In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
There are two causes of latency in mobile handover: the move detection latency and registration latency. This delay is inherent in the round-trip incurred by Mobile IP as the registration request is sent to the home agent and the response sent back to the foreign agent. Throughout the time between Mobile Node (MN) leaving the old foreign network (oFN) and Home Agent (HA) receiving the MN registration message, HA does not know MN's latest Care of Address (CoA), and therefore it still forwards the packets destined for MN to the old foreign network. These packets will be discarded and lost.
This paper present an improved link layer mechanism with Location information Provider. Global position systems GPS used to assist FMIPv6 for fast handovers and reduced packet loss during handover. We introduce a new link layer combined with Location information Provider signalling in this algorithm accordingly. Further, we report the implementation details performed through simulations.
Therefore, link layer information and Location information Provider allows an MN and FAs to predict the loss of connectivity more quickly than the L3 advertisement based algorithm. The simulations evidence performance improvements in terms of latency and packet loss. It is also shown that by enabling Location information Provider inside the FA discovery method and improving link layer event services, an MN can be well prepared for handover and perform faster movements.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
There are two causes of latency in mobile handover: the move detection latency and registration latency. This delay is inherent in the round-trip incurred by Mobile IP as the registration request is sent to the home agent and the response sent back to the foreign agent. Throughout the time between Mobile Node (MN) leaving the old foreign network (oFN) and Home Agent (HA) receiving the MN registration message, HA does not know MN's latest Care of Address (CoA), and therefore it still forwards the packets destined for MN to the old foreign network. These packets will be discarded and lost.
This paper present an improved link layer mechanism with Location information Provider. Global position systems GPS used to assist FMIPv6 for fast handovers and reduced packet loss during handover. We introduce a new link layer combined with Location information Provider signalling in this algorithm accordingly. Further, we report the implementation details performed through simulations.
Therefore, link layer information and Location information Provider allows an MN and FAs to predict the loss of connectivity more quickly than the L3 advertisement based algorithm. The simulations evidence performance improvements in terms of latency and packet loss. It is also shown that by enabling Location information Provider inside the FA discovery method and improving link layer event services, an MN can be well prepared for handover and perform faster movements.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Impact of security breach on the upstream delay performance of next generatio...journalBEEI
The next generation passive optical networks (NG-GPON) such as long reach GPON is the future-proof solution to answer the continuous demands for access user bandwidth and network expansion. However, security which is yet to be addressed in NG-GPON needs urgent attention as it will become more critical due to much longer distance, denser user population and more network elements. In addition, the longer propagation delay in NG-GPON can also lead to a more complex bandwidth allocation mechanism that is expected to operate in a dynamic manner. Among the highlights of recommendations for future implementation are improvements in the security aspect and the use of dynamic bandwidth allocation (DBA) algorithm that suit the characteristics of long reach GPON. Current PON is exposed to degradation attack, a security breach that can harm how bandwidth fairness mechanism among ONUs work. Thus, this project proposes a secured DBA mechanism for NG-PON that could overcome this particular threat. In specific, a detection phase will be included in the DBA mechanism to sense and subsequently mitigate abnormal behaviours among ONUs that are harmful to the goal of DBA i.e. to ensure QoS among ONUs and traffics. At the same time, careful attention is given on the delay parameter as it is a critical parameter that can affect DBA performance in long reach GPON. In this paper, preliminary analysis is shown that reveal how possibility of threats increase with increasing of distance and network elements.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
High Speed data transmission in medical body sensor network by reducing the d...ijsrd.com
The technology of sensor, medical body sensor and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports are changing the way humans use computers. In this research, proposed an energy-efficient Medium Access Control (MAC) protocol based on IEEE802.16 is specifically designed for Wireless Body Area Network (WBAN) to cognitively work in high interference environment. Proposed system uses the cross-layer optimization algorithm called such as Joint Cross-Layer Width Arbitrary Filter Length Algorithm (JCL) it significantly reduces the hand-off delay, energy-level. Simulation results show that, depending on the interference level, it is able to outperform the efficient medium access control protocol and existing IPv6 over Low power Wireless personal area network (6LoWPAN) in terms of energy utilization, packet delay, and network throughput.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Impact of security breach on the upstream delay performance of next generatio...journalBEEI
