A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various
hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various
kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a
as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols;
Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and
compare the impact of these attacks on the
packet loss and consumption of energy.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no infrastructure such as a central station, router, roaming, or anything else used by other networks to help network structure or anything else that other networks use to help Network structure, is not used. Rather, they are just a few wireless nodes connecting to non neighboring nodes with the help of the neighboring nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are among wireless networks which have the most effective parameters in the ability of this type of networksto transfer multimedia from source to destination. In this research, we examine the challenges and solutions presented in DODV, DSR, and DSDV protocols.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no
infrastructure such as a central station, router, roaming, or anything else used by other networks to help
network structure or anything else that other networks use to help Network structure, is not used. Rather,
they are just a few wireless nodes connecting to non-neighboring nodes with the help of the neighboring
nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are
among wireless networks which have the most effective parameters in the ability of this type of networksto
transfer multimedia from source to destination. In this research, we examine the challenges and solutions
presented in DODV, DSR, and DSDV protocols
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio.
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSijwmn
Wireless communication is significantly influenced by the Mobile Ad Hoc Network (MANET), which
consists of nodes like mobile phones, tablets, computers, or other devices that can connect with one
another. MANET is a decentralized network that communicates without using any specified infrastructure.
The lack of battery power in this multihop network with no infrastructure is problematic. As a result,
proper transmission power utilization must be considered. Transmission power significantly impacts the
data dissemination of different routing protocols used in this MANET environment. By taking this issue into
account, the performance of routing protocols is examined based on different transmission power settings.
The packet delivery ratio (PDR), packet loss (PL), jitter, and Dealy all play a role in determining network
service quality. This study investigates how transmission power impacts MANET routing protocols’ quality
of Service (QoS). The MANET routing protocols investigated in this study include AODV, OLSR, DSDV,
and DSR. NS3 is used to create the simulation environment. According to this analysis, AODV outperforms
other routing protocols in overall performance.
Similar to The resistance of routing protocols against DDOS attack in MANET (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. Int J Elec & Comp Eng ISSN: 2088-8708
The resistance of routing protocols against DDOS attack in MANET (Maha Abdelhaq)
4845
a stream of Constant Bit Rate (CBR) traffic, a feature that does not exist in actual networks but is used for
simulation purposes of testing the most sensitive and efficient routing protocols under the attack effect
without affecting network performance. The DDoSM model will be incorporated into three types of routing
protocols: Zone Routing Protocol (ZRP) [13] which is a hybrid routing protocol, Ad-hoc On-Demand
Distance Vector (AODV) [14] which is a reactive routing protocol, and Location-Aided Routing (LAR) [15]
which is an aided routing protocol to geographic position. The DDoSM model performs flooding attacks on
these routing protocols and then analyzes resistance to DDoS attack by each of these routing protocols and
this can be useful for maintaining a MANET.
The remainder of the article is structured accordingly. We provide an overview of the research
background and work related to it in Section 2. Section 3 introduces the theoretical simulation model,
simulation environment and performance metric for the DDoS attack. Section 4 addresses the results and
evaluations and we summarize our research and future work in Section 5.
2. BACKGROUND AND RELATED WORK
2.1. Mobile ad-hoc network (MANET)
MANET is a type of wireless network that does not have a central base station to spread nodes.
As shown in Figure 1, When two nodes have to communicate with each other, they have to be within each
other's range and have to rely on other nodes for communication. MANET is easily set up in locations that do
not embrace the existence of wired networks for a short time span. It may be helpful in war or natural disaster
situations. However, due to the lack of networks and cables, MANET has several advantageous benefits such
as low budget and effortless operation, and because it has a quick implementation with setup for the same
purpose. Because of its open nature, and no central supervision, MANET suffers from security threats.
Figure 1. Mobile ad-hoc network
2.2. Routing in MANET
Routing is when each node has to find paths to transfer data packets between computing devices in
the network. Routing in MANET is a major challenge because the topology is temporary and dynamic.
This section reviews our study into the three chosen routing protocols.
