations. The document proposes that solutions are needed to address these security vulnerabilities and situational risks.
IRJET- A Confidence Model based Routing Practice for Secure Adhoc NetworksIRJET Journal
This document proposes a Trusted AODV (TAODV) routing protocol to secure ad hoc networks. TAODV extends the AODV routing protocol and uses a trust model to represent trust relationships between nodes. In TAODV, a node's trust in another is represented by an opinion that considers belief, disbelief, and uncertainty. Opinions are updated over time based on successful or failed communications. TAODV introduces a trust recommendation mechanism to exchange trust information between nodes. The protocol performs trusted routing discovery and maintenance based on nodes' trust opinions of one another to improve security and efficiency compared to cryptographic approaches.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
Review of authentication techniques for wireless networks & maneteSAT Journals
Abstract Mobile ad hoc network (MANET) is the most popular area of research nowadays due to its tremendous applications (military battlefield, commercial sectors, disaster areas, collaborative work etc). MANET is self organized network where all nodes are mobile in nature and may act as router as well as host because of its autonomous nature. In such a versatile environment, security of the network becomes a major issue. However, due to dynamic topology of the network and mobility of the nodes, it is very hard to achieve security goals such as confidentiality, authentication, integrity, non repudiation and availability. Among all these security goals, authentication is probably the most complex and important issue in MANET. Before communication, we should know to whom exactly we are talking, and then there is a question of protecting the data by means of cryptography. Authentication deals with identity of sender/receiver which is very important and required aspect for MANET where there is no central administration present in the network. In the present work, the issues related to the authentication in MANET, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET Key Words: MANET, Authentication, Traditional Wireless Network (TWN), Threshold Cryptography, Certificate Authority.
Security issues and challenges in MANET,VANET and FANET: A SurveyDr.Irshad Ahmed Sumra
VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this slide, it will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a key component of intelligent transport system. A lot of research work has been done towards it but security issue got less attention. In this article we discuss about the VANET, it's technical and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly discuss the mechanisms that are used in the solutions
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...IJNSA Journal
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
Similar to Security challenges in mobile ad hoc (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Security challenges in mobile ad hoc
1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
DOI:10.5121/ijcses.2015.6102 15
SECURITY CHALLENGES IN MOBILE AD HOC
NETWORKS: A SURVEY
Ali Dorri and Seyed Reza Kamel and Esmail kheyrkhah
Department of Computer Engineering, Mashhad branch, Islamic Azad University,
Mashhad, Iran.
ABSTRACT
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s self-
configuration and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
KEYWORDS
Mobile Ad Hoc Network (MANET), Security, Attacks on MANET, Security services, Survey.
1. INTRODUCTION
In these years, progresses of wireless technology and increasing popularity of wireless devices,
made wireless networks so popular. Mobile Ad Hoc Network (MANET) is an infrastructure-
independent network with wireless mobile nodes. MANET is a kind of Ad Hoc networks with
special characteristics like open network boundary, dynamic topology, distributed network, fast
and quick implementation and hop-by-hop communications. These characteristics of MANET
made it popular, especially in military and disaster management applications. Due to special
features, wide-spread of MANET faced lots of challenges. Peer to peer applications [1],
integration with internet [2], security [3], maintaining network topology [4] and energy [5, 6] are
some of the most important challenges in MANET. We presented an analysis and discussion in
MANET challenges in our previous work [7].
In MANET all nodes are free to join and leave the network, also called open network boundary.
All intermediate nodes between a source and destination take part in routing, also called hop-by-
hop communications. As communication media is wireless, each node will receive packets in its
wireless range, either it has been packets destination or not. Due to these characteristics, each
node can easily gain access to other nodes packets or inject fault packets to the network.
Therefore, securing MANET against malicious behaviours and nodes, became one of the most
important challenge in MANET [8].
The aim of this paper is to provide a brief discussion and analysis on MANET security. Based on
MANET characteristics we defined three important security parameters for MANET. In addition,
2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
16
two different aspects of MANET security are discussed in details. Furthermore, we presented an
analysis and discussion in security attacks and defeating approaches. Moreover, the most
effective defeating approaches for MANET and their limitations are introduced. Finally, some
research directions are discussed. Rest of this paper is organized as follow: in section 2, three
important security parameters in MANET are presented. Section 3 presents two important aspects
of security with a discussion on their strategies. Three combinational challenges with security are
presented in section 4. Section 5 presents our analyses and classifications on security of MANET
and presents some research interest in security. Section 6 introduces open research issues and
directions of researches in MANET security. Finally section 7 concludes the paper and introduces
best ways to secure MANET and presents some future works.
2. Important Parameters In MANET Security
Because of MANET’s special characteristics, there are some important metrics in MANET
security that are important in all security approaches; we call them “Security Parameters”. Being
unaware of these parameters may cause a security approach useless in MANET. Figure 1 shows
the relation between security parameters and security challenges. Each security approach must be
aware of security parameters as shown in Figure 1. All mechanisms proposed for security aspects,
must be aware of these parameters and don’t disregard them, otherwise they may be useless in
MANET. Security parameters in MANET are as follows:
Figure 1. Relation between Security Parameters and Security aspects
Network Overhead: This parameter refers to number of control packets generated by security
approaches. Due to shared wireless media, additional control packets may easily lead to
congestion or collision in MANET. Packet lost is one the results of congestion and collision.