The next generation passive optical networks (NG-GPON) such as long reach GPON is the future-proof solution to answer the continuous demands for access user bandwidth and network expansion. However, security which is yet to be addressed in NG-GPON needs urgent attention as it will become more critical due to much longer distance, denser user population and more network elements. In addition, the longer propagation delay in NG-GPON can also lead to a more complex bandwidth allocation mechanism that is expected to operate in a dynamic manner. Among the highlights of recommendations for future implementation are improvements in the security aspect and the use of dynamic bandwidth allocation (DBA) algorithm that suit the characteristics of long reach GPON. Current PON is exposed to degradation attack, a security breach that can harm how bandwidth fairness mechanism among ONUs work. Thus, this project proposes a secured DBA mechanism for NG-PON that could overcome this particular threat. In specific, a detection phase will be included in the DBA mechanism to sense and subsequently mitigate abnormal behaviours among ONUs that are harmful to the goal of DBA i.e. to ensure QoS among ONUs and traffics. At the same time, careful attention is given on the delay parameter as it is a critical parameter that can affect DBA performance in long reach GPON. In this paper, preliminary analysis is shown that reveal how possibility of threats increase with increasing of distance and network elements.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
High Speed data transmission in medical body sensor network by reducing the d...ijsrd.com
The technology of sensor, medical body sensor and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports are changing the way humans use computers. In this research, proposed an energy-efficient Medium Access Control (MAC) protocol based on IEEE802.16 is specifically designed for Wireless Body Area Network (WBAN) to cognitively work in high interference environment. Proposed system uses the cross-layer optimization algorithm called such as Joint Cross-Layer Width Arbitrary Filter Length Algorithm (JCL) it significantly reduces the hand-off delay, energy-level. Simulation results show that, depending on the interference level, it is able to outperform the efficient medium access control protocol and existing IPv6 over Low power Wireless personal area network (6LoWPAN) in terms of energy utilization, packet delay, and network throughput.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
Similar to Security Issues of Network Mobility (NEMO) with Tor Architecture (20)
T. Srilatha, 2021. Detection of Hazardous Gases Using the Sensors and Passing Alerts to the Neighbourhood Though Mobile Cloud. United International Journal for Research & Technology (UIJRT), 3(1), pp.19-23.
Kurniasari, F. and Riyadi, W.T., 2021. Determinants of Indonesian E-Grocery Shopping Behavior After Covid-19 Pandemic Using the Technology Acceptance Model Approach. United International Journal for Research & Technology (UIJRT), 3(1), pp.12-18.
Olorunnisola, A.O., Richards, A. and Omoniyi, T.E., 2021. A Review on the Renewable Energy from Agricultural and Forest Residues in Nigeria. United International Journal for Research & Technology (UIJRT), 3(1), pp.04-11.
Abideen Adeyinka Adekanmi, Adeniyi Sheriffdeen Adekanmi and Uthman Taiwo Adekanmi “Biotreatment of Slaughterhouse Waste Water by Microalgae” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 19-30, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90003.pdf
Idowu Olusegun Oladele “Emerging Trends in Private Security Companies (PSCs) and Security Services in Southwest Nigeria” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 04-18, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90002.pdf
Dr. S. Saravana Kumar “A Systematic Review on the Educational Data Mining and its Implementation in the Applications ” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 01-03, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90001.pdf
Larry Lanzema Dangana and Halil Zafer Alibaba,“Effects of Thermal Insulation Deficits in Famagusta Buildings” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 07, pp. 05-13, 2020. https://uijrt.com/articles/v1i7/UIJRTV1I70001.pdf
Larry Lanzema Dangana “Feasibility Analysis of Applying Thermal Insulation Composite Wall in Residential Buildings” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 07, pp. 01-04, 2020. https://uijrt.com/articles/v1i7/UIJRTV1I70001.pdf
Salimat Yewande Bakare and Halil Zafer Alibaba,“The Construct of Comfort: A Case Study of Environmental Comfort of University Classrooms” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 06, pp. 19-23, 2020. https://uijrt.com/articles/v1i6/UIJRTV1I60003.pdf
Mulugeta Bantigegn, Achenef Motbainor and Teferi Mekonnon,“Onsite Proper Solid Waste Handling Practices and Associated Factors Among Condominium Residents in Debre-Markos Town, East Gojjam Zone, North West Ethiopia: A Community Based Cross-Sectional Study” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 06, pp. 01-11, 2020. https://uijrt.com/articles/v1i6/UIJRTV1I60001.pdf
The Effects of Flooring Material on Thermal Comfort in a Comparative Study Marble and Parquet Flooring
https://uijrt.com/articles/v1i5/UIJRTV1I50004.pdf
Structuring Alternative Investment in Public Private Partnership Projects Using Islamic Financial Instruments
https://uijrt.com/articles/v1i5/UIJRTV1I50002.pdf
Cavine Onyango Oguta. “The Mass Culture of the Freshwater Rotifers Brachionus Rubens Ehrenberg 1838 Using Different Algal Species Diets” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 10-24.