2.2.1. Location-aided routing (LAR) protocol
LAR is one of the common routing protocols which seeks to reduce the overhead control
message [15, 16]. In order to identify a potential target node location, LAR utilizes the Global Positioning
System (GPS). LAR determines a portion of the network which is experiencing limited flooding on the basis
of that knowledge. So, the amount of control messages passing through the network declines during the route
discovery process. LAR assumes that the network nodes know their own location and the last known location
of the destination node. On this basis, LAR links the search area of the route to the region in which the route
to the destination node is located.
LAR adjusts the mechanism of path discovery so that only the nodes that are part of the search area
will retransmit route request packets. When the route request packet reaches the intermediate node, the node
first determines whether the request packet for the incoming route falls into the search zone specified. If not,
the route data package should be transmitted, unless it is part of the search area. If not, the packet will
be discarded.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4844 - 4852
4846
As the Figure 2 shows, if nodes I and K receive a route request for destination node D from node S,
the route request is sent because both I and K are within rectangular request range. The path request will be
sent. By comparison, if the route request is received by the node N, the request is ignored because N is
outside the rectangular route request zone.
Figure 2. LAR routing protocol [15]
2.2.2. Ad-hoc on-demand distance vector (AODV) protocol
This work adopts the AODV routing protocol [17, 18]. AODV is a powerful, self-starting,
large-scale routing protocol. Over many years it has been extensively studied and developed, there by
confirming its robustness and advantages. As shown in Figure 3(a), AODV's route discovery process was
accompanied by the source node transmits a route request (RREQ) packet to all MANET nodes.The RREQ
packet contains information on routing, including the IP address of the originator, ID of transmission and
sequence number of the recipient. Every intermediate node receives the RREQ packet and retains the reverse
path towards the source node. The intermediate node verifies that an RREQ packet with the same IP address
and transmitted ID has already been provided, and then decides whether an RREQ packet is to be refused
or admitted.
This verification process helps prevent attacks from floods. The intermediate node will validate
the destination sequence number contained in its routing list after processing the RREQ packet.
The intermediate node uni-casts the Route Response (RREP) packet to the source node if the sequence
number is greater than or equal to the one found in the RREQ packet. If there is no fresh-styled route to
the destination node, the RREQ packet must retain its Navigation until the target node is reached,
which actually uni-casts the RREP packet to the source node as shown in Figure 3(b).
(a) (b)
Figure 3. AODV routing protocol. S: source node, D: destination node, N1 to N5 intermediate nodes,
(a) RREQ packet propagation, (b) Path of the RREP packet [19]
4. Int J Elec & Comp Eng ISSN: 2088-8708
The resistance of routing protocols against DDOS attack in MANET (Maha Abdelhaq)
4847
2.2.3. Zone routing protocol (ZRP)
ZRP is a hybrid routing protocol. The main idea of this hybrid protocol is to use both the proactive
and reactive protocol routing mechanisms [20]. ZRP is based on the zone concept. A zone's nodes are broken
down into outer nodes and inner nodes. Outer nodes are connected nodes directly, and the inner nodes are
connected nodes indirectly. The routing zone is represented in hops with a radius ρ. If ρ=1 implies, the source
only goes to its direct link nodes. If ρ=2 the source could go further.
Since most communication takes place in ZRP between the nodes near to each other, ZRP uses
proactive protocols to discover the routing information within the zone. This is known as the IARP
(Intra-Zone Routing Protocol). The reactive protocols are used to discover the routes between zones. This is
named IERP (Interzone Routing Protocol) [21].
Consider the network found in Figure 4(a). The S node has a packet that must be sent to X.
The scale of the zone is = 2 radius. The node uses IARP's routing table to check if the destination lies
within its zone. A route request is given using IERP because it is not identified. The message is transmitted to
the outward nodes (the figure shows a gray color). Each check-in their routing table for the destination. Node
I cannot find the destination in its routing table. It, therefore, broadcasts the message to its outward nodes,
as shown in Figure 4(b) in gray color. The request is not passed back to the nodes D, F and S because of
query control mechanisms.
Lastly, node T receives a request to locate the destination in its routing zone, as illustrated in
Figure 4(c). Node T adds the path from node X itself to the route request. A route reply with the reversed
direction is generated and returned to the source node. If there were many routes to the destination,
several replies would be provided to the source.