Therefore, high packet overhead increases packet lost and the number of retransmitted packets.
This will easily wastes nodes energy and networks resources.
Processing Time: Each security approach needs time to detect misbehaviours and eliminate
malicious nodes. Due to MANET’s dynamic topology it’s strongly possible that routes between
two different nodes break because of mobility. Therefore, security approaches must have as low
as possible processing time in order to increase MANET flexibility and avoid rerouting process.
Energy Consumption: In MANET nodes have limited energy supply. Therefore, optimizing
energy consumption is highly challengeable in MANET. High energy consumption reduces nodes
and network’s lifetime.
Each security protocol must be aware of these three important parameters. In some situations a
trade-off between these parameters is provided in order to perform a satisfaction level in all of
them. Security protocols that disregard these parameters aren’t efficient as they waste network
resources.
3. MANET Security Challenges
One of the earliest researches in security in MANET was presented in 2002 [9]. Some security
challenges in MANET were inherited from ad hoc networks that were research interests since
3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
17
1999 [10, 11]. Generally there are two important aspects in security: Security services and
Attacks. Services refer to some protecting policies in order to make a secure network, while
attacks use network vulnerabilities to defeat a security service. In the next two parts, a brief
discussion on these security aspects is presented.
3.1. Security Services
The aim of a security service is to secure network before any attack happened and made it harder
for a malicious node to breaks the security of the network. Due to special features of MANET,
providing these services faced lots of challenges. For securing MANET a trade-off between these
services must be provided, which means if one service guarantees without noticing other services,
security system will fail. Providing a trade-off between these security services is depended on
network application, but the problem is to provide services one by one in MANET and presenting
a way to guarantee each service. We discuss five important security services and their challenges
as follows:
Availability: According to this service, each authorized node must have access to all data and
services in the network. Availability challenge arises due to MANET’s dynamic topology and
open boundary. Accessing time, which is the time needed for a node to access the network
services or data is important, because time is one of the security parameters. By using lots of
security and authentication levels, this service is disregarded as passing security levels needs
time. Authors in [12] provided a new way to solve this problem by using a new trust based
clustering approach. In the proposed approach which is called ABTMC (Availability Based Trust
Model of Clusters), by using availability based trust model, hostile nodes are identified quickly
and should be isolated from the network in a period of time, therefore availability of MANET will
be guaranteed.
Authentication: The goal of this service is to provide trustable communications between two
different nodes. When a node receives packets from a source, it must be sure about identity of the
source node. One way to provide this service is using certifications, whoever in absence of central
control unit, key distribution and key management are challengeable. In [13] the authors
presented a new way based on trust model and clustering to public the certificate keys. In this
case, the network is divided into some clusters and in this clusters public key distribution will be
safe by mechanisms provided in the paper. Their simulation results show that, the presented
approach is better than PGP. But it has some limitations like clustering. MANET dynamic
topology and unpredictable nodes position, made clustering challengeable.
Data confidentially: According to this service, each node or application must have access to
specified services that it has the permission to access. Most of services that are provided by data
confidentially use encryption methods but in MANET as there is no central management, key
distribution faced lots of challenges and in some cases impossible. Authors in [14] proposed a
new scheme for reliable data delivery to enhance the data confidentially. The basic idea is to
transform a secret message into multiple shares by secret sharing schemes and then deliver the
shares via multiple independent paths to the destination. Therefore, even if a small number of
nodes that are used to relay the message shares, been compromised, the secret message as a whole
is not compromised. Using multipath delivering causes the variation of delay in packet delivery
for different packets. It also leads to out-of-order packet delivery.
Integrity: According to integrity security service, just authorized nodes can create, edit or delete
packets. As an example, Man-In-The-Middle attack is against this service. In this attack, the
attacker captures all packets and then removes or modifies them. Authors in [15] presented a
4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
18
mechanism to modify the DSR routing protocol and gain to data integrity by securing the
discovering phase of routing protocol.
Non-Repudiation: By using this service, neither source nor destination can repudiate their
behaviour or data. In other words, if a node receives a packet from node 2, and sends a reply,
node 2 cannot repudiate the packet that it has been sent. Authors in [16] presented a new
approach that is based on grouping and limiting hops in broadcast packets. All group members
have a private key to ensure that another node couldn’t create packets with its properties. But
creating groups in MANET is challengeable.
In previous part a brief discussion on security services and their challenges in MANET was
provided. Detecting and eliminating malicious nodes, is another aspect of the MANET security.
In the next section, important attacks in MANET and existing detection and/or elimination
approaches to secure network against them is discussed.
3.2. Attacks
Due to special features like hop-by-hop communications, wireless media, open border and easy to
setup, MANET became popular for malicious nodes. Some of the most important attacks in
MANET are as follows:
Black Hole Attack: In this attack, malicious node injects fault routing information to the network
and leads packets toward itself, then discards all of them [17-19]. In [20] we present a survey on
black hole detection and elimination approaches. Also we presented a classification of defeating
approach for this attack. Authors in [21] presented a new approach based on confirming the best
path using second path. In this approach, whenever a source node receives RREP packets, it send
a confirmation packet through the second best path to the destination and ask the destination
whether it has a route to the RREP generator or to the Next_Hop_Node of RREP generator or not.