Ataullah Muneeb and Matiullah Shinwari. “Customer Relation Management (CRM) and its Impact on Organizational Performance: A Case of Etisalat Telecommunication in Afghanistan” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 01-09
S M Masiul Azam, Md Shahidul Islam, Parvin Shahanaz, Md Shafiqur Rahman and Sarder Md Shahriar Alam. “Molecular Characterization of Brassica Cultivars through RAPD Markers” United International Journal for Research & Technology (UIJRT) 1.3 (2019): 41-45.
Ishfaq Majid. “ICT in Assessment: A Backbone for Teaching and Learning Process” United International Journal for Research & Technology (UIJRT) 1.3 (2019): 38-40.
Health problems associated with the consumption of foods that do not meet the hygiene and epidemiological standards are not of recent date and have been occurring continuously throughout the history of human existence. The incidence of food poisoning and foodborne transmissible diseases is three times more common in-home kitchens and households. Restaurant poisoning generally involves a larger number of people, whereas a home-based one involves individuals or a small number of people, so its likelihood of identification by the competent authority or public health organizations and services are significantly smaller. The development of the household food safety questionnaire (HFSQ) for the general population went through five phases (preparation of the questionnaire, distribution of the questionnaire to panelists and then the respondents, statistical analysis and the formation of the final version of the validated questionnaire). A total of 58 particles that formed the basis of the questionnaire were divided into four segments: demographic (10), knowledge (17), opinion (14) and food safety practice (17). Overall, the validity of the questionnaire in examining practice, knowledge and attitude was determined with Cronbach’s alpha = 0.842. The total number of particles adequate for the questionnaire is 29 questions. This questionnaire is a good instrument for assessing the knowledge, attitudes and practices of food handlers in their households.
Daniel Maestro, Arzija Pašalić, Sabina Šegalo and Amar Žilić. “Development and Validation of the Household Food Safety Questionnaire” United International Journal for Research & Technology (UIJRT) 1.3 (2019): 24-32.
More from United International Journal for Research & Technology (20)
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Security Issues of Network Mobility (NEMO) with Tor Architecture
1. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 04, 2019
All rights are reserved by UIJRT.COM. 25
Security Issues of Network Mobility (NEMO) with Tor
Architecture
Mohd. Altamash Sheikh
Research Scholar,
SOICT, Gautam Buddha University, Gr.Noida India
altsheikh@gmail.com
Abstract— In this paper we discuss NEMO-BSP
protocol and TOR architecture. NEMO protocol was
initially not designed to handle anonymity of TOR
architecture. Due to some of the unique feature of TOR
architecture, the use of TOR architecture has been
rapidly increased these days. TOR architecture
provides anonymity which other network architectures
failed to provides. When using a TOR a user feels safe
and has no issue of tracking and packet tracing.
Therefore whenever a NEMO user uses TOR
architecture there are much vulnerability in network. In
this paper we outline those security issues in details
which arise when a NEMO user uses TOR architecture.
We hope in future those issues will be solved and
implemented in future so that a user not only remains
anonymous while using TOR but also remains secure
from various types of vulnerabilities.
Keywords— NEMO, TOR, IPv4, IPv6, MIPv6.
I. INTRODUCTION
We live in a world where security and safety is a topic
of great concern, one side we need state of the art
security for our devices and on the other side we expect
to receive location based services. However we cannot
have both the things at the same time full security and
location based privacy. There is a need of to make a
balance between these two, to get an optimal user
experience. Now these days’ internet service providers
and search engines like Google are always aware of our
location, content we are searching, shopping behavior,
banking and expenditure pattern. Companies are
working with the objective of maximizing on Profit.
The entire framework for user privacy and safety opens
an entire new field where there is a lack of rules and
regulations from government. This made a user a
vulnerable object used by co-operations.
With the facility of mobility user became a mobile
internet user, protocols such as NEMO-BSP [1]
provides mobility of entire network. Hence this makes
system more efficient and most secure because every
user don't have true go through the same procedure of
handshaking another search procedure which makes
them a vulnerability to the network. When there is a
compromise of user privacy and location there is a
requirement of search an architecture which makes a
user anonymous making entire service available to
them and remain hidden n the world of internet. One
search architecture is known as onion architecture[2].