(a) (b) (c)
Figure 4. ZRP routing protocol, (a) routing zone of node S, (b) routing zone of node I,
(c) routing zone of node T [13]
2.3. Related work
To our best knowledge, no one has conducted a comparative study of the three routing protocols
chosen up to now: AODV, ZRP, and LAR under the DDoS attack [10]. In [22], the authors have examined
the performance analysis of four AODV routing protocols, dynamic source routing (DSR),
destination-sequenced distance-vector routing (DSDV), and the optimized link state routing protocol
(OLSR). Then they concluded the implementation of these protocols under greyhole attacks [23] and
blackhole attacks [24, 25] would suffer an efficiency degradation compared to normal situations.
In [26], the author presented a performance evaluation survey for the routing protocols AODV and
temporary ordered routing algorithm (TORA) for various performance parameters under DDoS attack.
The simulation had only been implemented for 11 nodes. The results of this experiment showed that AODV
performs better than TORA.
In [2], the authors inspected the number of malicious nodes increases with various reactive routing
protocols during the flood attack; the overall network performance decreases. During their work, the authors
discussed many performance metrics such as the ratio of packet transmission, jitter, and throughput.
The result was that AODV performs best under flood attack.
In [27], the authors evaluated the performance of AODV and secure ad-hoc on-demand vector
routing (SAODV) under blackhole, greyhole, selfish and flooding routing protocols [28, 29]. They perceive
that the SAODV, which is an AODV extension designed to achieve the security features in the routing
messages, it has better performance under blackhole, greyhole and selfish attacks. In comparison,
under the flooding attack, the AODV has superior efficiency. The author also found that the network's effect
of flooding and blackhole attacks is greater than that of other attacks.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4844 - 4852
4848
In [30], the author investigated the effect of the Resource Consumption Attack (RCA) on MANET
performance, particularly the AODV protocol. This concentrated on how the number of attackers and their
location would influence the packet delivery ratio and jitter delay. The results of the study may help other
researchers propose solutions that could reduce the impact of RCA.
3. DDOS ATTACK SIMULATION MODEL (DDOSM)
Figure 5 demonstrates the architecture of DDoSM, the layout is extended to the three routing
protocols of choice, namely ZRP, AODV, and LAR. When a regular link begins using CBR traffic, it sends
out a stream of flooding packets to overload the destination. The study simulations were constructed using
NS-2 to evaluate the effectiveness of the DDoS attack, and the simulation findings were collected from two
experimental scenarios. The first scenario as shown in Figure 6 was applied by varying one factor which is
the number of attackers (3, 6 and 9), all attackers have a radio range of 250 m. and the attackers were placed
near the destination where they could exhaust their limited received window which in the worst case leads to
resource consumption which helps to clarify the effect of flooding attack.
Figure 5. DDoSM system architecture
Figure 6. Network topology for scenario I
6. Int J Elec & Comp Eng ISSN: 2088-8708
The resistance of routing protocols against DDOS attack in MANET (Maha Abdelhaq)
4849
The second scenario as shown in Figure 7 carries out the results by varying the radio range (300,
350 and 400 m), whereas the number of attackers is 3. Using a traffic load of 2 packets/s, the CBR
connection starts from 2 s until the simulation ends. The attackers target the CBR connection in both cases by
using a flood rate equal to 50 packets/s and the size of the packets is 1000 bytes and the attacker begins
simulation until the end at 30 s. The parameters of the simulation used in all scenarios are shown in Table 1.
Figure 7. Network topology for scenario II
Table 1. Simulation parameters
Parameter Value
Network area 1000m x 1000m
No. of nodes 50
Node speed 0 – 7 m/s
Bandwidth 11 mbps
Traffic Packet size 512 bytes
Packet rate 2 packets per second
Traffic type CBR
Flood interval 0.02 s
Flood rate 50 packets per second
Mobility model Random waypoint
Antenna model Omnidirectional
Propagation model Two-ray ground
Period of emulation 100 s
The research focused on each routing protocol; under the DDoS attack, two performance metrics
were calculated.
a. Throughput
Throughput is the number of bits per unit of time at the destination. In each experimental outcome,
this represents the sum of the destinations throughput values.
