Because of the widespread use of wireless sensor ne
tworks in many applications, and due to the nature
of
the specifications of these networks (WSN) in terms
of wireless communication, the network contract
specifications, and published it in difficult envir
onments. All this leads to the network exposure to
many
types of external attacks. Therefore, the protectio
n of these networks from external attacks is consid
ered the
one of the most important researches at this time.
In this paper we investigated the security in wirel
ess
sensor networks, Limitations of WSN, Characteristic
Values for some types of attacks, and have been
providing protection mechanism capable of detecting
and protecting wireless sensor networks from a wid
e
range of attacks
The document proposes a label-based secure localization scheme to defend against wormhole attacks in wireless sensor networks. It analyzes the impact of wormhole attacks on DV-Hop localization and describes a three-phase approach to label beacon and sensor nodes to identify and remove illegal connections introduced by wormholes. Simulation results show the scheme is effective at detecting wormholes and minimizing their impact on localization accuracy.
Packet hiding methods for preventing selective jamming attacksShaik Irfan
This project mainly describes how a data can be send securely via a network without getting being hacked by any intruder.here we use various different kind of cryptographic principal and secure mechanism where in which it complete protection to our data
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
This document proposes a new packet-hiding scheme called PHSPL to prevent selective jamming attacks. It first discusses existing jamming attacks and anti-jamming techniques' limitations. Then it analyzes previous schemes like spread spectrum, spatial retreats, and AONT-based hiding that fail against internal threats. The proposed PHSPL scheme sends packets with headers and sequence IDs directly to hosts to overcome AONT's disadvantage of continuous packet loss and prevent real-time packet classification by jammers. The conclusion reasserts that PHSPL can mitigate selective jamming attacks.
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
3 packet-hiding methods for preventing selective11W91D5809
This document proposes and evaluates methods for preventing selective jamming attacks in wireless networks. It discusses how an adversary with internal knowledge can launch selective jamming attacks by classifying packets in real-time. Three schemes are developed that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate these attacks. The security and performance overhead of the schemes are analyzed.
Preventing jamming attack by combining cryptographyRumana Firdose
This document outlines a project to prevent selective jamming attacks in wireless networks. The project aims to combine three cryptographic schemes: 1) a strong hiding commitment scheme (SHCS) based on symmetric cryptography, 2) a cryptographic puzzle hiding scheme (CPHS) that forces recipients to perform computations before extracting secrets, and 3) an all-or-nothing transformation (AONT) scheme that sends pseudo-messages corresponding to original packets so the jammer cannot classify packets until all are received. The objectives are to prevent selective jamming, avoid packet dropouts, show a jammer's impact, and secure transmissions. A literature review analyzes previous work on jamming detection and prevention. The methodology describes each scheme and an
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
The document proposes a label-based secure localization scheme to defend against wormhole attacks in wireless sensor networks. It analyzes the impact of wormhole attacks on DV-Hop localization and describes a three-phase approach to label beacon and sensor nodes to identify and remove illegal connections introduced by wormholes. Simulation results show the scheme is effective at detecting wormholes and minimizing their impact on localization accuracy.
Packet hiding methods for preventing selective jamming attacksShaik Irfan
This project mainly describes how a data can be send securely via a network without getting being hacked by any intruder.here we use various different kind of cryptographic principal and secure mechanism where in which it complete protection to our data
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
This document proposes a new packet-hiding scheme called PHSPL to prevent selective jamming attacks. It first discusses existing jamming attacks and anti-jamming techniques' limitations. Then it analyzes previous schemes like spread spectrum, spatial retreats, and AONT-based hiding that fail against internal threats. The proposed PHSPL scheme sends packets with headers and sequence IDs directly to hosts to overcome AONT's disadvantage of continuous packet loss and prevent real-time packet classification by jammers. The conclusion reasserts that PHSPL can mitigate selective jamming attacks.
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
3 packet-hiding methods for preventing selective11W91D5809
This document proposes and evaluates methods for preventing selective jamming attacks in wireless networks. It discusses how an adversary with internal knowledge can launch selective jamming attacks by classifying packets in real-time. Three schemes are developed that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate these attacks. The security and performance overhead of the schemes are analyzed.