If the destination has no route to this nodes, both RREP generator and it’s Next_Hop_Node will
mark as malicious nodes. Using this approach source node can detect cooperative malicious
nodes. Whoever in the case of more than two cooperative malicious node, this approach can’t
detect all malicious nodes.
Worm Hole Attack: In worm hole attack, malicious node records packets at one location of the
network and tunnels them to another location [22]. Fault routing information could disrupt routes
in network [23]. Authors in [24] presented a way to secure MANET against this attack by using
encryption and node location information. But as mentioned before, key distribution is a
challenge in MANET.
Byzantine attack: In this attack, malicious node injects fault routing information to the network,
in order to locate packets into a loop [25, 26]. One way to protect network against this attack is
using authentication. Authors in [27] presented a mechanism to defeat against this attack using
RSA authentication.
Snooping attack: The goal of this attack is accessing to other nodes packets without permission
[28]. As in MANET packets transmitted hop by hop, any malicious node can capture others
packets.
Routing attack: In this attack, malicious node tries to modify or delete node’s routing tables [17,
18, 29]. Using this attack, malicious node destroys routing information table in ordinal nodes.
Therefore, packet overhead and processing time will increase.
Resource consumption attack: In this attack, malicious node uses some ways to waste nodes or
network resources [30, 31]. For instance, malicious node leads packets to a loop that consists of
5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
19
ordinal nodes. As a result, node’s energy consumed for transmitting fault packets. In addition,
congestion and packet lost probability will increase.
Session hijacking: Session hijacking is a critical error and gives an opportunity to the malicious
node to behave as a legitimate system [32, 33]. Using this attack, malicious node reacts instead of
true node in communications. Cryptography is one of the most efficient ways to defeat this
attack.
Denial of service: In this attack, malicious node prevents other authorized nodes to access
network data or services [34-38]. Using this attack, a specific node or service will be inaccessible
and network resources like bandwidth will be wasted. In addition, packet delay and congestion
increases.
Jamming attack: Jamming attack is a kind of DOS attack [39]. The objective of a jammer is to
interfere with legitimate wireless communications. A jammer can achieve this goal by either
preventing a real traffic source from sending out a packet, or by preventing the reception of
legitimate packets [40].
Impersonation Attack: Using this attack, attacker can pretend itself as another node and injects
fault information to the network [41-43]. As MANET has open border and hop-by-hop
communications, it’s hardly vulnerable against this attack. In some cases even using
authentication is useless.
Modification Attack: In this attack, malicious nodes sniff the network for a period of time. Then,
explore wireless frequency and use it to modify packets [44, 45]. Man-in-the-middle is a kind of
Modification attack.
Fabrication Attack: In fabrication attack, malicious node destroys routing table of nodes by
injecting fault information [46-48]. Malicious node creates fault routing paths. As a result, nodes
send their packets in fault routes. Therefore, network resources wasted, packet delivery rate
decreased and packet lost will growth.
Man-in-the-middle attack: In this attack, malicious node puts itself between source and
destination. Then, captures all packets and drops or modifies them [49-51]. Hop by hop
communications are made MANET vulnerable against this attack. Authentication and
cryptography are the most effective ways to defeat this attack.
Gray Hole Attack: This attack is similar to black hole. In black hole, malicious node drops all
packets, while in this attack, malicious node drops packets with different probabilities [52-55]. As
it relays some packets, detecting this attack is more complicated than black hole and some
detection approaches like sniffing or watchdog will be useless in it.
Traffic Analyse Attack: The goal of this attack is sniffing network traffic to use them in another
attack or in a specific time [44, 56]. Malicious node captures all packets to use them later. In this
section we discussed security aspects in detail. Figure 2 presents a summarization of MANET’s
security aspects.
4. INCORPORATING SECURITY AND OTHER CHALLENGES
One way to provide security in MANET, besides decreasing network overhead, is to incorporate
security approaches with other challenges. In this way, both challenges are solved by improving
security parameters in total. We discuss these combinational approaches as follows:
Secure routing protocols: The aim of these approaches is to provide security in routing phase.
When a node wants to create a path to a destination, it uses some mechanisms to find a secure
6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
20
path and detect malicious nodes in the selected path before sending packets or after sending a
number of packets. Authors in [57] presented a secure routing protocol based on using IPSEC in
MANET routing protocols. Authors in [58] presented a trust based security routing protocol to
create secure path. In MANET, there is more than one path between two different nodes.
Selecting best path based on both routing and security, will improve security parameters.
Figure 2. Security Aspects in MANET
Security in QOS: Using security mechanisms increase packet delivery time and processing time
in each node. As a result, security has negative impacts on QOS. Therefore providing QOS beside
security in MANET is highly challengeable. Authors in [59] presented a game theory to make a
trade-off between security and QOS. Authors in [60] provided an approach that creates QOS
aware multipath between source and destination with link information. By providing security in
QOS, a level of security and QOS will be guaranteed with low time or network overhead.