This architecture provides enormity to a user bye
encrypting the entire information into different layers
use random path from source to destination. Hence in
this way more difficult to trace back a request from
server to user because it does not follow direct Path
also at each hop route may be altered. Therefore online
architecture is relatively a new concept that helps a
user to remain anonymous over the internet.
Mobility is always typical to handle, from networking
prospective it is not only complicates the system but
also adds lots of hardware and software and making it
sophisticated system. System which supports mobility
most of the time is not a simple one. Radio also
supports mobility but it is only a unidirectional system
therefore receiver and a sender need not to be
synchronized they just transmits the data without any
overheads.
A system which have bidirectional communication
facility is a complicated one what's lots of
synchronization from both the sides there is always
hand shake between the parties sending the data in a
system like cell phone communication which is also a
part of terrestrial communication have a loser always
roaming between a certain geographical area therefore
they just have to cover the specific area for the
coverage hence this does not pose a very serious issues
to the designer. What is system like where a user can
access anytime anywhere mode this makes is system
complicated especially if a user is moving at a very
high speed at a very good it height. Like a user
travelling inside hey aero plane having all the above
discuss characteristics therefore we can apply indoor
propagation model form inside the aero plane but
however typical outdoor propagation model is not
applicable in the case of a aero plane which is moving
over the Heights of few kilometers from the Earth
surface.
2. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 04, 2019
All rights are reserved by UIJRT.COM. 26
II. NEMO ARCHITECTURE AND WORKING
This section provides a detailed description of the
NEMO BSP protocol for providing connectivity to
airplane passengers. The architecture of NEMO is
almost similar to MIPv6[3]. The architecture consists
of Home Agent (HA) which allocates network prefix to
all its connected devices.
HA is further connected to Mobile Router (MR),
through which all end nodes are connected. All the end
nodes are accessible through HA prefix. When an MR
is moved to a new location it gets to connect with a
new network called Foreign Network (FN) or visiting
network. MR moves with all its connected nodes.
Notation Description
NEMO-BSP Network Mobility Basic Support
Protocol
L.E.O Low Earth Orbit
G.E.O Geostationary Earth Orbit
M.E.O Medium Earth Orbit
M.N Mobile Node
H.A Home Agent
C.N Corresponding Node
A.R Access Router
F.A Foreign Agent
L.F.N Local Fixed Node
Now when MR reaches FN it obtains a new address
called Care-of address (CoA). After obtaining CoA,
MR sends this information of a new address to its HA
for updating its cache list called Binding Update (BU).
Once HA updates with MR with a new CoA, HA sends
an acknowledgment back to MR known as binding
Acknowledgement (BA).
Once this procedure is finished, nodes of MR router are
reachable to their new address and whenever HA
receives any packets it forwards those packets to MR’s
new location. HA makes a tunnel for sending packets
to MR new location.
This method of routing packets from connected nodes
to HA and HA to MR is called triangular routing as
shown in figure 2, but this method increases the delay
of packets as connected nodes are not able to send
packets to MR directly. To avoid this, Route
Optimization Techniques (ROT) is used which is
published in the form of RFC [4]. In ROT connected
nodes can send data packets directly to MR and vice
versa. In this way, a triangular routing works.
This triangular routing not only simplifies binding
procedure but also decreases overall delay. Earlier this
was not the part of the original protocol in IPv6[5] but
later on, it was updated as an integral part of the
protocol.
Figure 1 NEMO Architecture
Figure 2 NEMO Triangular Routing
III. UNDERSTANDING TOR
The main objective of TOR is to protect client
information protection. The Tor is an abbreviation for
the project called “The Onion Router”. The Tor was
designed for unknown correspondence. The Tor is
open source software exist in the form of web browser.
Figure 3: working of Onion Routing
The tor diverts internet traffic through a free volunteer
overlay system consist of more than 7000 relays. These
relays hide user information from anyone who observes
3. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 04, 2019
All rights are reserved by UIJRT.COM. 27
network traffic. The TOR do not keep any tracking log
of its clients activity. The main focus of TOR is clients
security. TOR encryption the information along with
next destination IP address, hence a tracker is unable to
track source of client or client IP address.
This makes a TOR user secures from back tracking.
Some sites however do not allowed access to TOR
client into their sites or to their servers. Like Wikipedia
do not allowed a TOR user to edit the Wikipedia
content. Figure 3 shows the working of TOR
architecture in detail.
