Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary us ers and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary us ers and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
In wireless sensor and actor networks (WSAN), the
sensor nodes have a limitation on lifetime as they are equipped
with non-chargeable batteries. The failure probability of the
sensor node is influenced by factors like electrical dynamism,
hardware disasters, communication inaccuracy and undesired
environment situations, etc. Thus, fault tolerant is a very
important and critical factor in such networks. Fault tolerance
also ensures that a system is available for use without any
interruption in the presence of faults. In this paper an
improved fault tolerance scheme is proposed to find the
probability of correctly identifying a faulty node for three
different types of faults based on normal bias. The nodes fault
status is declared based on its confidence score that depends
on the threshold valve. The aim is to find the Correct
Recognition Rate (CRR) and the False Fear Rate (FFR) with
respect to the different error probability (pe) introduced. The
techniques, neighboring nodes, fault calculations, range and
CRR for existing algorithm and proposed algorithm is also
presented.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
We propose clusters based cooperatives based verbal architecture coop on the cellular ad hoc wireless sensor network Mawsn with the environment fading Rayleigh. The main ability and contributions of this paper are as follows. First, the proposed cage uses a cluster as a underlying system to help stable transmission services. 2D, the proposed enclosure uses a cluster based verbal cooperative exchange to effectively guide the package delivery ratio with multi hop power saving transmission. 0.33, we do not forget reasonable methods mainly based on cellular ad hoc nodes with sensing features and constant sensor nodes in the sensor field along with conventional research for the introduction of constant network sensors. Fourth, we have theoretical analysis with blackouts opportunities for proposed cooperative transmissions. Overall performance evaluation is run through simulation and evaluation. Sweeti Kumari | Dr. Ranjan Kumar Singh "Wireless Sensor Network Based Clustering Architecture for Cooperative Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43670.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/43670/wireless-sensor-network-based-clustering-architecture-for-cooperative-communication/sweeti-kumari
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better performance in preventing the wormhole attack. It utilizes the local knowledge of the next hop node and eavesdrops it. If it gets that spending time of the Packet is more than the given threshold, then it characterizes that node as wormhole attacker. However, this method has several shortcomings that it does not track the link transmission errors, which may be because of congestion in WSNs and also it not offers high mobility for maximum No. of nodes, which eventually decreases the WSNs performance. In order to handle this issue, a new multipoint relay based Watchdog monitoring and prevention technique is proposed in this paper. The proposed technique utilizes the dynamic threshold value to detect the wormhole attacker node, and then clustering and the Watchdog based optimistic path is selected for communicating the Packets. Thus, it reduces the overall Packet dropping, which improves the performance of the WSNs.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This paper describes the latest results of a research program that is designed to enhance the security of wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability. The current approach uses learning vector quantization neural networks that have the ability to identify patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
In wireless sensor and actor networks (WSAN), the
sensor nodes have a limitation on lifetime as they are equipped
with non-chargeable batteries. The failure probability of the
sensor node is influenced by factors like electrical dynamism,
hardware disasters, communication inaccuracy and undesired
environment situations, etc. Thus, fault tolerant is a very
important and critical factor in such networks. Fault tolerance
also ensures that a system is available for use without any
interruption in the presence of faults. In this paper an
improved fault tolerance scheme is proposed to find the
probability of correctly identifying a faulty node for three
different types of faults based on normal bias. The nodes fault
status is declared based on its confidence score that depends
on the threshold valve. The aim is to find the Correct
Recognition Rate (CRR) and the False Fear Rate (FFR) with
respect to the different error probability (pe) introduced. The
techniques, neighboring nodes, fault calculations, range and
CRR for existing algorithm and proposed algorithm is also
presented.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