Preventing jamming attack by combining cryptographyRumana Firdose
This document outlines a project to prevent selective jamming attacks in wireless networks. The project aims to combine three cryptographic schemes: 1) a strong hiding commitment scheme (SHCS) based on symmetric cryptography, 2) a cryptographic puzzle hiding scheme (CPHS) that forces recipients to perform computations before extracting secrets, and 3) an all-or-nothing transformation (AONT) scheme that sends pseudo-messages corresponding to original packets so the jammer cannot classify packets until all are received. The objectives are to prevent selective jamming, avoid packet dropouts, show a jammer's impact, and secure transmissions. A literature review analyzes previous work on jamming detection and prevention. The methodology describes each scheme and an
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
Abstract: The open nature of the wireless medium leaves it too weak to intentional interference attacks,
typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch
pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been introduced
under an external threat model. However, intruders with internal knowledge of protocol specifications and
network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we
address the problem of selective jamming attacks in wireless networks. In these attacks, the hacker is active only
for a short period of time, selectively targeting messages of high importance. We demonstrate the advantages of
selective jamming in terms of network performance degradation and hacker effort by presenting two case
studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be
forwarded by performing real-time packet classification at the physical layer. To reduce these attacks, we
develop three schemes that prevent real-time packet classification by combining cryptographic primitives with
physical-layer attributes. We analyze the security of the proposed methods and evaluate their computational and
communication overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document presents a project on preventing selective jamming attacks on wireless networks. It discusses existing jamming attacks, proposes a system to address selective jamming by an insider, and outlines the advantages of preventing real-time packet classification. The document contains sections on aim, existing system, proposed system, advantages, software and hardware specifications, conclusions, and references.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
This document presents optimal jamming attack strategies in wireless sensor networks. It discusses using monitoring nodes to detect jammer attacks and putting sensor nodes in sleep mode when attacks are detected to avoid energy loss. The document outlines different types of attacks in wireless sensor networks including passive and active attacks. It proposes using a detection algorithm at monitoring nodes to analyze observations and decide if an attack is occurring. The goal is to study controllable jamming attacks that are difficult to detect and defend against.
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper various techniques are discussed to overcome the Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
Ad-hoc wireless networks are dynamic in nature. Adhoc
networks are not depends on any predefined infrastructure.
Whenever there is need of communication at that point these
network can be deployed. In this paper we discuss Vampire
attacks. All protocols susceptible for vampire attack. Vampire
attacks are very easy to carry out throughout the network and
difficult to detect. Wireless sensor networks (WSNs) are the
foremost promising research direction in sensing and pervasive
computing. Previous security work has focused totally on denial
of service at the routing or medium access management levels.
Earlier, the resource depletion attacks are thought about solely
as a routing drawback, very recently these are classified into new
category as “vampire attacks”. Planned work examines the
resource depletion attacks at the routing protocol layer that
disable networks permanently by quickly debilitating node’s
battery power.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
Abstract: The open nature of the wireless medium leaves it too weak to intentional interference attacks,
typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch
pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been introduced
under an external threat model. However, intruders with internal knowledge of protocol specifications and
network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we
address the problem of selective jamming attacks in wireless networks. In these attacks, the hacker is active only
for a short period of time, selectively targeting messages of high importance. We demonstrate the advantages of
selective jamming in terms of network performance degradation and hacker effort by presenting two case
studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be
forwarded by performing real-time packet classification at the physical layer. To reduce these attacks, we
develop three schemes that prevent real-time packet classification by combining cryptographic primitives with
physical-layer attributes. We analyze the security of the proposed methods and evaluate their computational and
communication overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document presents a project on preventing selective jamming attacks on wireless networks. It discusses existing jamming attacks, proposes a system to address selective jamming by an insider, and outlines the advantages of preventing real-time packet classification. The document contains sections on aim, existing system, proposed system, advantages, software and hardware specifications, conclusions, and references.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
This document discusses sinkhole attacks on two routing protocols in mobile ad hoc networks (MANETs) - DSR and AODV. It analyzes how the protocols are affected when under a sinkhole attack, with packet delivery ratio, throughput, and packet drops all decreasing. Previous research that has aimed to detect and prevent sinkhole attacks is reviewed. The document then proposes a new prevention technique that uses encryption, sequence number checking, and checking for duplicate sequence numbers to identify malicious nodes and contain sinkhole attacks. Evaluating the protocols with and without this prevention technique could improve the security and performance of routing in MANETs.