Authentication: The communications between any two
legitimate nodes (e.g., between MR and HA, between
MR and CN) must be authenticated, so that no
malicious node will be able to generate and send any
spoofed packet to a legitimate party.
Authorization: It ensures that only authorized network
nodes can be involved in using the network resources
or exchanging messages with the network components.
Availability: It ensures that the expected network
services are available even if any node is compromised
by denial-of-service attack.
Confidentiality: It ensures that the transmitted control
packets like (e.g., BU, BAck, dynamic home agent
discovery (DHAD) packet, router advertisement) and
the data packets cannot be understood by any malicious
adversary other than the legitimate recipients.
Location Privacy: This property assures that the actual
location of MNNs remain hidden from third parties
other than the HA.
Integrity: It assures that the contents of the transmitted
messages (like mobile network prefix or source address
in BU) from one legitimate party (MR or HA) to other
network components (HA or CN) cannot be modified
or altered by any malicious intermediate nodes.
Freshness and Anti-replay: This ensures that the
control packets (e.g., BU) or data packets sent from the
mobile network are recent and fresh. It means no
malicious attacker should be able to capture the packets
and replay them at a later time.
Robustness against leakage: There are some cases
where a cryptographically strong key (generally a
private key) has to be stored in tamper resistant
modules. Leakage of such keys results in complete
breakdown of security of the system. The tamper
resistant modules are also not free from bugs and mis-
configurations. So the security scheme must provide
robustness against leakage of the stored secrets.
Evaluation
In addition to the above security requirements, we
suggest the following security metrics to analyze the
overall performance of the NEMO security protocols.
Signaling Efficiency: One of the main goals of the
security protocols is to keep the signaling overhead as
low as possible. A security scheme is said to be
efficient in terms of signaling if small number of
signaling packets are used.
Delay: The security scheme should not introduce high
delay either in the transfer of data or in data processing
at any node (CN, HA, or MR). Higher delay will cause
the packets at the MRs or HAs to wait for a long time
degrading the performance of the protocol
Computational Overhead: Another aim of the security
schemes is to reduce the computation burden on the
participating entities (HA, CN, MNN, or MR). More
computations require more time which ultimately
results in longer delay.
Scalability: The security scheme must provide an
acceptable level of security even if the network size is
increased to a large extent.
Configuration Complexity: This metric indicates that
the participating network components need not be
equipped with high level configuration for carrying out
the desired task. The higher the configuration
requirement, the less efficient the security scheme will
be in terms of consumption of resources.
Reliability: This metric measures the degree of
reliability of the security scheme. The reliability is
measured in terms of the strength of the hash function
used to calculate the hash digest etc. The more strong
the hash function is, the more difficult it will be to
regenerate the original message from the hash digest.
IV. SECURITY ISSUES
A. Autonomous system (AS) eavesdropping
If an autonomous system is available on the section
ofrelay where client data enters and also at a point
where the client exit on the relay then that autonomous
system data can be easily statistically vulnerable[6].
B. Exit node eavesdropping
In exit node eavesdropping the vulnerability of TOR is
used against itself. As there is no encryption between a
server and exit node, therefore any exit node can
4. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 04, 2019
All rights are reserved by UIJRT.COM. 28
capture traffic passing through it[7]. A TOR do not use
any end to end encryption such as transport layer
security (TLS) or secure socket layer.
C. Traffic-examination assault
The traffic examination attack can be done in two
separate ways. In first the attacker highlights the traffic
from a particular stream from one side and from other
side look for the same highlighted traffic stream on the
other side of the system. In second method which is
dynamic in nature the attacker changes the timings of
bundle of the stream as indicated by a particular
example and search for that example on the other isde
of the system. In this both ways an attacker can connect
track a client data and traffic[8].
D. Tor Exit Node Block
Some of the internet users block TOR users to enter
into their sites or even restrict use for TOR client[9]. If
an internet server is not allowed to track a client they
do not allowed client ot use their services like BBC
blocks entire traffic form TOR client.
E. Bad Apple Attack
In bad apple attack an attacker is taking advantage of
insecure application and TOR design . Whenever a
TOR device is taking support from some of the secure
application. Hijacker tracks response and control the
exit node are some of the common methods used here.
This type of attack generally held on P2P file sharing
systems[10] as they lacks a secured method for file
sharing.
F. Some Protocols Expose Ip Addresses
If a TOR exit node can be controlled, then expose of IP
address of a TOR user can also be exposed easily [11].
