Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Secure routing and data transmission in mobileIJCNCJournal
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used
in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects
AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each
pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node
has an ID which is evaluated from its public key and the messages that are sent are authenticated with a
signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network
lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We
present performance analysis to validate our claim.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Secure routing and data transmission in mobileIJCNCJournal
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used
in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects
AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each
pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node
has an ID which is evaluated from its public key and the messages that are sent are authenticated with a
signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network
lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We
present performance analysis to validate our claim.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further t o the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
An ad hoc network is a collection of mobile nodes that dynamically form a provisional network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole†attack. In this attack, a malicious node advertises itself as having the shortest path with highest sequence number to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. AODV protocol provides better performance than the DSR in the presence of Black holes with minimal additional delay and Overhead. Computer simulation using NS2 simulator on Linux operating system shows the behavior of malicious node. In this paper, we simulate and analyzed which routing method is best or suitable in different malicious behaviors
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...paperpublications3
Abstract: Mobile ad hoc networks (MANETs) are self-organizing the mobile nodes. It placed in adversary environments and it is vulnerable to security threats due to the characteristics of such networks. The main requirement on the networks is to provide unidentifiability and unlinkability for mobile networks. The existing protocols are not fully satisfied in this requirements. In this paper propose a new routing protocol that is enhanced authenticated anonymous secure routing (EAASR), to satisfy the unidentifiability and unlinkability. The new protocol provides less delay as compared with other protocol.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further t o the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
An ad hoc network is a collection of mobile nodes that dynamically form a provisional network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole†attack. In this attack, a malicious node advertises itself as having the shortest path with highest sequence number to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. AODV protocol provides better performance than the DSR in the presence of Black holes with minimal additional delay and Overhead. Computer simulation using NS2 simulator on Linux operating system shows the behavior of malicious node. In this paper, we simulate and analyzed which routing method is best or suitable in different malicious behaviors
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...paperpublications3
Abstract: Mobile ad hoc networks (MANETs) are self-organizing the mobile nodes. It placed in adversary environments and it is vulnerable to security threats due to the characteristics of such networks. The main requirement on the networks is to provide unidentifiability and unlinkability for mobile networks. The existing protocols are not fully satisfied in this requirements. In this paper propose a new routing protocol that is enhanced authenticated anonymous secure routing (EAASR), to satisfy the unidentifiability and unlinkability. The new protocol provides less delay as compared with other protocol.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. CONTENTS
Mobile Ad Hoc Networks
Routing In Mobile Ad Hoc Network
Zone Routing Protocol (ZRP)
Security Attacks On Ad Hoc Routing Protocols
Authenticated Routing For Ad Hoc Networks (ARAN)
Secure Zone RoutingProtocol (SZRP)
Secure Intra-zone Routing
Secure Inter-zone Routing
Reference Simulation Results
Conclusion
Future work
3. MOBILE AD HOC NETWORKS
Comprised of mobile computing devices (nodes)
Use wireless transmission for communication
No established infrastructure or centralized
administration
Figure shows an example of mobile ad hoc network
and its communication technology.
4. CHARACTERISITICS & DESIGN
CONSTRAINTS
Wireless medium: Wireless medium has neither
absolute, nor readily observable boundaries.
Autonomous and infrastructureless: Each node
operates in distributed mode, as an independent
router and generates independent data
Dynamic network topology: Nodes can move
arbitrarily, resulting in route changes and possibly
packet losses
Limited availability of resources: Batteries have
limited power supply, processing power is limited,
which limits services.
5. MANET APPLICATIONS
Military applications.
Emergency systems
Commercial uses
Collaborative and distributed computing.
Wireless sensor networks.
6. ROUTING IN MOBILE AD HOC NETWORK
Proactive Protocols: maintain consistent, up-to-date
routing information between every pair of nodes in the
network by propagating, proactively, route updates at
fixed intervals
Optimized Link State Routing (OLSR)Protocol:
Each node computes its MPRs from its set of neighbours.
When ever a node broadcasts a message, only those neighbours in
its MPR set rebroadcast the message.
a node only lists its connections to those neighbours that have
selected it as an MPR.
7. OPTIMIZED LINK STATE ROUTING
(OLSR)PROTOCOL
Each node starts with an empty MPR
set.