Cluster-based Security: These approaches use clustering in order to provide more efficient
situations for security protocols. Generally in these approaches, clusters are used for key
distribution or as central management for controlling other nodes. Using clustering for security
goals is important as it could solve problems in key distribution or key management. Authors in
[61, 62] provides a key distribution mechanism by using clusters. Clustering can solve some of
security challenges but cluster creation and maintenance is highly challengeable due to MANET’s
dynamic topology.
In incorporating approaches based on application, one challenge may be more important than the
other one. For example, when selecting best path in routing is not as important as security, an
approach can choose more secure paths without emphasizing on best routing path. As an
example, in AODV routing protocol, the path with low sequence number is chosen as the best
path. The reason is that, if there be a malicious node, it will send high sequence number. Using
7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
21
these benefits of incorporating approaches, both challenges will be solved with better security
parameters.
5. ANALYSES AND DISCUSSION
Previous sections discussed incorporating security challenge with other challenges. This section
presents an analytics and classification on previous issues. In order to analyse attacks and their
behaviour, an analyses in each attack is presented in Table 1. For each attack five important
parameters has been discussed. These parameters are as follows:
Violated Service: Each attack breaks a security service. We presented the most important
defeated service in this column.
The Proposed Solutions: Some of the most effective approaches to detect and eliminate
malicious nodes.
MANET features which lead to this attack: Each malicious node uses a feature or features
of MANET to break the security.
Attack Type: Lots of researches classified attacks in two mainly class that are as follows:
Active attack, Passive attack. In passive attacks, malicious node listens to transmissions
without any active injection or effect on network [63]. While, in active attacks malicious
node inject information.
Attack Goal: The most important goal of each attack.
Referring to Table 1, it’s understandable that lots of attacks are against availability security
service. In availability aimed attacks, malicious nodes inject fault routing information or destroy
nodes routing tables in order to defeat availability. Malicious nodes break availability service
using passive or active attacks and in different types of attacks. For instance, in worm hole attack
malicious node break availability by consuming resources, while in DOS attack, it drops all
received packets in order to breach availability.
As another point in Table 1, it is clear that among defeating approaches, sniffing is one of the
widely used approach in order to secure MANET. Generally in sniffing approaches, sniffer put it-
self in promiscuous mode and capture the network traffic. In this way, it can detect misbehaviour
of malicious nodes. As another effective defeating approach, we can name encryption and route
information. In encryption approaches, packet generator uses a key in order to encrypt packets to
avoid malicious nodes from reading or modifying data packets. Whoever, it can discard encrypted
packets. Therefore, encryption can’t guarantee the availability service.
Routing information defeating approach uses route tables or additional control packets to detect
malicious nodes. Refers to Table 1 this approach mostly used for active attacks. The reason is that
in active attacks, malicious node injects packets or uses other nodes tables to break into the
network.
Refer to Table 1, “Distributed network” is the most challengeable feature of MANET. Referring
to this feature, in MANET all nodes cooperatively work with each other to configure and
maintain network since there is no central control unit. Due to this feature, MANET faced lots of
attacks since malicious nodes can pretend themselves as ordinal nodes and take part in network
configurations and routing discoveries.
There are six different defeating mechanisms as presented in Table 1. By using defeating
approaches all attacks detected and malicious nodes eliminated from the network. Therefore we
present analyses in defeating approaches in Table 2.
8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
22
Each proposed solution uses some of network resources in order to detect an attack. Table 2
presents’ five important parameters for security approaches and discussed the effect of each
solution in each parameter. In order to analyses the energy consumption of proposed solutions;
Table 1: Analytics on MANET Attacks.
Table 2 presents energy consumption of each approach in compare with other approaches. The
word ‘low’ in “Energy consumption” column means referred approach consumes lower energy
than other approaches.
9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
23
Other words used in this column are “Normal” and “High” which mean normal and higher energy
consumption in compare with other approaches. “Accuracy” column refers to ability of defeating
approach to detect single or cooperative malicious nodes. In the case of cooperative attacks,
malicious nodes work with each other in order to cover their tracks.
Routing information approach generates controller packets and uses them in order to detect
malicious nodes. In addition, in some cases nodes must keep additional routing table like DRI
table [19]. As mentioned, in sniffing approach each node must put itself in promiscuous mode and
capture all packets transmitted in its range. This feature of sniffing approach wastes nodes energy.
Also it increases process and memory overhead. In the case of cooperative malicious nodes,
sniffing is useless as malicious nodes may work with each other to proof them-selves as trustable
nodes.
Redundancy and dynamic frequency approaches can’t detect the malicious nodes. These
approaches can only avoid network from an attack. In the case of misbehaviour, these approaches
can detect attack, while they are unable to detect the malicious nodes or eliminate them from
whole network.
In routing information defeating approach, control packets transmission increase processing time
of the security approach. In encryption and authentication, key distribution is an important
challenge, because of lack of central infrastructure or key distribution centre. Therefore, each
malicious node can pretend itself as a trustable node and take part in key distribution. In
redundancy defeating approach, destination must buffer packets in order to get packets in
sequence or to compare them with each other. In addition, it increases traffic overhead by sending
duplicated packets. That cause increasing in congestion, packet lost and energy consumption.
