This document discusses security issues in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It describes various attacks against AODV like wormhole attacks, colluding misrelay attacks, replay attacks, and false route error messages. It also explains black hole attacks and distributed denial of service (DDoS) attacks. The document analyzes why AODV is vulnerable to such attacks due to its characteristics. It concludes that attacks like black hole attacks highly impact AODV's performance and proposes future work to simulate black hole attacks on AODV using a network simulator.
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Black hole and Grey hole attack is most happening attacks in Mesh networks. Mesh networks means nonstatic
networks with making loops of networks with the help of active hotspots. In Wireless networks all the
communication between the nodes is happening wirelessly and the nodes are so much resource constraint
that it is difficult to employ any security solutions of other ad hoc networks. So they are attacked by
malicious nodes. In black hole attack the attacker windup all the information and dropped it.
In black hole attack, the series of RREQ (route request) and RREP (route reply) follows the smallest way of
networking communication. The fault node always transmit RREP message as it receives RREQ, while
managing the receivers sequence number. By the help of fault node packets are dropped. Sometimes fault
node is authorised and otherwise it is unauthorised. Black hole attack is type of routing attack and can
bring harm to whole network. Grey hole attack is the kind of denial of service attack. In this attack, the
router which is mesh behave just not well and a subset of packets are forward and handle by receiver but
leave by others. The presences of these attackers are hard to detect in wireless networks because over the
wireless link the packets are lost due to bad channel quality. This paper deals with the study of analysis of
delay occurs by these attack in Wireless Mesh networks and its types and also discuss about previous
study by which we get idea about attack occurs in networks and also study various techniques to detect and
prevent network from black hole and grey hole attack. Then we discuss about their result by using
simulator OPNET.
An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper various techniques are discussed to overcome the Black hole attack.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Performance Evaluation of Routing Protocols Ankush Mehta
This is a research project based on Performance checking of the Routing Protocols. This Presentation shows the basic knowledge of the Protocols use (AODV, DSDV and DSR) and in the end it shows the Result and Conclusion by comparing the graphs which are generated through out the work.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Black hole and Grey hole attack is most happening attacks in Mesh networks. Mesh networks means nonstatic
networks with making loops of networks with the help of active hotspots. In Wireless networks all the
communication between the nodes is happening wirelessly and the nodes are so much resource constraint
that it is difficult to employ any security solutions of other ad hoc networks. So they are attacked by
malicious nodes. In black hole attack the attacker windup all the information and dropped it.
In black hole attack, the series of RREQ (route request) and RREP (route reply) follows the smallest way of
networking communication. The fault node always transmit RREP message as it receives RREQ, while
managing the receivers sequence number. By the help of fault node packets are dropped. Sometimes fault
node is authorised and otherwise it is unauthorised. Black hole attack is type of routing attack and can
bring harm to whole network. Grey hole attack is the kind of denial of service attack. In this attack, the
router which is mesh behave just not well and a subset of packets are forward and handle by receiver but
leave by others. The presences of these attackers are hard to detect in wireless networks because over the
wireless link the packets are lost due to bad channel quality. This paper deals with the study of analysis of
delay occurs by these attack in Wireless Mesh networks and its types and also discuss about previous
study by which we get idea about attack occurs in networks and also study various techniques to detect and
prevent network from black hole and grey hole attack. Then we discuss about their result by using
simulator OPNET.
An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper various techniques are discussed to overcome the Black hole attack.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Performance Evaluation of Routing Protocols Ankush Mehta
This is a research project based on Performance checking of the Routing Protocols. This Presentation shows the basic knowledge of the Protocols use (AODV, DSDV and DSR) and in the end it shows the Result and Conclusion by comparing the graphs which are generated through out the work.