The N is defined to be the set of one-
hop neighbours .
N2 is the set of two-hop bidirectional
neighbours.
First nodes that are selected for the
MPR set are those nodes in N that are
the only neighbours of some node in N2.
The degree of each node n in N that is
not in the MPR set is calculated.
Once all the nodes in N2 are covered,
the process terminates.
Each node‟s MPR set is selected,
routing path within the network can be
determined.
8. ROUTING IN MOBILE AD HOC NETWORK
On-demand or Reactive Protocols: Establish a
route to a destination when there is a demand for it.
Once a route has been established, it is maintained
by the node until destination becomes inaccessible
or the route is no longer used.
Ad hoc On Demand Distance Vector (AODV) routing.
Minimizes no of required broadcasts by creating routes on a
demand basis.
Nodes that are not on a selected path do not maintain routing
information or participate in routing table exchanges.
Source node desires to send a msg to destination ,it initiates a
path discovery process to locate the other node
9. AD HOC ON DEMAND DISTANCE VECTOR
(AODV) ROUTING.
Each node maintains a broadcast ID. The broadcast ID is
incremented for every RREQ the node initiates (fig (a)).
Nodes record in their route tables the address of the
neighbour from which the first copy of the broadcast packet is
received, thereby establishing a reverse path.
Once the RREQ reaches ,destination responds by a route
reply (RREP) packet back to the neighbour from which it first
received the RREQ (Fig. b).
As the RREP packet is routed back along the reverse path,
nodes along this path set up forward route entries it indicates
the active forward route.
10. ROUTING IN MOBILE AD HOC NETWORK
Hybrid Routing Protocols: Mixture of proactive &
reactive protocols perform well in dynamic network
conditions.
Zone Routing Protocol (ZRP):
combining best properties of both proactive and reactive
When a node has a data packet, it checks if destination is within
its zone or not.
If within the zone, the packet is routed proactively.
Reactive routing is used if the destination is outside the zone.
11. ZONE ROUTING PROTOCOL (ZRP)
Routing zone of S includes the nodes A–I, but not
K.
The nodes of a zone are divided into peripheral
nodes and interior nodes. (Figure)
A–F are interior nodes, G–J are peripheral nodes
and node K is outside the routing zone.
H can be reached by two paths, one with length 2
and one with length 3 hops.
12. ZRP ROUTING COMPONENT
Node communicate with
interior nodes of it's zone
and is limited by the
zones radius.
Pro-active, table-driven
protocol.
Node continuously needs
to update routing
information
Allows for local route
optimization through
removal of redundant
routes and the shortening
of routes
Reactive approach enables
communication with nodes
in other zones.
Node does not send a query
back to the nodes the
request came from, even if
they are peripheral nodes
Take advantage of the local
routing information provided
by the IARP
Delay caused by the route
discovery is minimized
through the use of
bordercasting.
Intra zone Routing Protocol
(IARP)
Inter zone Routing Protocol
(IERP)
13. SECURITY IN MOBILE AD HOC NETWORKS
Confidentiality: Information in the network is
never disclosed to unauthorized entities.
Integrity: message being transferred between
nodes is never altered or corrupted.
Availability: The requested services (e.g.
bandwidth and connectivity) are available in a
timely manner.
Authenticity: Network service to determine a
user‟s identity.
14. SECURITY ATTACKS ON AD HOC ROUTING
PROTOCOLS
Information disclosure Attack
Node leaks confidential information to unauthorized
nodes in the network.
Attacks using Impersonation
Attacker assumes the identity and privileges of an
authorized node to make use of network resources.
Man-in-the-Middle Attack: malicious node impersonates the
receiver with respect to the sender & vice versa.
Sybil Attack: attacker pretends to have multiple identities. A
malicious node can behaves as if it were a larger no of nodes
by impersonating other nodes or by claiming false identities.
15. SECURITY ATTACKS ON AD HOC ROUTING
PROTOCOLS
Attacks using Modification
Attack disrupts routing function by having attacker
illegally modifying content of the msg.
Misrouting Attack: Non-legitimate node redirects routing
message and sends data packet to the wrong destination
Byzantine attack: Intermediate node collectively carries out
attacks such as, routing packets on non-optimal paths and
selectively dropping packets.