In addition of five important parameters, Table 2 presents some limitations on each defeating
approaches which are as follows:
Processing time: This limitation refers to time needed for each approach to find
malicious nodes and secure network against all malicious nodes. High processing time
decreases MANET flexibility. The reason is that, during processing time of security
approach routes must be constant and any change in route needs rerouting path, that
increases time consumed for security approach.
Table 2: Analysis at The Proposed Solutions
10. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
24
Cooperative nodes: In some cases defeating approach is unable to detect cooperative
malicious nodes or it can detect with very high processing time. The reason of increasing
processing time is that, the approaches can detect malicious nodes just one by one in
different executions.
Key distribution: Due to lack of central management in MANET, key distribution is
challengeable in this network. Without key distribution centre, malicious nodes can get
access to keys by capturing packets or by Man-In-The-Middle attack. One of the highly
used approaches to overcome this challenge is using clusters in order to distribute keys in
the network [64, 65].
Packet overhead: This limitation refers to additional packets generated by the source
node to detect and eliminate malicious nodes. Due to wireless media, high packet
overhead in a defeating approach increases congestion, collision and packet lost
probability in the network. In addition, it increases the processing time and energy
consumption in the nodes.
Frequency knowledge: Referring to this limitation, each node must know the frequency
of transmissions. In MANET all nodes are free to join or leave the network, so being
aware of all frequencies is highly challengeable.
Referring to our discussions and analyses it’s understandable that routing information and
encryption approaches are the most effective approaches for securing MANET. According to the
application one of these two approaches is suggested. In cluster-based MANET using encryption
is more effective and in MANET without any cluster using routing information is suggested.
6. FUTURE DIRECTIONS OF RESEARCHES
Until now we briefly discussed the security challenges in MANET and present some analytics in
them. In this section we present open research issues.
Routing information approaches are suitable in all types of MANET. In this approach, reducing
packet overhead and processing time, beside increasing accuracy is an important challenge. By
increasing accuracy, it can detect cooperative malicious nodes. With decreasing processing time
of this approach MANETs flexibility will increase.
Sniffing approach is useful in the case of single attacks, as it is unable to detect cooperative
nodes. Whoever, it waste nodes energy and it is not suitable in MANET with high speed nodes.
11. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
25
Finding a more effective way to calculate the threshold and present effective detection mechanism
forasmuch as decreasing time and packet overhead is the open border of research in sniffing
approaches. Beside it, detecting cooperative malicious nodes is challengeable. In order to solve this
challenge comparing sniffing with other defeating approaches is recommended.
MANET is self-organized, self-configurable network without any centralized control. Therefore,
encryption and authentication are challengeable. Key distribution and control unit are the most
important challenges. One way to over through these challenges is using clustering; therefore, the
Cluster Head can act as the key distributer. Because of MANETs dynamic topology, creating and
maintain clusters is highly challengeable. Using fuzzy logic [66] or swarm based [67] is highly
recommended for this challenge. As another research interest, decreasing processing time and
processing overhead of encryption approach can be mentioned.
Redundancy approaches, generate lots of duplicated packets and waste nodes resources. Also it
increases congestion and packet lost. Effectively choosing number of duplicated paths, based on
risk level, is highly challengeable. Also combining this approach with some other approaches in
order to detect malicious nodes is another challengeable issue.
Dynamic frequency is effective in multi-type MANETs. By using this approach in multi-type
MANET, each node secures its packets by sending in different frequencies. In addition, breaking
one frequency has no effect on others. This is a challenge in this approach.
7. CONCLUSION
Mobile Ad Hoc Network (MANET) is a kind of Ad hoc network with mobile, wireless nodes.
Due to its special characteristics like open network boundary, dynamic topology and hop-by-hop
communications MANET faced with a variety of challenges. Since all nodes participate in
communications and nodes are free to join and leave the network, security became the most
important challenge in MANET.
In this paper, a comprehensive review in MANET security challenges is presented. Based on
MANET characteristics and security requirements, three important security parameters are
introduced. In addition, security divided into two different aspects and each one is briefly
discussed. Furthermore, defeating approaches and different attacks in MANET are evaluated and
analysed and future direction of work in each filed is introduced. Referring to our analyses and
discussions, routing information and encryption defeating approaches are the most effective
approaches for MANET security. Based on application one of these approaches can be used.
REFERENCES
[1] A.Gantes and j. stucky, "A platform on a Mobile Ad hoc Network challenging collaborative gaming,"
international symposium on collaborative technologies and systems, 2008.
[2] K.U. R. Khan, R. U. Zaman, and A. V. G. Reddy, "Integrating Mobile Ad Hoc Networks and the
Internet challenges and a review of strategies," presented at the 3rd International Conference on
Communication Systems Software and Middleware and Workshops, COMSWARE, 2008.
[3] M.Suguna and P. Subathra, " Establishment of stable certificate chains for authentication in mobile ad
hoc networks," presented at the International Conference on Recent Trends in Information
Technology (ICRTIT), 2011.
[4] H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology
Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012.
[5] F.D. Rango, M. Fotino, and S. Marano, "EE-OLSR: Energy Efficient OLSR routing protocol for
Mobile ad-hoc Networks," presented at the Military Communications Conference, MILCOM, 2008.
12. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
26
[6] K.Du and Y. Yang, "Policy-Based Time Slot Assignment algorithm in a MANET(PBTSA),"
presented at the 3rd International Conference on Anti-counterfeiting, Security, and Identification in
Communication, ASID, 2009.
[7] A.dorri, S. R. kamel, and E. kheirkhah, "ﻞ ﯽﺗﺤ ﯾﻠ ﺮ ﺑ ﺎﻟﺶ یھﺎﭼ ﺒﮑﮫ یﺷ MANET و یراھﮑﺎرھﺎ ﮫ اراﺋ ﺪه ﺷ
ﺮا یﺑ ﻮد ﺑﮭﺒ ﺮد ﻋﻤﻠﮑ ﺒﮑﮫ ﺷ در ﺮاﺑﺮ ﺑ ﺎﻟﺶ یھﺎﭼ ",آن presented at the first national conference on
electronical and computer north Iran (Bandar Anzali), 2014.
[8] R.Sheikh, M. S. Chande, and D. K. Mishra, "Security issues in MANET:A review," presented at the
Seventh International Conference On Wireless And Optical Communications Networks (WOCN),
2010.
[9] H.Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks,," Communications
Magazine,IEEE, 2002.
[10] Y.Z.a and W. Lee, "Intrusion Detection in Wireless Ad-Hoc networks," presented at the 6th Int’l.
Conf. Mobile Comp. Net., MobiCom, 2000.
[11] F.S.a and R. Anderson, "The Resurrecting Ducking: Security Issues for Ad-Hoc Wireless Networks,"
7th Int’l. Wksp on Security Protocols. Proc., LNC, 1999.
[12] X.Zhao, Z. You, Z. Zhao, D. Chen, and F. Peng, "Availability Based Trust Model of Clusters for
MANET," presented at the 7th International Conference on Service Systems and Service
Management (ICSSSM), 2011.
[13] E.C.H.Ngai and L. M. R, "Trust and clustering-based Authentication Services in Mobile ad hoc
networks," presented at the proceeding of the 24th international conference on Distributed Computing
systems Workshops 2004.
[14] W.Lou, W. Liu, and Y. Fang, "SPREAD: enhancing data confidentiality in mobile ad hoc networks,"
presented at the Twenty-third AnnualJoint Conference of the IEEE Computer and Communications
Societies, 2004.
[15] S.Rana and A. Kapil, "Security-Aware Efficient Route Discovery for DSR in MANET," Information
and Communication Technologies, Communications in Computer and Information Science, vol. 101,
pp. 186-194, 2010.
[16] X.Lv and H. Li, "Secure group communication with both confidentiality and non-repudiation for
mobile ad-hoc networks," Information Security, IET, vol. 7, 2013.
[17] S.a.A.k.G, H.o.d.R.m, and S. sharma, "A Comprehensive Review of Security Issues in Manets,"
International Journal of Computer Applications vol. 69 2013.
[18] V.P.and R. P. Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application," IJCEM
International journal of Computational Engineering & management, vol. 11, 2011.
[19] A.MISHRA, R. Jaiswal, and S. Sharma, " A novel approach for detecting and eliminating cooperative
black hole attack using advanced DRI table in Ad hoc Network," presented at the 3rd International
Conference on Advance Computing Conference (IACC), 2013
[20] A.dorri and T. m. k. zade, "ﻞ ﻞﺗﺤ ﯾ ﮫ یﺣﻤﻠ ﺮه یﺣﻔ ﺎهس ﯾ و یھﺎراه ﻒ ﮐﺸ ",آن presented at the first regional
conference on optimizing and soft computing in electronic and computer engineering, 2014.
[21] N.-W. Lo and F.-L. Liu, "A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in
MANET," in Intelligent Technologies and Engineering Systems. vol. 234, J. Juang and Y.-C. Huang,
Eds., ed: Springer New York, 2013, pp. 59-65.
[22] M.A. Gorlatova, P. C. Mason, M. Wang, and L. Lamont, " Detecting Wormhole Attacks in Mobile
Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military
Communications Conference, IEEE, MILCOM, 2006.
[23] S.Keer and A. Suryavanshi, "To prevent wormhole attacks using wireless protocol in MANET,"
presented at the nternational Conference on Computer and Communication Technology (ICCCT),
2010.
[24] Z.A.Khan and M. H. Islam, "Wormhole attack: A new detection technique," presented at the
international conference on Emerging Technologies (ICET), 2012.
[25] M.Yu, M. C. Zhou, and W. Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs
in Adversarial Environments," IEEE Transactions on Vehicular Technology, vol. 58
[26] G.Singla, M. S. Sathisha, A. Ranjan, S. D., and P. Kumara, "Implementation of protected routing to
defend byzantine attacks for MANET’s," International Journal of Advanced Research in Computer
Science, vol. 3, p. 109, 2012.
[27] G.Singla and P. Kaliyar, "A Secure Routing Protocol for MANETs Against Byzantine Attacks,"
Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering, vol. 131,
pp. 571-578, 2013.
13. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
27
[28] S.Shaw, K. Orea, P. Venkateswaran, and R. Nandi, " Simulation and Performance Analysis of OLSR
under Identity Spoofing Attack for Mobile Ad-Hoc Networks," Computer Networks and Information
Technologies Communications in Computer and Information Science, vol. 142, pp. 308-310, 2011.
[29] B.Kannhavong, H. Nakayama, Y. Nemoto, and N. Kato, "A survey of routing attacks in mobile ad
hoc networks," Wireless Communications, IEEE Transactions, vol. 14
[30]M.Abdelhaq, R. Hassan, and R. Alsaqour, "Using Dendritic Cell Algorithm to Detect the Resource
Consumption Attack over MANET," Software Engineering and Computer Systems Communications
in Computer and Information Science vol. 181, pp. 429-442, 2011.
[31] L.Rajeswari, A. Prema, R. A. Xavier, and A. Kannan, "Enhanced intrusion detection techniques for
mobile ad hoc networks," presented at the International Conference on Information and
Communication Technology in Electrical Sciences (ICTES), 2007.
[32] A.K.Rai, R. R. Tewari, and S. K. Upadhyay, "different type of attacks on integrated MANET- internet
comunication," international jornal of computer science and security (IJCSS), vol. 4.
[33] J.Y.Kim, H. K. Choi, and S. Song, "A secure and lightweight approach for routing optimization in
mobile IPv6," EURASIP Journal on Wireless Communications and Networking - Special issue on
wireless network security, vol. 7, 2009.
[34] Supriya and M. Khari, "Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A
Survey," Advances in Computer Science and Information Technology. Networks and
Communications Lecture Notes of the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering, vol. 84, pp. 119-124, 2012.
[35] J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Wireless
Telecommunications Symposium (WTS), 2012.
[36] R.H.Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS Attacks in Mobile Ad Hoc Networks: A Survey,"
presented at the Second International Conference on Advanced Computing & Communication
Technologies (ACCT), 2012
[37] A.Michael and Nadeem, "Adaptive intrusion detection & prevention of denial of service attacks in
MANETs," presented at the IWCMC '09 Proceedings of the International Conference on Wireless
Communications and Mobile Computing, Connecting the World Wirelessly, 2009.
[38] J.Su and H. Liu, "Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile
Ad Hoc Network," Applied Informatics and Communication Communications in Computer and
Information Science, vol. 224, pp. 233-240, 2011.
[39] A.Hamieh and J. Ben-othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks Using
Error Distribution," presented at the International Conference on Communications, ICC '09. IEEE,
2009.
[40] J.Ben-othman and A. Hamieh, "Defending method against jamming attack in wireless ad hoc
networks," presented at the 34th Conference on Local Computer Networks, LCN, IEEE, 2009.
[41] D.Glynos, P. Kotzanikolaou, and C. Douligeris, "Preventing impersonation attacks in MANET with
multi-factor authentication," hird International Symposium on Modeling and Optimization in Mobile,
Ad Hoc, and Wireless Networks, WIOPT, 2005.
[42] C.Douligeris, P. Kotzanikolaou, and D. Glynos, "Preventing Impersonation Attacks in MANET with
Multi-Factor Authentication," WIOPT '05 Proceedings of the Third International Symposium on
Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005.
[43] M.Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and
Mobile Networks," Secure Mobile Ad-hoc Networks and Sensors Lecture Notes in Computer
Science, vol. 4074, pp. 80-95, 2006.
[44] N.Dixit, S. Agrawal, and V. K. Singh, "A Proposed Solution for security Issues In MANETs,"
International Journal of Engineering Research & Technology(IJERT), vol. 2, 2013.
[45] Vaithiyanathan, S. R. Gracelin, E. N. Edna, and S. Radha, "A Novel Method for Detection and
Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm," presented at
the International Conference on Recent Trends in Information, Telecommunication and Computing
(ITC), 2010
[46] P.Yi, X. Jiang, and Y. Wu, "Distributed intrusion detection for mobile ad hoc networks," Journal on
Systems Engineering and Electronics, IEEE, vol. 19, 2008.
[47] S.R. Afzal, S. Biswas, J. B. Koh, T. Raza, and m. authors, "RSRP: A Robust Secure Routing Protocol
for Mobile Ad Hoc Networks," presented at the Wireless Communications and Networking
Conference,WCNC, IEEE, 2008.
14. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
28
[48] P.T. Tharani, K. Muthupriya, and C. Timotta, "Secured consistent network for coping up with
gabrication attack in MANET," international journal of Emerging Technology and Advanced
Engeineering, vol. 3, 2013.
[49] D.Sharma, P. G. Shah, and X. Huang, "Protecting from Attacking the Man-in-Middle in Wireless
Sensor Networks with Elliptic Curve Cryptography Key Exchange," presented at the NSS '10
Proceedings of the Fourth International Conference on Network and System Security, 2010.
[50] K.Vishnu, "A new kind of transport layer attack in wireless Ad Hoc Networks," presented at the
International Conference on Wireless Communications, Networking and Information Security
(WCNIS), 2010
[51] X.Zou, A. Thukral, and B. Ramamurthy, "An Authenticated Key Agreement Protocol for Mobile Ad
Hoc Networks," Mobile Ad-hoc and Sensor Networks Lecture Notes in Computer Science, vol. 4325,
pp. 509-520, 2006.