This document presents optimal jamming attack strategies in wireless sensor networks. It discusses using monitoring nodes to detect jammer attacks and putting sensor nodes in sleep mode when attacks are detected to avoid energy loss. The document outlines different types of attacks in wireless sensor networks including passive and active attacks. It proposes using a detection algorithm at monitoring nodes to analyze observations and decide if an attack is occurring. The goal is to study controllable jamming attacks that are difficult to detect and defend against.
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper various techniques are discussed to overcome the Black hole attack.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
This document proposes a distributed trusted agent-based approach (DTADA) to detect and defend against cloning attacks and sinkhole attacks in wireless sensor networks. DTADA uses mobile agents that can move between nodes to detect attacks in a distributed manner without relying on a centralized authority. The mobile agents are programmed to identify inconsistencies that would indicate a cloning or sinkhole attack has occurred. The document reviews related work on centralized and local detection methods and their limitations. It then describes how DTADA uses mobile agents to efficiently detect attacks in a distributed way without high communication or energy costs.
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
Ad-hoc wireless networks are dynamic in nature. Adhoc
networks are not depends on any predefined infrastructure.
Whenever there is need of communication at that point these
network can be deployed. In this paper we discuss Vampire
attacks. All protocols susceptible for vampire attack. Vampire
attacks are very easy to carry out throughout the network and
difficult to detect. Wireless sensor networks (WSNs) are the
foremost promising research direction in sensing and pervasive
computing. Previous security work has focused totally on denial
of service at the routing or medium access management levels.
Earlier, the resource depletion attacks are thought about solely
as a routing drawback, very recently these are classified into new
category as “vampire attacks”. Planned work examines the
resource depletion attacks at the routing protocol layer that
disable networks permanently by quickly debilitating node’s
battery power.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKIJNSA Journal
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
This document discusses selective jamming attacks on wireless networks. It defines the problem of real-time packet classification by jamming nodes and developing mechanisms to prevent this. It presents the network and adversary models considered. Optimization problems are formulated to represent the best strategies for the attacker and network when they have imperfect knowledge of each other. Detection of jamming attacks is also addressed through monitoring packet delivery ratios across nodes.
This document summarizes research on defeating denial-of-service (DoS) attacks in wireless networks in the presence of jammers. It describes common types of jamming attacks like constant, deceptive, random, and reactive jammers. Detection techniques for jammers and methods to reduce the impact of DoS attacks are discussed. The objective is to detect jammers, lessen the effect of DoS attacks, and improve wireless communication security. Key jamming criteria like energy efficiency, detection probability, denial-of-service level, and strength against physical layer techniques are also outlined.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document summarizes a research paper on avoiding jamming attacks over wireless networks through packet hiding. It discusses how selective jamming works, impacting network performance. It proposes three schemes combining cryptographic mechanisms like puzzle schemes, commitment schemes, and all-or-nothing transformations with physical layer parameters to mitigate selective jamming. The main goal is to transform a selective jammer into a random one and enable safe transmission even with a jammer present.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Similar to Selective jamming attack prevention based on packet hiding methods and wormholes (20)
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Selective jamming attack prevention based on packet hiding methods and wormholes
1. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
DOI : 10.5121/ijnsa.2014.6308 99
SELECTIVE JAMMING ATTACK
PREVENTION BASED ON PACKET HIDING
METHODS AND WORMHOLES
Divya Ann Luke, Dr. Jayasudha. J .S
Department of Computer Science and Engineering
SCT College of Engineering, Trivandrum.
ABSTRACT- The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The
existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat
model. In wireless network the communications between nodes take place through broadcast
communication. That is why, if an attacker present within the network can easily eavesdrop the message
sent by any node. The main attack present in the wireless network is the selective jamming attack. This type
of attack mainly focuses a single node termed as target node. Attacker always tries to block the message
sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to
prevent the selective jamming attack in an internal threat model.
A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address
of jammer node to all other nodes in the network. Using a method called packet hiding, we can send
message through the network even though a jammer is present. This method is based on the technique
called Strong Hiding Commitment Scheme (SHCS). Here, the access point in a network region becomes the
wormhole whenever it finds out any node that violates the rules in a particular network region. That node is
then considered as a jammer node. The wormhole sends IP address of jammer to all other nodes.
Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along
with the message packet.So that the jammer is unable to identify its target node and the source can forward
its message safely through jammer node itself.
KEYWORDS-Selective jamming, Spread spectrum,Denial-of-Service attack,Wormholes, AES
1. INTRODUCTION
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks [1]. In
almost every case, jamming causes a denial of service type attack to either sender or receiver.
The easiest form of jamming a wireless network communication is to continually transmit
useless data to the node where the server becomes overloaded. Most people have no idea if a
jamming signal is in use.
It appears as if there is no service.This attack makes the network resource unavailable to its
legitimate users. The existing system is based on Spread Spectrum (SS). This technique
mainly focused on an external threat model. In broadcast communication, if an attacker
present within the network can easily eavesdrop the message sent by any node. In selective
jamming attack, the attacker always tries to block the message sent by its target node and it
leads to the Denial-of-Service attack [1] [2].
2. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
100
In this paper, main focus is to prevent selective jamming attack in an internal threat model. A
wormhole[3] is used to generate an alarm to indicate the presence of jammer to all access
point in the network. Presence of any jammer is detected a method called packet hiding [4] is
used to transmit message through the network.
This method is based on the technique called Strong Hiding Commitment Scheme(SHCS)
[4]. Alejandro Proano and LoukasLazos [4] proposed a paper based on this technique.
Wormhole based anti-jammingconcept along is included in the newly proposed method for
eliminating DoS attack.
Figure 1. Spread spectrum transmitter
Figure 2.Spread Spectrum receiver
The rest of the paper is organized as follows: Section 2 presents the problem statements,
which describes the details about existing system and its disadvantages. Section 3 presents
the details about proposed system. Section 4 and 5 describe about the implementation details
and performance analysis. Conclusion and directions for future work are given in section 6.
2. PROBLEM STATEMENT
In this section, we are going to describe about existing system and its disadvantages. The
existing system mainly focuses on an external threat model. That is why the attacker within
the wireless network can easily establish the selective jammingattack. There are two reasons
for this problem, first one is the broadcast communication between nodes within the wireless
network and second one is that the existing system uses the Spread Spectrum concept.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
101
Conventional anti jamming technique use Spread Spectrum (SS) communication. The Spread
Spectrum system take a user bit stream and perform an XOR with a pseudo noise
sequence.Figure 1 is the spreading of the user data with the pseudo noise. The spread signal is
then modulated with a radio carrier. Suppose for an example a user signal with a bandwidth
of 1 MHz spreading with the PN code (10110111000 - known as 11-chip Barker code) would
result in a signal with 11 MHz bandwidth. The radio carrier then shifts this signal to the
carrier frequency (2.4 GHz in the ISM band). This signal is then transmitted.Figure 2 shows
the simplified block diagrams of SS receiver. The SS receiver is more complicated than
transmitter. The first step in the receiver involves demodulating the received signal. The
receiver has to know the original PN code. This is the one main drawbacks of the existing
system.
Spread Spectrum technique provides bit-level protection by spreading bits according to a
secret pseudo noise (PN) code. That is known only to the communicating parties. This
method can only protect the wireless networks under an external threat model. We know that
the communication within the wireless network is done through the broadcast
communication. So, this is vulnerable under an internal threat model. All intended receivers
must know about the secrets used to protect transmissions. Another one drawback is
compromise of a single receiver. So, the sender needs to reveal relevant cryptographic
information to its receiver. A packet hiding technique is introduced for sending messages
among nodes within the wireless network [4].
The following sections describes about packet hiding and wormhole concept.
3. PROPOSED SYSTEM
A solution to the selective jamming attack in the wireless network would be the encryption of
packet that is going to send. Here encryption is applied to the attributes except destination. It
means that we hide the packet from attacker. The encryption is applied only to the attributes
except destination. That is why, during broadcasting there is no need for intermediate
decryption. Each node checks the IP address of incoming packet. If it is sent for that
particular node it will decrypt otherwise just forwarded to the next node.Alejandro Proano
and LoukasLazos [4] proposed technique known as the Strong Hiding Commitment Scheme
(SHCS) for packet hiding. This technique is based on symmetric cryptography [6][7]. First,
the sender‘s’ has a packet ‘P’ for a particular receiver ‘r’. First step in SHCS is applying a
permutation on packet P. That is, π1(P). Then encrypt the corresponding permuted packet
with a random key ‘k’. Here we can apply the Advanced Encryption Standard (AES)
technique. Now the encrypted value became c=Ek (π1 (P)). This packet is broadcast to all
nodes. Already told that, here encryption is applied only to the attributes except destination.