Denial of service (DoS) attack: Attacker attempts to prevent
legitimate and authorized users of services offered by the
network from accessing those services.
16. SECURITY ATTACKS ON AD HOC ROUTING
PROTOCOLS
Attacks using Fabrication
Intruder generates false routing messages in order to
disturb network operation .
Resource Consumption Attack: malicious node deliberately
tries to consume the resources (e.g. battery power, bandwidth,
etc.) of other nodes.
Black Hole Attack: malicious node falsely advertises good
path to the destination node during the path finding process
17. REQUIREMENTS FOR A SECURE ROUTING
PROTOCOL
Routing messages cannot be altered in transit.
Fabricated routing messages cannot be injected
into the network
Routing loops cannot be formed through malicious
action
Routes cannot be redirected from the shortest path
by malicious action
Unauthorized nodes should be excluded from route
computation and discovery
Network topology must not be exposed by the
routing messages to authorized nodes.
18. AUTHENTICATED ROUTING FOR AD HOC
NETWORKS (ARAN)
On-demand protocol designed to provide secure
communications
Each node in ARAN receives a certificate after
securely authenticating its identity to a trusted
certificate server
Certificate contains the node‟s IP address, its public
key, as well as the time of issuing & expiration.
Existence of a secure path to the destination.
Node A receives a certificate as
T → A: certA = [IPA, KA+, t, e] KT
19. AUTHENTICATED ROUTING FOR AD HOC
NETWORKS (ARAN)
All the fields are concatenated and signed with source
node I’s private key
I broadcasts a RDP for a destination D as:
I → brdcst: [RDP, IPD, certI, NI, t] KI
After RDP, D sends REP packet back along the reverse
path to I. REP packet is sent as:
D → J: [REP, IPI, certD, NI, t] KD
I on receiving the REP packet, verifies the destination‟s
signature KD.
When no traffic on existing route,then that route is
deactivated.
Nodes use ERR message to report links in active routes
broken due to node movement
20. SECURE ZONE ROUTING
PROTOCOL (SZRP)
Combines best features of both proactive and
reactive approaches & adds its own security
mechanisms.
Selecting ZRP as the basis for SZRP are
Based on concept of routing zones, more feasible to
apply the security mechanisms within a restricted area.
Separate nodes in terms of interior and exterior, certain
information etc. can be hidden to the exterior nodes
Incase of a failure, it can be restricted to a zone.
Address all security concerns like packet integrity &
data confidentiality
21. SECURE ZONE ROUTING
PROTOCOL (SZRP)
Each node has two pairs of private/public keys, one pair for
signing and verifying and the other for encrypting and
decrypting.
For Node X
Signing keys are SKX
Verifying VKX
Encrypting Keys are EKX
Decrypting keys DKX
SKX and DKX are private keys whereas VKX and EKX are public
keys
SZRP assumes the presence of trusted certification servers
called authorities (CAs)
Communicating nodes which we call the common nodes
(CNs).
Each CN before taking part in communication need to be
certified by some CA and are granted public keys.
22. CERTIFICATION PROCESS
•Each node requests a
certificate from it‟s nearest
CA..
•A common node X receives
a certificate from its nearest
CA as follows:
CA→ X: certX = [IPX, VKX,
EKX, t, e] | signCA
where, signCA = [IPX, VKX,
EKX, t, e] SKCA
•Contains the IP address of
X
• Two public keys VKX and
EKX of X, one for verifying
the signature signed by X
and other for encrypting a
packet to be send to X
• Timestamp „t‟ of when the
certificate was created
•T time „e‟ at which the
certificate expire
23. SZRP
SIARP computes the route to all intrazone nodes in
SIARP routing table.
Node A computes the route to B, T, E, F and Y and stores in its
SIARP routing table (proactive route computation)
If node A has a packet destined for node Y, the packet is
forwarded to Y using SIARP.
If node A wants to transmit a packet to Z, then interzone routing
is performed using SIERP
24. SECURE INTRA-ZONE ROUTING
Steps taken by SIARP (at node A) to route a data packet from A to Y.
A looks for the route to Y in its SIARP routing table and finds it to be A-F-Y.
A sends SKREQ packet to Y requesting KAY between A and Y.