An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
Simulation (http://www.tetcos.com/ ) of Sink Hole Attack in Mobile Ad-Hoc Networks can be done NetSim Network Simulator
follow this link for more Details: http://www.tetcos.com/
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Billions of connected devices and things. Billions of people. 5G will provide connectivity for all of these things and people as well as businesses and industry, bringing benefit to society. Operating machinery in hazardous environments from a remote control will be enabled through near-zero latency communication links that enable real-time video. Billions of video-enabled devices will be able to share bandwidth-hungry content. These are just a few applications that illustrate what 5G will be designed for.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
An ad hoc network is a collection of mobile nodes that dynamically form a provisional network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole†attack. In this attack, a malicious node advertises itself as having the shortest path with highest sequence number to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. AODV protocol provides better performance than the DSR in the presence of Black holes with minimal additional delay and Overhead. Computer simulation using NS2 simulator on Linux operating system shows the behavior of malicious node. In this paper, we simulate and analyzed which routing method is best or suitable in different malicious behaviors
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
3. 3
Content
Introduction
What is MANET ?
Characteristic of MANET
Routing protocol on MANET
What is DSR protocol ?
What is DSDV protocol ?
What is AODV Protocol?
Why We Use AODV Protocol?
Security On AODV Protocol.
Route discovery process of AODV
Different attacks On AODV Protocol.
Wormhole attack
Colluding misrelay attack
Replay attack
False route error message
What is DDOS Attacks?
What is Black Hole Attack?
Why AODV is vulnerable ?
Conclusion
Future Work
4. 4
Introduction
Wireless ad-hoc networks are composed of
autonomous nodes that are self- managed
without any infrastructure. In this way, ad-hoc
networks have a dynamic topology such that
nodes can easily join or leave the network at
any time.
5. 5
What is MANET?
A collection of wireless mobile hosts
forming a temporary network without the
aid of any established infrastructure. Each
node operates as both an end-system and
a router.
6. 6
Characteristics of MANET
MANET characteristics:
Mobility and dynamic topology
Bandwidth-constrained
Energy-constrained
Prone to security threats
7. 7
Routing protocol on MANET
The routing protocols for a MANET are:
Dynamic source routing protocol (DSR)
Destination-sequenced distance-vector routing
protocol (DSDV)
Ad hoc on-demand distance vector (AODV)
8. 8
What is DSR Protocol?
The Dynamic Source Routing protocol
(DSR) is a simple and efficient routing
protocol designed specifically for use in
multi-hop wireless ad hoc networks of
mobile nodes.
9. 9
What is DSDV protocol?
The DSDV described is a table-driven
proactive protocol. The basic
improvements made include freedom from
loops in routing tables, more dynamic and
less convergence time.
10. 10
What is AODV Protocol?
Ad-hoc On-Demand Distance Vector
(AODV) is an on demand routing protocol.
which is used to find a route between the
source and destination node as needed.
11. 11
Why We Use AODV Protocol?
We select AODV Protocol because:
One of the leading protocols for MANET
Uses sequence numbers to avoid loops
Quick adaptation to dynamic networks
Unicasting and multicasting is possible
Avoids counting to infinity problem
12. 12
Security Design Issues in AODV
In based on security issues of AODV protocol
divided in to three categories, they are:
Key Exchange
Secure Routing
Data Protection
13. 13
Security Design Issues in AODV
(Cont…)
Key exchange:
Nodes can generate a Group Session Key
between immediate neighbors using a
suitable group keying protocol.
These session keys are used for securing
the routing process and data flow.
Thus authentication, confidentiality and
integrity are assured.
14. 14
Security Design Issues in AODV
(Cont…)
Secure Routing (RREQ):
Fig1(a): Secure routing (RREQ)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
15. 15
Security Design Issues in AODV
(Cont…)
Data Protection:
Node ‘x’ desiring to establish end-to-end secure
data channel, first establishes a session key Kxy
with ‘y’.
‘x’ symmetrically encrypts the data packet using
Kxy and transmits it over the secure route.
Intermediate nodes forward the packet in the
intended direction.
Node ‘y’ decrypts the encrypted data packet using
Kxy.
16. 16
Security Design Issues in AODV
(Cont…)
Secure Routing (RREP):
Fig1(b): Secure routing (RREP)
a
b
h
c
e
f
n
p
i
y
x
g
Ka
Kb Kh
Kn
Kx
Kx
Kc Ke
Kf
Kp
Kf
Kg
Kxy
20. 20
Different attacks On AODV
Protocol
Known attacks on AODV are:
Wormhole attack
Colluding misrelay attack
Replay attacks.
False route error.
DDOS attack.