We propose clusters based cooperatives based verbal architecture coop on the cellular ad hoc wireless sensor network Mawsn with the environment fading Rayleigh. The main ability and contributions of this paper are as follows. First, the proposed cage uses a cluster as a underlying system to help stable transmission services. 2D, the proposed enclosure uses a cluster based verbal cooperative exchange to effectively guide the package delivery ratio with multi hop power saving transmission. 0.33, we do not forget reasonable methods mainly based on cellular ad hoc nodes with sensing features and constant sensor nodes in the sensor field along with conventional research for the introduction of constant network sensors. Fourth, we have theoretical analysis with blackouts opportunities for proposed cooperative transmissions. Overall performance evaluation is run through simulation and evaluation. Sweeti Kumari | Dr. Ranjan Kumar Singh "Wireless Sensor Network Based Clustering Architecture for Cooperative Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43670.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/43670/wireless-sensor-network-based-clustering-architecture-for-cooperative-communication/sweeti-kumari
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better performance in preventing the wormhole attack. It utilizes the local knowledge of the next hop node and eavesdrops it. If it gets that spending time of the Packet is more than the given threshold, then it characterizes that node as wormhole attacker. However, this method has several shortcomings that it does not track the link transmission errors, which may be because of congestion in WSNs and also it not offers high mobility for maximum No. of nodes, which eventually decreases the WSNs performance. In order to handle this issue, a new multipoint relay based Watchdog monitoring and prevention technique is proposed in this paper. The proposed technique utilizes the dynamic threshold value to detect the wormhole attacker node, and then clustering and the Watchdog based optimistic path is selected for communicating the Packets. Thus, it reduces the overall Packet dropping, which improves the performance of the WSNs.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This paper describes the latest results of a research program that is designed to enhance the security of wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability. The current approach uses learning vector quantization neural networks that have the ability to identify patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Similar to Survey on Certificate Revocation in MANET (20)
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. 90 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
Fig 1: Mobile Ad hoc Network
The general ad hoc network characteristics are:
Mobility: Rapid deployment in areas with no
infrastructure often implies that the users must
explore an area and perhaps form teams/swarms
that in turn coordinate among themselves to
create a taskforce or a mission. We can have
individual random mobility as our base mobility
pattern. The mobility can have major impact on the
selection of a routing scheme and can thus
influence performance.
Multi-hopping: a multiple hop network is a
network where the path from source to destination
traverses several othernodes. Ad hoc often exhibit
multiple hops for congestion control, spectrum
reuse, and energy conservation.
Self-organization: The ad hoc network must
autonomously determine its own configuration
parameters including: addressing, routing,
clustering, position identification, power control,
etc.
Energy conservation: most ad hoc nodes have
limited power supply and no capability to
generate their own power. Energy efficient
protocol design is critical for longevity of the
network.
Scalability: In some applications the ad hoc
network can grow to several thousand nodes.
Hierarchical construction, Mobile IP or local
handoff techniques do dilute the issue but still
large scale is one of the most critical challenges in
ad hoc design.
Security: The challenges of wireless security are
well known ability of the intruders to eavesdrop
and jam/spoof the channel. Ad hoc networks are
more vulnerable to attacks than the
infrastructure counterparts. Both passive and
active attacks are possible.
Purpose of the Study Review:
The main purpose of this literature survey is to
take review of the existing work in this area to
understand the depth of
certificate revocation in mobile ad hoc network.
Here
presents study of the existing work which
makes understand the adhoc networks, issues
related to mobile nodes issues related to certificate
revocation, application of ad hoc networks.
Vulnerabilities of MANET:
1. Unreliability of wireless links between nodes:
Because of the limited energy supply and the
mobility of the nodes, the wireless links between
mobile nodes in the ad hoc network are not
consistent for the communication participants.
2. Dynamic topologies:
Nodes are free to move randomly; thus, the
network topology which is typically multi-hop may
changes frequently at any time.
3. Lack of Secure Boundaries:
There is not such a clear secure boundary in the
mobile ad hoc network, which can be compared
with the clear line of defense in the traditional
wired network. This vulnerability originates from
the nature of the mobile ad hoc network, because
of this MANET is prone to various security
attacks.
4. Threats from Compromised nodes Inside the
Network: Because of the mobility of the ad
hoc network, compromised node can frequently
change its attack target. and perform malicious
behavior to different node in the network, thus it is
very difficult to track the malicious behavior
performed by a compromised node especially in a
large scale ad hoc network.
5. Lack of Centralized Management Facility:
Due to absence of centralized management facility
problems detection of attacks, path breakages,
transmission impairments and packet dropping,
breakage of the cooperative algorithm take place
because decision making process is decentralized.
6. Restricted Power Supply:
The problem that may be caused by the restricted
power supply is denial-of-service attacks.