A→ Y : [SKREQ, IPY, certA] | signA
where, signA = [SKREQ, IPY, certA] SKA
SKREQ packet contains a packet type identifier “SKREQ”
IP address of Y
A’s certificate, all appended by the signature signA of A signed using
SKA.
25. SECURE INTRA-ZONE ROUTING
Y on receiving this request, verifies using VKA
creates the session key KAY, encrypts it using EKA and sends it to A
as SKREP packet along the reverse route Y-F-A.
Y→ A : [SKREP, IPA, certY, {KAY}EKA] | signY
where, signY = [SKREP, IPA, certY, {KAY}EKA] SKY
packet type identifier “SKREP”
IP address of A
certificate of Y
session key encrypted using EKA
A on receiving the SKREP packet, verifies using VKY
decrypts it using DKA
extracts the session key KAY.
Once A gets KAY, it can encrypt the data packet and send it to Y .
Further communication between A and Y takes place similarly, using
this session key.
26. SECURE INTER-ZONE ROUTING
Steps are taken by SIERP to route the data packet
from A to Z
SIERP at A begins the secure route discovery process
to Z by bordercasting a SRD packet with the help of
MBRP.
A→ bordercast : [SRD, IPZ, certA, β, NA, t] | signA
where, signA = [SRD, IPZ, certA, β, NA, t] SKA
packet type identifier “SRD”
IP address of Z
A‟s certificate,
the zone radius „β‟
nonce NA created by A
current time t.
27. SECURE INTER-ZONE ROUTING
When T, E or Y receives the SRD, it checks the (IPA,
NA, t) to verify that it has not already processed this
SRD.
Receiving node uses A‟s public key, to validate the
signature
When T receives SRD it sets up a reverse path back to A
by recording the neighbour B ..
Since none of the nodes T, E and Y has the route to Z , all
rebordercasts the SRD to their peripheral nodes like T
rebordercasts the SRD to K.
T→bordercast : [[SRD, IPZ, certA, β, NA, t] | signA ]
| signT, certT
where, signT =[[SRD, IPZ, certA, β, NA, t] signA]]SKT
28. SECURE INTER-ZONE ROUTING
T’s peripheral node K checks the (IPA, NA, t) validates T’s
signature and sets up the reverse path to T .
K removes T’s certificate and signature.
It checks in its SIARP routing table whether it has a valid path to
Z
K→bordercast : [[SRD, IPZ, certA, β, NA, t] | signA ] | signK,
certK
where, signK =[[SRD, IPZ, certA, β, NA, t] | signA]]SKK
When SDR reaches J, it validates the packet, sets up the reverse
path to D, removes D‟s certificate and signature, signs the
contents of the message originally bordercast by A, appends this
signature and its certificate and forwards the SRD to Z.
J→Z : [[SRD, IPZ, certA, β, NA, t] | signA ] | signJ, certJ
where, signH =[[SRD, IPZ, certA, β, NA, t] | signA]]SKJ
29. SECURE INTER-ZONE ROUTING
SRD arrives at Z, Z on getting this SRD packet verifies it using both VKJ and
VKA, confirms its authenticity and extracts EKA.
Z creates a secure route reply (SRR) packet ,The first node that receives the SRR
sent by Z is H.
Z→H : [SRR, IPA, certZ, NA, t, {KAZ}EKA] | signZ
where, signZ = [SRR, IPA, certZ, NA, t, {KAZ}EKA]SKZ
Since, J is the next hop node to the source A after H:
H→J : [[SRR, IPA, certZ, NA, t, {KAZ}EKA] | signZ] | signH, certH
Where, signH = [[SRR, IPA, certZ, NA, t, {KAZ}EKA] | signZ] SKH
J removes H‟s signature and certificate and unicast to L
.J→L : [[SRR, IPA, certZ, NA, t, {KAZ}EKA] | signZ] | signJ, certJ
Where, signJ = [[SRR, IPA, certZ, NA, t, {KAZ}EKA] | signZ] SKJ
Each node checks the nonce and signature of the previous hop
Eventually the source A receives the SRR.
30. SECURE INTER-ZONE ROUTING
On getting the SRR
A verifies Z‟s signature to conform its authenticity
Extracts the session key KAZ
A encrypt the data packet using KAZ and send it to Z
along the same route.