21. 21
Wormhole attack
Wormhole attack:
In this attack, a pair of colluding attackers record
packets at one location and replay them at
another location using a private high speed
network. The seriousness of this attack is that it
can be launched against all communications that
provide authenticity and confidentiality.
22. 22
Wormhole attack (Cont…)
RREQ
RREQ through wormhole
RREP
Wireless link
Wormhole link
Fig 4: Wormhole Attack
4 6 8
1 11
753 9
2
10
Attacker1 Attacker2
Target
23. 23
Colluding misrelay attack
Colluding misrelay attack:
In colluding misrelay attack, multiple attackers
work in collusion to modify or drop routing
packets to disrupt routing operation in a MANET.
This attack is difficult to detect by using the
conventional methods such as watchdog and
path rater.
25. 25
Replay Attack
Replay Attack:
A replay attack is a form of network attack in
which a valid data transmission is maliciously
repeated or delayed. This is carried out either by
the originator or by an adversary who intercepts
the data and retransmits it, possibly as part of a
masquerade attack by IP packet substitution.
26. 26
False Route Error Message
False Route Error Message:
The destination node or an intermediate node
along an active path moves or fails, the node
which precedes the broken link broadcast a
route error message to all active neighbors
which precede the broken link. The nodes then
invalidate the route for this destination in their
routing tables.
27. 27
What Is DDOS Attacks?
Distributed Denial of Service (DDoS) attacks
involve breaking in to hundreds or thousands
of machines, so for this reason, this attack
called Distributed. This kind of attack,
consume more bandwidth and uses more
sources in network. One of the most important
attacks of DDoS attacks category is Black
hole attack.
28. 28
What Is Black Hole Attack?
A black hole attack is a severe attack that
can be easily employed against routing in
mobile ad hoc networks. A black hole is a
malicious node that falsely replies for any
route requests without having active route to
specified destination and drops all the
receiving packets.
29. 29
Caused of Black hole attack
Scenario before the black hole attack:
A B C D
Active Link
Non active Link
Fig 6. (a)
30. 30
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
M gets control over
A-D communications
Step 1
Fig.6. (b)
31. 31
Caused of Black hole attack
(Cont..)
Scenario after the black hole attack:
A
B C
D
M
Step 2
Black Hole
Packet Drop
Fig.6. (c)
32. 32
Why AODV is vulnerable
AODV is particularly vulnerable due to its fundamental
characteristics, such as open medium, dynamic
topology, distributed cooperation, and constrained
capability.
Each mobile node operates not only as a host but
also as a router.
33. 33
Conclusion
The performance of routing protocols AODV
depends heavily on much kind of attacks.
One of these attacks is Black hole attack.
This attack has high effect on AODV
protocol.
34. 34
Future Work
For future work, I want to show the
performance of AODV protocol when it is
affected by the black hole attack. I will
use network simulator-2(NS-2) to show
the performance of AODV protocol during
black hole attack.
Editor's Notes
Custom animation effects: sparkle
(Basic)
To reproduce the text on this slide, do the following:
On the Home tab, in the Slides group, click Layout, and then click Blank.
On the Insert tab, in the Text group, click Text Box. On the slide, drag to draw a text box.
Enter text and select it. On the Home tab, in the Font group, in the Font list select Franklin Gothic Heavy, and then in the Font Size box, select 96 pt.
On the Home tab, in the Paragraph group, click Center.
Select the text box, and then under Drawing Tools, on the Format tab, in the WordArt Styles group, click Text Effects, point to Reflection, and under Reflection Variations select Tight Reflection, Touching (first row, the first option from the left).
With the text box still selected, under Drawing Tools, on the Format tab, in the bottom right corner of the WordArt Styles group, click the Format Text Effects: Text Box dialog box launcher. In the Format Text Effects dialog box, click Text Fill in the left pane, select Gradient fill in the Text Fill pane, and then do the following:
Click the button next to Preset colors, and then click Ocean (second row, second option from the left).
In the Type list, select Linear.
Click the button next to Direction, and then click Linear Up (second row, second option from the left).
Also in the Format Text Effects dialog box, click 3-D Format in the left pane. In the 3-D Format pane, under Bevel, click the button next to Top, and then under Bevel click Circle (first row, first option from the left).