7. Active and Passive attacks:
• Active Attack:
An active attack disrupts the normal functioning of
the network by modifying or destroying the
data being exchanged. It is internal and external.
Internal attack can be possible by compromised
node.
External attacks are conducted by the nodes which
are not belongs to the network.
• Passive Attack:
Passive attack does not affect the normal operation
3. 91 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
of the network. The attacker observes the
data exchanged in the network without modifying
it.
II. . LITERATURE SURVEY
It is difficult to secure MANET, because of
the vulnerabilities of wireless links, the limited
protection of nodes, the dynamically changing
topology and the lack of infrastructure. Various
certificate revocation techniques have been
proposed in literature to improve the network
security. These revocation techniques are basically
categories in voting based and non-voting based
schemes.
Voting based mechanism: Voting based
mechanism is characterized as the method for
revoking a malicious attacker’s certificate through
votes from legitimate neighboring nodes.
A.Ubiquitious and Robust Access Control for MANET
The strategy proposed in [2] considers the issue
of access control for a mobile adhoc network. With
the help of this we give access to well carrying on
nodes and deny access from acting mischievously
nodes. A mischievously acting node can be either a
selfish nodes or malicious node. Proposed URSA
fully localized design paradigm to provide
ubiquitous and robust access control for MANET.
This arrangement takes ticket-based methodology.
Every well-behaving node uses a certified ticket
to take part in routing and packet forwarding.
Nodes without legitimate tickets are classified as
being misbehaving node. They will be denied from
any system access, despite the fact that they move
to different areas. In URSA, different nodes in
a local network neighborhood, typically one or
two-hop away, cooperate to monitor a node’s
behavior and determine whether it is well-
behaving or misbehaving by using certain
detection mechanism. The expiring ticket of a
well-behaving node will be renewed collectively
by these nearby observing neighbors, while a
misbehaving node will be revoked of its ticket. The
implementation is based on refined threshold
cryptography algorithms. When a number of
negative votes exceed a predetermined number, the
certificate of accused node will be revoked.
B. Localized Certificate revocation scheme
In [4] introduces localized certificate revocation
scheme. This scheme manages the issue of
certificate revocation in MANET, where online
access to (CA) Certificate Authority is a
challenging problem. This method is used in pure
ad hoc networks, where no access to central
authorities or certificate authority. This solution is
a decentralized certificate revocation scheme that
allows the nodes in MANET to revoke the certificate
of malicious entities. In this scheme each node
monitors the behavior of the other nodes. If node
found that given node is behaving suspiciously, it
is required to broadcast an accusation packet
against that node. Accusations from any given
node are weighted based on trust of the accuser:
the higher the trust of a node, the greater the
weight of its accusations, and vice versa. A nodes
certificate is revoked if the estimation of the total of
accusation weights against the given node is
greater than a threshold. Since all the nodes are
required to participate in each voting,
communication overhead is very high.
Non-voting based mechanism: In this
mechanism any node with legitimate certificate
can choose given node as malicious attacker.
C. Suicide for the Common Good:Credential
revocation scheme for MANET
In [3] proposed scheme considered the problem
of credential revocation in self-organizing systems.
This is decentralized system, where certificate
revocation can be immediately finished by only one
accusation. However the certificates of the both
accuser and accused node have to be revoked
simultaneously. Therefore the accusing node has
to sacrifice itself to remove an attacker from the
network. This method reduces the revocation time
and communication overhead of certificate
revocation. The suicidal approach does not take
into account the false accusation from malicious
attacker. Trouble with this approach is that a
malicious node can falsely accuse legitimate nodes.
Therefore the accuracy of the system is degraded.
D. Certificate Revocation to cope with false
accusation
In [5] proposed certificate revocation to cope with
false accusation. It solves the problem of false
accusation, where malicious attacker node
accused the legitimate node. In this scheme, CA is
responsible to handle all control messages and
holding accuser and accused node in warning list
(WL) and black list (BL). It is cluster based solution,
Cluster head (CH) detect falsely accused node and
remove from black list. In the proposed scheme, a
genuine node can be recorded in the BL by a false
attack detection packet sent from a malicious
node. To adapt with this issue, CHs are permitted
4. 92 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
to carry out the certificate recovery to correct the
mistakes in the BL. This scheme takes very short
time revoke certificate of malicious attacker.