31. ROUTE MAINTENANCE
Required in SIERP for inter zone routing.
SIERP keeps track of routes whether they are active or
not. A node generates an ERR message in either of the
following cases:
if data is received on an inactive route, or
link of an active route is broken due to node mobility
For a route between A and destination X, a node M
generates the ERR message for its neighbour N as
follows:
M→N : [ERR, IPA, IPX, certM, NM, t] | signM
Where, signM =[ERR, IPA, IPX, certM, NM, t] SKM
ERR messages are signed so malicious nodes cannot
generate ERR messages for other nodes.
32. SECURITY ASPECTS
No hop count information is
present in the SRD or SRR
packets.
Accept those packets that
have been signed with a
certified key issued by a
CA. This prevents man-in
the-middle attack and sybil
attack.
Does not prevent
fabrication of routing
messages, but it does offer
a deterrent by ensuring
non-repudiation
Compromised node may
leak confidential
information to
unauthorized
Attacker assumes the
identity and privileges of
an authorized node. Sybil
attack is common
Intruder generates false
routing messages, such as
routing updates and route
error messages.
SZRP ZRP
34. PACKET DELIVERY FRACTION
Packet delivery
fraction obtained
using SZRP is
above 96%
SZRP is highly
effective in
discovering and
maintaining
routes for
delivery of data
packets, even
with relatively
high node
mobility.
35. AVERAGE ROUTING LOAD IN BYTES
Byte routing
load of SZRP is
higher
compared to
that of ZRP.
Nearly 40% for
20 nodes as
compared to
22% for ZRP
with identical
topology
37. PERCENTAGE OF PACKETS DROPPED
THAT PASSED THROUGH MALICIOUS
NODES
SZRP, a much larger
fraction of packets
that passed through
malicious nodes
were dropped, as
compared to that of
ZRP.
In the presence of
30% malicious nodes
with no node mobility,
only 26% of packets
were dropped when
using ZRP, as
compared to almost
47% when using
SZRP.
38. CONCLUSION
SZRP is a simple protocol that supports nodes with
moderate resources and does not require significant
additional work from the nodes within the group. The
reference simulation results showed that SZRP is as
efficient as ZRP in discovering and maintaining routes. It
has a more robust security system and is resistance to
various security attacks.
39. FUTURE WORKS
The SZRP protocol considers that, the certification
authorities (CAs) are safe within the network and are
free from any kind of attacks caused either by external
advisory or internal compromised nodes. A possible
extension of the work may include employing
additional feature to SZRP so that it can handle a
scenario where the trusted certification authorities are
compromised or attacked.
40. REFERENCES
C. Siva Ram Murthy and B. S Manoj, “Ad Hoc Wireless Networks, Architecture and Protocols”,
Prentice Hall PTR, 2004.
Stefano Basagni, Macro Conti, Silvia Giordano and Ivan Stojmenovic, “Mobile Ad Hoc
Networks” , IEEE press, A john Wily & Sons, INC. publication, 2003
George Aggelou, “Mobile Ad Hoc Networks”, 2nd edition, Mc GRAW Hill professional
engineering, 2004
Imrich Chlamtac, Marco Conti, Jenifer J.-N. Liu, “Mobile Ad Hoc Networking: Imperatives and
Challanges”, Elsevier Network Magazine, vol. 13, pages 13-64, 2003
E.M. Belding-Royer and C. K. Toh, “A review of current routing protocols for adhoc mobile
wireless networks”, IEEE Personal Communications Magazine, pages 46–55, April 1999.
Behrouz A. Forouzan, “Data communication and Networking,” 2nd edition, Tata McHill
publication, 2001
C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector
Routing (DSDV) for Mobile Computers,” Comp. Commun. Rev., Oct. 1994, pp. 234–44.
C.-C. Chiang, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,”
Proc. IEEE SICON ‟97, Apr. 1997, pp. 197–211.
Haas Z. J., Pearlman M. R., and Samar P., “The Zone Routing Protocol (ZRP)”, IETF Internet
Draft, draft-ietf-manet-zone-zrp-04.txt, July 2002.