Therefore an attacker within the wireless network can’t identify the source of incoming
packet, because the packet is encrypted. Packet hiding methods make it difficult for attacker
to identify its targeted node’s messages[8][9].
One question arises here is that, how the node can identify that a particular node is a jammer.
The answer for this question is that a node which receives repeated acknowledgements for the
same message or another situation is that the packet is held by a node in the network for a
long time (not because of high network traffic) or if any node that violates the rules in a
particular network region. Then the access point can identify that the particular node is a
jammer.In this situation, the wormhole concept is newly incorporated. The access point then
turns into a wormhole. This wormhole then prevents the jamming activity of particular
4. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
102
jammer. By this method, all other nodes within that network can understand information
about the jammer. Next time when they send a message, they can select another path for
transmitting message or transmit through the same path, but must apply the packet hiding
technique.
The packet can also be send through a shortest path between source and destination. Any
algorithm for finding the shortest path between a source and destination can be used. In
wireless network, it is possible to find the path by analyzing the range of nodes. Figure 3
shows a process flow, which describes the overall working of this concept when we
implement it as practical.
Simulation of this proposed technique can be done by performing operations shown in the
process flow. NODE CREATION module creates the nodes in wireless network. When we
create a node we must specify the range of that particular node, because it is essential for the
calculation of shortest path. Nodes can move from one position to another position. Suppose
if one node is selected as a jammer, then the source send packet after applying SHCS
technique and transmit through shortest path between source and destination.
The application of this concept arises when we require a secure communication such as
emergency response operations, military, or police networks or safety-secret business
operations. Just take an example, in emergency response operations like after a natural
disaster, adhoc networks could be used for real-time safety feedback. In this situation, the
usual network may be damaged. Emergency rescue groups might rely upon the adhoc
networks for communication within that affected place.
Figure 3. Process flow
4. IMPLEMENTATION
The proposed method is simulated by creating a virtual network using Java Thread API. Each
node is created using as separate thread, it is possible to assign each node its position, auto IP
assignment, routing table updating. Java.awt.graphics, javax. Swingcolour packages are used
for creating the environments. A jammer node is created using thread and graphics packages
for applying selective jamming. A node can berepositioned to any location. A wormhole is
generated automatically to migrate from one place to another using graphics API. An alarm is
generated by the wormhole as packet to every node in the region.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
103
4.1 Network model
The network consists of a collection of nodes connected through wireless links. Nodes can be
communicating either directly (if they are within communication range), or indirectly through
multiple hops. Here both unicast and broadcast mode communications are possible. If there is
no jammer, unencrypted communication can be performing. Otherwise encrypted
communications might perform. For encrypted broadcast communications, packet will send
after applying packet hiding method.
4.2 Communication model
The source sent message to its destination either directly or indirectly. When the source gets
the information about jammer, it hides the packet and sends again through the same path.
Implementation of packet hiding method is described in section 4.3. A wormhole also
generates and it alerts all access points in the network about the presence of jammer. In
section 4.4, we describe implementation details of wormhole.
4.3 SHCS implementation
The sender‘s’ has packet ‘P’ for a receiver ‘r’. The implementation of Strong Hiding
Commitment Scheme technique has following steps:
• First apply a permutation on packet ‘P’. i.e., π1 (P).
• Encrypt the permuted packet π1 (P) with static key ‘k’ except destination part. We
obtain the commitment value, c= Ek (π1 (P)).
• The sender broadcast this commitment value along with static key ‘k’.
• At the receiver side, the reverse of above steps will take place.
Wormhole implementation
Wormholes can be used as a reactive defense mechanism. After receiving repeated
acknowledgements, the source becomes the wormhole and sends the information regarding
the jammer to all other nodes. This wormhole, then prevent the jamming activity of particular
jammer. By this method, all other nodes within that network can understand the information
about the jammer.
4.5 Shortest path implementation
Using the communication ranges between nodes, the shortest distance is calculated. A routing
table is maintained to store the distance between nodes in a network. Updations are possible
to the table whenever necessary.