Nirwan Ansari [1] proposed cluster based
revocation scheme CCRVC (Cluster-based
certificate revocation with vindication capability for
MANET). Here nodes are organized to form
clusters. In this scheme certificate authority CA
manages the warn list and black lists and issues
and remove the certificate of malicious nodes. If
any node behaves maliciously then its neighbor
node will accuse it to CA and that node placed in
black list. Then CA will send accusations to CH to
confirm that nodes in the black list are malicious
attacker or not. If CH found that attacker then its
certificate of malicious nodes are revoked.
Otherwise the nodes are recovered from warning
list. This scheme solves the problem of false
accusation and reduces the revocation time as
compared to voting based mechanism. The main
limitation of this approach is very high
communication overhead.
E.Certificate Revocation system based on Trust
mechanism:
The system proposed in [14] is divided into three
phases:
• Cluster Formation Phase
• Trust Calculation Phase
• Enhanced Certificate Revocation Phase
During cluster formation groups of mobile nodes
are formed using weighted clustering algorithm.
Next trust calculation phase, in which trust on
each node is computed. Trust in a network is used
to determine the relationship between nodes. Trust
is based on its previous behavior in forwarding and
dropping packets during transmission. Each and
every nodes observes their nearby nodes whether it
forward/drops the packets.The trust vector is
modified for each transaction. So, the Enhanced
Certificate Revocation algorithm is used to revoke
the certificate of malicious nodes. ECR achieves the
following:
• It examines the exact malicious node without
any fake accusation in the cluster with two levels of
accusation process.
• Proposed scheme requires AP (accusation
packet) transferred across the accuser, CH and CA,
which is sufficient to detect the improper nodes
and thus, it reduces communication complexity.
It minimizes the period of revocation
III. COMPARITIVE STUDY
Aim of this survey is to compare various
certificate revocation methods and to know their
limitations. Thispaper explains the fundamentals
of certificate revocation process. Then the concept
of voting based and non-voting based certificate
revocation has been discussed at length in this
paper. From this study it has been observed that
previous certificate revocation scheme has issues
like processing overhead and messaging overhead.
Table1. shows the comparative analysis of
certificate revocation schemes
TABLEI.COMPARITIVESTUDY
Certificate
Revocation
Scheme
Advantages Limitations
URSA-
Ubiquitous
andRobust
Access
Control
•Certificaterevo
ke
basedonvotesfr
om its neighbor.
•Whennegativ
e
votesexceedso
me
numbercertificat
e of
accusednod
eis revoked.
•Determining
thresholdis
challenging.
•Doesnotdeal with
falseaccusation.
Localized
Certificate
revocation
scheme[4].
•AswithURSA,no
CAexists.
•Revocationis
basedonweigh
ted
accusation.
•Certificaterevo
ked
whenweightedsu
m
fromvotesexcee
ds
predefinethresh
old.
•Sinceallnodes
Participatein
voting,
highcommunication
overhead.
•Increasesrevocation
time.
Suicidefor
Common
Good:New
strategyfor
credential
revocation
[3].
•Revocationquick
ly
Completedby
only
oneaccusation
.
•Accusingnodeh
as to
sacrificeitself.
•Fastremoval.
•Lowoverhead.
• Fully
decentrali
zed.
•Doesn’tdeal with
Falseaccusednode.
•Accuracydegraded.
CCRVC
(Cluster
based
Certificate
Revocation
with
Vindication
Capability
for
MANET)[1].
•Clusterbased
Scheme.
•CAmanagesWLa
nd dBL.
•Certificateof
maliciousnodec
an be revokedby
single neighbor.
•Dealswithfal
se accusation.
•High
Communicatin
overhead.
5. 93 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
The above studied systems are voting based and
non-voting based certificate revocation in the
literature survey are giving good results but they
are carrying few disadvantages with them like for
voting based scheme processing and
communication overhead during revocation. It is
also challenging task to calculating threshold in
voting based scheme. From previous solutions it
has been seen that, accurate revocation, quick
revocation, also small network overhead remain
the challenging issues to be addressed in a
certificate system, particularly in MANET. The
Enhanced Certificate Revocation system is
designed to provide efficient certificate
revocation that overcomes the drawbacks of
previous schemes.