Jan Schaumann, “Analysis of Zone Routing Protocol”, Course CS765, Stevens Institute of
Technology Hoboken, New Jersey, USA, 8th December 2002
Haas, Zygmunt J., Pearlman, Marc R., Samar, P.: “Intrazone Routing Protocol (IARP)”, IETF
Internet Draft, draft-ietf-manet-iarp-01.txt, June 2001
Haas, Zygmunt J., Pearlman, Marc R., Samar, P.: “Interzone Routing Protocol (IERP)”, IETF
Internet Draft, draft-ietf-manet-ierp-01.txt, June 2001
41. REFERENCES
S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless
Networks,” ACM Mobile Networks and App. J., Special Issue on Routing in Mobile
Communication Networks, Oct. 1996, pp. 183–97.
P. Jacquet, P. Muhlethaler, A. Qayyum, “Optimized Link State Routing Protocol”, Internet
Draft, draft-ietf-manetolsr- 00.txt, November 1998.
A. Laouiti, A.Qayyum, and L.Viennot, “Multipoint Relaying; An Efficient Technique for
Flooding in Mobile Wireless Networks,” in Proceeedings of the 35th Annual Hawaii
International Conference on System Science (HICSS‟ 2002), Waikoloa, HI, January 2002
D.B. Johnson, D.A. Maltz, “Dynamic source routing in adhoc wireless networks”, in: T.
Imielinski, H. Korth (Eds.), Mobile Computing, Kluwer Academic Publishers, Dordrecht,
1996, pp. 153–181.
C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing”, In IEEE
Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb. 1999.
V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile
Wireless Networks,” Proc. INFOCOM ‟97, Apr. 1997
C-K. Toh, “A Novel Distributed Routing Protocol to Support Ad-Hoc Mobile Computing”,
Proc. 1996 IEEE 15th Annual Int‟l. Phoenix Conf. Comp. And Commun., Mar. 1996, pp.
480–86.
M.Joa-Ng and I. T. Lu, “A Peer-to-Peer Zone-Based Two-Level Link State Routing for
Mobile Ad Hoc Networks,” IEEE journal on Selected areas in Communications, vol. 17,
no. 8, pp. 1415- 1425, August 1999
42. REFERENCES
M. O. Pervaiz, M. Cardei, and J. Wu, "Routing Security in Ad Hoc Wireless Networks,"
Network Security, S. Huang, D. MacCallum, and D. -Z. Du (eds.), Springer, 2008.
Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian Edition, Tata
McHill publication, 2007
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis
& Defenses, Proc. of the 3rd Intl. Symp. on Information Processing in Sensor Networks,
2004
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure routing
protocol Resilient to Byzantine failures”, Proceedings of ACM workshop on wireless
security 2003, September 2003
Y. Hu, A. Perrig and D. B Johnson, “Rushing attacks and defense in Wireless Ad
HocNetwork Routing Protocol”, Proceedings of ACM workshop on wireless security 2003,
September 2003
Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy and P. Balamuralidhar, “A
Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”, Proceedings of
6th International Conference on Information, Communications and Signal Processing 2007,
December 2007
Y. Hu, A. Perrig and D. B Johnson, “Packet Leashes: A defense against Wormhole attacks
in Wireless Ad Hoc networks”, Proceedings IEEE INFOCOM 2003, vol. 3, April 2003
J. J. Tardo and K. Algappan, “SPX: Global authentication using public key certificates”, In
Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 232–244,
Oakland, CA USA, May 1991. IEEE Computer Society Press.
R.K nami ,szrp efficient over zrp/july2010
43. REFERENCES
Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol
for Ad Hoc Networks, Mobicom‟02, 2002.
R. Kravets, S. Yi, and P. Naldurg, “A Security-Aware Routing Protocol for Wireless Ad
Hoc Networks”, In ACM Symp. on Mobile Ad Hoc Networking and Computing, 2001.
P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, In
Proc. of the SCS Communication Networks and Distributed Systems Modeling and
Simulation Conference (CNDS 2002), Jan. 2002.
S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol
Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks”, In Proc. of IEEE/ACM
Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2002.
J. Broch, D. A. Maltz, D. B. Johnson, Y-C. Hu and J. Jetcheva, “A performance
comparison of multi-hop wireless ad hoc network routing protocols”, In Proc. ACM
MOBICOM, pages 85–97, Oct. 1998.