To reproduce the first star on this slide, do the following:
On the Home tab, in the Drawing group, click Shapes, and then under Stars and Banners click 4-Point Star (first row, third option from the left). On the slide, drag to draw a star.
On the slide, drag the star onto the top of the first letter (in the example slide, it is “S”) in the text box.
With the star still selected, drag the yellow diamond adjustment handle down to make the points thinner.
On the Home tab, in the bottom right corner in the Drawing group, click the Format Shape dialog box launcher. In the Format Shape dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
In the Type list, select Radial.
Click the button next to Direction, and then click From Center (third option from the left).
Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
Also under Gradient stops, customize the gradient stops that you added as follows:
Select Stop 1 from the list, and then do the following:
In the Stop position box, enter 0%.
Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
Select Stop 2 from the list, and then do the following:
In the Stop position box, enter 100%.
Click the button next to Color, and then under Theme Colors click White, Background 1 (first row, first option from the left).
In the Transparency box, enter 100%.
Also in the Format Shape dialog box, click Line Color in the left pane, and in the Line Color pane click No line.
Under Drawing Tools, on the Format tab, in the bottom right corner of the Size group, click the Size and Position dialog box launcher. In the Size and Position dialog box, on the Size tab, under Size and rotation do the following:
In the Height box, enter 0.51”.
In the Width box, enter 0.51”.
In the Rotation box, enter 15°.
To reproduce the other stars on this slide, do the following:
On the slide, select the star. On the Home tab, in the Clipboard group, click the arrow under Paste, and then click Duplicate.
On the slide, drag the second star until it slightly overlaps the edge of a letter in the text box.
Change the size of the star in the Drawing Tools, on the Format tab, in the Size group.
Repeat steps 1-3 for a total of five stars.
To reproduce the animation effects on this slide, do the following:
On the Animations tab, in the Animations group, click Custom Animation.
On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the animation effect (grow & turn entrance effect for the first star). Under Modify: Grow & Turn, do the following:
In the Start list, select With Previous.
In the Speed list, select Very Fast.
On the slide, select the first star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the second animation effect (grow & turn exit effect for the first star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.7.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the third animation effect (grow & turn entrance effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.2.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the second star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the fourth animation effect (grow & turn exit effect for the second star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.9.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the fifth animation effect (grow & turn entrance effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.4.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the third star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the sixth animation effect (grow & turn exit effect for the third star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.1.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the seventh animation effect (grow & turn entrance effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.8.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fourth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the eighth animation effect (grow & turn exit effect for the fourth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.4.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Entrance, and then click More Effects. In the Add Entrance Effect dialog box, under Moderate, click Grow & Turn.
Select the ninth animation effect (grow & turn entrance effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 0.9.
In the Speed list, select 0.5 seconds (Very Fast).
On the slide, select the fifth star from the left. In the Custom Animation task pane, do the following:
Click Add Effect, point to Exit, and then click More Effects. In the Add Exit Effect dialog box, under Moderate, click Grow & Turn.
Select the 10th animation effect (grow & turn exit effect for the fifth star). Click the arrow to the right of the selected effect, and then click Effect Options. In the Grow & Turn dialog box, on the Timing tab, do the following:
In the Start list, select With Previous.
In the Delay box enter 1.5.
In the Speed list, select 0.5 seconds (Very Fast).
To reproduce the background effects on this slide, do the following:
Right-click the slide background area, and then click Format Background. In the Format Background dialog box, click Fill in the left pane, select Gradient fill in the Fill pane, and then do the following:
In the Type list, select Radial.
Click the button next to Direction, and then click From Center (third option from the left).
Under Gradient stops, click Add or Remove until two stops appear in the drop-down list.
Also under Gradient stops, customize the gradient stops that you added as follows:
Select Stop 1 from the list, and then do the following:
In the Stop position box, enter 0%.
Click the button next to Color, and then under Theme Colors click Black, Text 1, Lighter 35% (third row, second option from the left).
Select Stop 2 from the list, and then do the following:
In the Stop position box, enter 100%.
Click the button next to Color, and then under Theme Colors click Black, Text 1 (first row, second option from the left).