5 PERFORMANE ANALYSIS
In [4], Alejandro Proano and LoukasLazos evaluate the impact of our packet-hiding
technique on the network performance through simulations. The SCHS requires the
6. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
104
application of permutation and one symmetric encryption at the sender side. The receiver
side, the inverse operations have to be performed. They can implement AES at speed of tens
of Gbps/sec. These processing speeds are higher than the transmission speeds of most current
wireless technologies.
Cagalj [3] evaluate the wormhole-based anti-jamming techniqueusing simulations written in
Mat lab. From that evaluation, we can understand the frequency of number of success
increases. The wormhole can effectively alert the presence of the jammer to other nodes.
From this, we can understand theselective jamming attack can be effectively prevented by
using packet hiding method and wormhole based anti-jamming technique. After including
wormhole-based anti-jamming and transmission through shortest path, the performance of the
packet hiding technique improved. It improves the performance and reliability of the wireless
networks.
6 CONCLUSION
In this paper, a technique is proposed for sending message in wireless network even if an
attacker is present. It also described the technique wormholes, which will alert all other nodes
about the presence of a jammer. Here the packet sends through the shortest path between
sender and receiver. After including wormholes and shortest path concept the performance of
packet hiding method improved. This technique is very effective in emergency response
operations, military, police networks etc. It improves the performance and reliability of
wireless networks. Static key used for encryption can be extended in future by adding random
key concept. The packet hiding technique can also be performed using another techniques
like Cryptographic Puzzle Hiding Scheme(CPHS) and Hiding Based on All-or-nothing
transformation(AONTs).
REFERENCES
[1] A.D.Wood and J.A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no.
10, pp. 54-62, oct. 2002.
[2] J. McCune, E.Shi, A.Perrig, and M.K.Reiter, “Detection of Denial-of-message attacks on sensor
networks broadcasts”, Proc. IEEE symp. Security and Privacy, May 2005.
[3] Mario Cagalj, SrdjanCapkun, Jean-PierroHubau “Wormhole-Based Anti jamming Techniques in
sensor networks”, IEEE Transactions on mobile computing, vol. 6, no. 1, Jan 2007.
[4] AlejandroProano and LoukasLazos, “Packet-Hiding methods for preventing Selective Jamming
attack”, IEEE Transactions on dependable and secure computing, vol. 9, no. 1,Feb-2012.
[5] I.Akyildiz,W.Su,Y.Sankarasubramaniam, and E.Cayirci, “A Survey on Sensor Networks,” IEEE
Comm. Magazine, vol. 40, no, 8, 2002.
[6] K. Gaj and P. Chodowiec, “ FPGA and ASIC Implementations of AES”,Cryptographic
Engineering, pp. 235-294 , Springer, 2009.
[7] O. Goldreich, “Foundations of Cryptography: Basic Applications”, Cambridge Univ.
Press,2004.
[8] W.Xu,W.Trappe,Y.Zhang, and T.Wood, “The Feasibility of Launching and Detecting Jamming
Attacks in Wireless Networks”, proc. MobiHoc ’05, pp.46-57, 2005.
[9] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, 2007.
7. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
105
[10] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel Surfing and Spatial Retreats: Defenses
against Wireless Denial of Service,”Proc. Third ACM Workshop Wireless Security, pp. 80-89,
2004.
Authors
DR. JAYASUDHA. J .Sis working as Professor and Head in the Department of
Computer Science & Engineering, SreeChitraThirunal College of Engineering,
Thiruvananthapuram. She has 18 years of teaching experience. She has organized
many community development programmes, short term courses and conferences.
She did her B. E. degree from Madurai Kamaraj University and M. E. degree from
National Institute of Technology, Trichy and doctorate degree from University of
Kerala. Her Ph.D. thesis title is “Web caching and Pre-fetching techniques for Web
traffic/Latency reduction”. She is recognized as approved research guide in thePh.D. programme
in Computer Science and guiding Ph.D. students in ManonmaniamSundaranar University and
Noorul Islam University. Now she is also doing research in Computer Networks. She has
published her research works in many national and international conferences and journals
DIVYA ANN LUKE currently doing her M.TECH degree in Computer Science &
Engineering at SreeChitraThirunal College of Engineering, Thiruvananthapuram. She
received her B.TECH degree in computer Science & Engineering from University of
Kerala in 2012.Her research i nterests include the design and analysis of security and
network protocols for wired and wireless networks.