G. Inspection of Bittorrent Control Messages
Sometimes protocol extension handshakes contain IP
address. This may reveals a good amount of
information and message of TOR client along with IP
address.[12]
H. Hijacking Trackers' Responses
The man in the middle attack is also possible for a
TOR client. The communication between a tracker and
peer is not authenticated nor encrypted. So if a TOR is
used for communication with a tracker directly only
than this type of attack is possible [13].
I. Exploiting Distributed Hash Tables (Dht)
A TOR is not able to establish a connection with a
distributed hash table easily and hence this attack
exploits this weakness. In this way looking to DHT an
attacker is able to reveals the target IP address and
hence the TOR user security is compromised.
J. Sniper Attack
In this attack an attacker works in association with
colluding server and client by over flowing the exit
node, until the node is runs out of service and therefore
unable to serve genuine clients. In this way an attacker
degrades the network performance.
Attacks Victims Degree of
vulnerability
Bombing
attack
MR, HA, CN Very severe
Redirection
attack
MR, HA, CN Very severe
Denial of
service attack
MR, HA, CN Very Severe
Replay attack MR, HA, CN Severe
Man in the
middle attack
MR, HA, CN Very severe
Home agent
poisoning
HA, MR Severe
Amplification
and
Reflection
attack
MR, CN Medium
V. CONCLUSION
In this paper we tried to outline the issues of using
network mobility with TOR architecture. A NEMO
was not initially designed with anonymity hence many
of the NEMO procedures get affected by employing
TOR architecture. Due to this the NEMO become
vulnerable to many security attacks like
Eavesdropping, Bad apple attack, Heart bleed bug and
Sniper attack.
REFERENCES
[1] V. Devarapalli, R. Wakikawa, A. Petrescu, and P.
Thubert, “Network Mobility (NEMO) basic
support protocol,” RFC 3963, Jan. 2005.
[2] Goldschlag D., Reed M., Syverson P. Onion
Routing for Anonymous and Private Internet
Connections, Onion Router. (1999.)
[3] Perkins.C et al., “Mobility Support in IPv6”,IETF
RFC3775,June 2004.
[4] C. Ng, F. Zhao RFC 4889, Network Mobility
Route Optimization Solution Space Analysis,July
2007.
[5] S. Deering et al,” Internet Protocol, Version 6
(IPv6) ” RFC 2460,Dec 1998
[6] Akhoondi, Masoud; Yu, Curtis; Madhyastha,
Harsha V. (May 2012). LASTor: A Low-Latency
AS-Aware Tor Client (PDF). IEEE Symposium on
Security and Privacy. Oakland, USA. Archived
5. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 04, 2019
All rights are reserved by UIJRT.COM. 29
from the original (PDF) on 28 September 2013.
Retrieved 28 April 2014.
[7] Zetter, Kim (10 September 2007). "Rogue Nodes
Turn Tor Anonymizer Into Eavesdropper's
Paradise". Wired. Retrieved 16 September 2007.
[8] Soltani, Ramin; Goeckel, Dennis; Towsley, Don;
Houmansadr, Amir (27 November 2017). 2017
51st Asilomar Conference on Signals, Systems,
and Computers. pp. 258–262.
[9] Zetter, Kim (10 September 2007). "Rogue Nodes
Turn Tor Anonymizer Into Eavesdropper's
Paradise". Wired. Retrieved 16 September 2007.
[10] "BBC iPlayer Help – Why does BBC iPlayer think
I'm outside the UK?". www.bbc.co.uk Retrieved
10 September 2017.
[11] Le Blond, Stevens; One Bad Apple Spoils the
Bunch: Exploiting P2P Applications to Trace and
Profile Tor Users (PDF). 4th USENIX Workshop
on Large-Scale Exploits and Emergent Threats
(LEET '11). National Institute for Research in
Computer Science and Control. Retrieved 13
April 2011
[12] Manils, Pere; Abdelberri, Chaabane; Le Blond,
Stevens; Kaafar, Mohamed Ali; Castelluccia,
Claude; Legout, Arnaud; Dabbous, Walid (April
2010). Compromising Tor Anonymity Exploiting
P2PInformation Leakage (PDF). 7th USENIX
Symposium on Network Design and
Implementation.
[13] Jansen, Rob; Tschorsch, Florian; Johnson, Aaron;
Scheuermann, Björn (2014). The Sniper Attack:
Anonymously Deanonymizing and Disabling the
Tor Network (PDF). 21st Annual Network &
Distributed System Security Symposium.
Retrieved 28 April 2014.