b. End-to-end delay
It is the time between the first bit of a packet being sent by the source and the end bit of the packet
being sent by the destination side. In each experiment, the average time is recorded for the destination
4. RESULTS AND DISCUSSIONS
4.1. Experimental results for the scenario I
Flooding CBR traffic affects MANET, where overwhelmed traffic is sent to the destination, creates
congestion in the usual route resulting in the data packet falling as a result, affecting the network
performance metrics. The experimental results in Figure 8 demonstrate that the network throughput declines
when there is an increased number of attackers. If put near the destination, DDoSM will create this difference
under 3, 6, and 9 attackers. ZRP decreases network throughput by around 42.1 percent compared to
the normal situation (zero attackers) when 3 attackers are added. In the case of LAR, it reduces network
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4844 - 4852
4850
throughput by 51.5 percent. AODV's efficiency is poorer than other protocols because it eliminates network
communication by 57.4%. ZRP reduces network throughput by around 49.1 percent compared to the normal
scenario (zero attackers) in the case of 6 attackers applied. In the case of LAR, it reduces network throughput
by 56.3 percent. AODV's performance is lower than other protocols because it reduces network throughput
by 61.7%. In the worst case of this experiment, as implemented by 9 attackers, ZRP reduces network
throughput by about 57.1 percent compared to the normal (zero attackers) situation. In the case of LAR,
it reduces network throughput by 62.8 percent. AODV's efficiency is poorer than other protocols because it
eliminates network communication by 67.3%. As noted in Figure 8, the impact of the attack is directly
proportional to the number of attackers, as a result, it is assumed that if the number of attackers reaches more
than 10, the network could crash because of the number of attackers is 3, the performance in LAR and
AODV dropped to half the normal scenario for each protocol and the performance of 9 attackers continues
to decrease. Figure 9 shows the effects of the attack on the end-to-end delay compared to the number of
attackers, AODV has the largest effect compared to other protocols where, in the case of 9 attackers,
the delay increases by around 98.71% and in the case of LAR and ZRP, the delay increases by 97.1% and
96% respectively, resulting in ZRP outperforming other protocols in terms of end-to-end delay.
Figure 8. Throughput vs number of attackers Figure 9. Delay vs number of attackers
4.2. Experimental results for scenario II
The simulation results of scenario II demonstrate the effect of varying the attacker's radio range
under the performance metrics (throughput and end-to-end delay), the radio range specifies the maximum
distance a node can send its data. Increasing the radio range leads to decreasing the network throughput and
increasing the end-to-end delay. In scenario II, the number of attackers is 3 and the flooding rate is
50 packets/s. The focus was on varying the radio range and observing its impact on the three routing
protocols, it can be seen from the Figure 10, ZRP shows a slight decrease in network throughput while LAR
shows an average dropping in throughput, however, AODV shows the worst performance under all ranges.
Figure 11 depicts the effect of different radio range on the end-to-end delay, AODV has the highest delay
compared to other two protocols in all ranges, in contrast, ZRP has the minimum delay and better performance.
Figure 10. Throughput vs radio range Figure 11. Delay vs radio range
8. Int J Elec & Comp Eng ISSN: 2088-8708
The resistance of routing protocols against DDOS attack in MANET (Maha Abdelhaq)
4851
5. CONCLUSION AND FUTURE WORK
This research analyzed three types of routing protocols in MANET and implemented a DDoSM
using CBR traffic flooding. DDoS has been deployed using the NS2 emulator in the routing protocols
AODV, ZRP and LAR. Additionally, the efficiency of routing protocols was analyzed using performance
parameters of the throughput and end-to-end delay. Finally, the assessment and analysis effects of
the protocols were presented. In both scenarios, ZRP worked best in terms of throughput and end-to-end
delay and exhibited the most resistance behavior relative to the protocols AODV and LAR. For future work,
we'll evaluate the performance of these protocols on other performance metrics, including jitter and overhead
routing. We are now looking to do a realistic deployment.
ACKNOWLEDGEMENTS
This research was funded by the Deanship of Scientific Research at Princess Nourah bint
Abdulrahman University through the Fast-track Research Funding Program.
REFERENCES
[1] R. Raju L. and C. R. K. Reddy, “Node activity based trust and reputation estimation approach for secure and QoS
routing in MANET,” International Journal of Electrical & Computer Engineering (IJECE), vol. 9, no. 6,
pp. 5340-5350, 2019.