IV. CONCLUSION
The aim of this survey is to compare various
certificate revocation methods and to know their
limitations. This paper explains the fundamentals
of certificate revocation process.Then the concept
of voting based and non-voting basedcertificate
revocation has been discussed at length in this
paper. From this study it has been observed that
previous certificate revocation scheme has issues
like processing overhead and messaging overhead.
From previous solutions it has been seen that,
accurate revocation, quick revocation, and small
network overhead remain the challenging issues to
be addressed in a certificate system, particularly in
MANET
REFERENCES
[1] W. Liu, H. Nishiyama, N. Ansari, and N. Kato,
”Cluster-Based Certificate Revocation with
Vindication Capability for Mobile Ad Hoc Networks”,
IEEE Trans. On parallel and distributed systems,
vol. 24, no2, February 2013.
[2] H. Luo , J. Kong, P. Zerfos, S. Lu, and L. Zhang,
“URSA: Ubiquitous and Robust Access Control for
Mobile Ad Hoc Networks,” IEEE/ACM Trans.
Networking, vol. 12, no. 6, pp.1049-1063, Oct. 2004.
[3] J. Clulow and T. Moore, “Suicide for the Common
Good: A New Strategy for Credential Revocation in
Self-organizing Systems,” ACMSIGOPS Operating
Systems Rev., vol. 40, no. 3, pp. 18-21, July 2006.
[4] G. Arboit, C. Crepeau, C.R. Davis, and M.
Maheswaran, “A Localized Certificate Revocation
Scheme for Mobile Ad Hoc Networks,” Ad Hoc
Network, vol. 6, no. 1, pp. 17-31, Jan. 2008.
[5] K. Park, H. Nishiyama, N. Ansari, and N. Kato,
“Certificate Revocation to Cope with False
Accusations in Mobile Ad HocNetworks,” Proc. IEEE
71st Vehicular Technology Conf. (VTC’10), May
16-19, 2010.
[6] W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A
Study onCertificate Revocation in Mobile Ad Hoc
Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June
2011.
[7] Zaiba Ishrat, “Security issues, challenges &
solution inMANET”, IJCST Vol. 2, Issue 4, Oct . -
Dec. 2011.[8] H. Yang, H. Luo, F. Ye, S. Lu, and L.
Zhang, “Security in Mobile Ad Hoc Networks:
Challenges and Solutions,” IEEE Wireless Comm.,
vol. 11, no. 1, pp. 38-47, Feb. 2004.
[8] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,”
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30,
Nov./Dec.1999.
[9] B. Kannhavong, H. Nakayama, A. Jamalipour, Y.
Nemoto, and N. Kato, “A Survey of Routing Attacks
in MANET,” IEEE Wireless Comm. Magazine, vol. 14,
no. 5, pp. 85-91, Oct. 2007.
[10]Dipti S. Sawant, E. Jayanthi, “Cluster-based
Certificate Revocation in mobile Ad hoc network
using Fuzzy Logic”, IJCEA, 2321-3469 , Volume 9,
Issue 7, July 2015.
[11]H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security
in Mobile Ad Hoc Networks: Challenges and
Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp.
38-47, Feb. 2004.
[12] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,”
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30,
Nov./Dec.1999.
[13]SJ. Indhu Lekha, R. Kathiroli, “Trust Based
Certificate Revocation of Malicious N odes in
MANET.”,(ICACCCT), IEEE International
Conference on Advanced Communication Control
and Computing Technologies,2014.
[14]A.Rajaram, Dr. S. Palaniswami, “Detecting Malicious
Node in MANET Using Trust Based Cross-Layer
Security Protocol. ”,(IJCSIT) International Journal of
Computer Science and Information Technologies,
Vol. 1 (2),130-137,2010.
[15]Kannan Govindan, Prasant Mohapatra, “Trust
Computations and Trust Dynamics in Mobile Adhoc
Networks: A Survey. ”,International Journal of
Innovative Research in Computer and
Communication Engineering, Communications
Surveys Tutorials, IEEE (Volume:14 , Issue: 2 )-
2012.