[52] J.Liu, F. Fu, J. Xiao, and Y. Lu, "Secure Routing for Mobile Ad Hoc Networks," presented at the
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking,
and Parallel/Distributed Computing, SNPD, 2007.
[53] J.Sen, B. Tata, M. Chandra, S. Harihara, and H. Reddy, "A mechanism for detection of gray hole
attack in mobile Ad Hoc networks," presented at the 6th International Conference on Information,
Communications & Signal Processing, 2007
[54] G.Usha and S. Bose, "Impact of Gray hole attack on adhoc networks," presented at the International
Conference on Information Communication and Embedded Systems (ICICES), 2013
[55] G.Xiaopeng and C. Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc
Networks," presented at the IFIP International Conference on Network and Parallel Computing
Workshops, NPC Workshops, 2007.
[56] C.Gray, J. Byrnes, and S. Nelakuditi, "Pair-wise Resistence to traffic Analysis in MANETs," ACM
SIGMOBILE Mobile Computing and Communications Review, 2008.
[57] E.A. Panaousis, T. A. Ramrekha, and C. Politis, "Secure routing for supporting ad-hoc extreme
emergency infrastructures," Future Network and Mobile Summit, 2010.
[58] M.Salmanian and M. Li, "Enabling secure and reliable policy-based routing in MANETs," presented
at the military communications conference, MILCOM, 2012.
[59] F.R. Yu, H. Tang, S. Bu, and D. Zheng, "Security and quality of service (QoS) co-design in
cooperative mobile ad hocnetworks," EURASIP Journal on Wireless Communications and
Networking - Special issue on wireless network security, 2013.
[60] R.Gujral, A. Kapil, and ” ”, Volume , , pp "Secure QoS Enabled On-Demand Link-State Multipath
Routing in MANETs," Information Processing and Management Communications in Computer and
Information Science, vol. 70, pp. 250-257, 2010.
[61] A.El-Sayed, "Clustering Based Group Key Management for MANET," Advances in Security of
Information and Communication, Networks Communications in Computer and Information Science,
vol. 381, pp. 11-26, 2013.
[62] M.S. Zefreh, A. Fanian, S. M. Sajadieh, P.Khadivi, and M. Berenjkoub, "A Cluster-Based Key
Establishment Protocol for Wireless Mobile Ad Hoc Networks," Advances in Computer Science and
Engineering Communications in Computer and Information Science, vol. 6, pp. 585-592, 2009.
[63] L.Yingbin, H. V. Poor, and Y. Lei, "Secrecy Throughput of MANETs Under Passive and Active
Attacks," Information Theory, IEEE Transactions on, vol. 57, pp. 6692-6702, 2011.
[64] K.Gomathi and B. Parvathavarthini, "An efficient cluster based key management scheme for MANET
with authentication," in Trendz in Information Sciences & Computing (TISC), 2010, 2010, pp. 202-
205.
[65] A.El-Sayed, "Clustering Based Group Key Management for MANET," in Advances in Security of
Information and Communication Networks. vol. 381, A. Awad, A. Hassanien, and K. Baba, Eds., ed:
Springer Berlin Heidelberg, 2013, pp. 11-26.
[66] W.El-Hajj, D. Kountanis, A. Al-Fuqaha, and M. Guizani, "A Fuzzy-Based Hierarchical Energy
Efficient Routing Protocol for Large Scale Mobile Ad Hoc Networks (FEER)," in Communications,
2006. ICC '06. IEEE International Conference on, 2006, pp. 3585-3590.
[67] M.Achankunju, R. Pushpalakshmi, and A. A. Kumar, "Particle swarm optimization based secure QoS
clustering for mobile ad hoc network," in Communications and Signal Processing (ICCSP), 2013
International Conference on, 2013, pp. 315-320.
15. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, February 2015
29
Authors
Ali Dorri received his B.S. degree in computer engineering from Bojnord University,
Iran, in 2012, and now is student in M.S in software engineering in Mashhad branch,
Islamic Azad University, Mashhad, Iran. His research interests cover Wireless Sensor
Networks (WSN), Mobile Ad hoc Network (MANET) and specially Security challenges.
Dr. Seyed Reza Kamel Tabbakh is with the Department of Software Engineering,
Faculty of Engineering, Islamic Azad University - Mashhad branch, Mashhad, Iran. He
received his PhD in communication and network engineering from University Putra
Malaysia (UPM) in 2011. He received his BSc and MSc in software engineering from
Islamic Azad University, Mashhad branch and Islamic Azad University, South Tehran
branch, Iran in 1999 and 2001 respectively. His research interests include IPv6 networks,
routing and security. During his studies, he has published several papers in International
journals and conferences. Email: rezakamel@ieee.org.
Esmaeil Kheirkhah received his Bachelor and Master in Computer Science and
Mathematics from Islamic Azad University, Mashhad, Iran in 1992 and 1996
respectively. He also received his PhD in Computer Science from National University of
Malaysia (UKM) in 2010. He is currently an assistant professor at the Islamic Azad
University of Mashhad. His research interests include the Software Engineering,
Requirements Engineering, End-User Computing, and semantic-enabled software
engineering.