[2] P. Kakkar and K. Saluja, “Performance investigations of reactive routing protocols under flooding attack in
MANET,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom),
pp. 623-627, 2016.
[3] S. G. Datey and T. Ansari, “Mobile Ad-hoc networks its advantages and challenges,” International Journal of
Electrical and Electronics Research, vol. 3, no. 2, pp. 491-496, 2015.
[4] M. Yadav and N. Uparosiya, “Survey on MANET: Routing protocols, advantages, problems and security,”
International Journal of Innovative Computer Science & Engineering, vol. 1, no. 2, pp. 12-17, 2014.
[5] P. Nayak and B. Vathasavai, “Impact of random mobility models for reactive routing protocols over MANET,”
International Journal of Simulation--Systems, Science & Technology, vol. 17, pp. 13.1-13. 9, 2016.
[6] S. Gurung and S. Chauhan, “A dynamic threshold based algorithm for improving security and performance of
AODV under black-hole attack in MANET,” Wireless Networks, vol. 25, pp. 1685-1695, 2019.
[7] S. Sarika, et al., “Security issues in mobile ad hoc networks,” Procedia Computer Science, vol. 92, pp. 329-335,
2016.
[8] O. H. Younis, et al., “A Survey on Security Attacks/Defenses in Mobile Ad-hoc Networks,” Communication on
Applied Electronics, vol. 6, no. 10, pp. 1-9, 2017.
[9] L. Sergii, et al., “Detection of the botnets’ low-rate DDoS attacks based on self-similarity,” International Journal of
Electrical & Computer Engineering, vol. 10, pp. 3651-3658, 2020.
[10] A. Saravanan, et al., “A new framework to alleviate DDoS vulnerabilities in cloud computing,” International
Journal of Electrical & Computer Engineering, vol. 9, no. 5, pp. 4163-4175, 2019.
[11] M. Narender and B. N. Yuvaraju, “Preemptive modelling towards classifying vulnerability of DDoS attack in SDN
environment,” International Journal of Electrical & Computer Engineering, vol. 10, no. 2, pp. 1599-1611, 2020.
[12] A. D. Basheer, et al., “SIEM-based detection and mitigation of IoT-botnet DDoS attacks,” International Journal of
Electrical & Computer Engineering, vol. 10, pp. 2182-2191, 2020.
[13] N. Beijar, “Zone routing protocol (ZRP),” Networking Laboratory, Helsinki University of Technology, Finland,
pp. 1-12, 2002.
[14] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," 2070-
1721, 2003.
[15] Y. B. Ko and N. H. Vaidya, “Location‐Aided Routing (LAR) in mobile ad hoc networks,” Wireless networks,
vol. 6, pp. 307-321, 2000.
[16] M. F. Khan and I. Das, “An Investigation on Existing Protocols in MANET,” in Innovations in Computer Science
and Engineering, pp. 215-224, 2019.
[17] C. E. Perkins, E. Belding-Royer, and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing,"
IETF MANET Internet Draft, 2003.
[18] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the Second IEEE
Workshop on Mobile Computer Systems and Applications (WMCSA'99), New Orleans, LA, pp. 90-100, 1999.
[19] M. Abdelhaq, et al., “Securing mobile ad hoc networks using danger theory-based artificial immune algorithm,”
PLoS ONE, vol. 10, no. 5, p. e0120715, 2015.
[20] S. R. Malwe, et al., “Location and selective-bordercast based enhancement of zone routing protocol,” in 2016 3rd
International Conference on Recent Advances in Information Technology (RAIT), pp. 83-88, 2016.
[21] A. Kumar, et al., “Location-based routing protocols for wireless sensor networks: A survey,” Wireless Sensor
Network, vol. 9, no. 1, pp. 25-72, 2017.
[22] M. S. Khan, et al., “A comparative performance analysis of MANET routing protocols under security attacks,”
in Mobile and Wireless Technology, pp. 137-145, 2015.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4844 - 4852
4852
[23] S. Gurung and S. Chauhan, “A novel approach for mitigating gray hole attack in MANET,” Wireless Networks,
vol. 24, pp. 565-579, 2018.
[24] S. Prakash and A. Swaroop, “A brief survey of blackhole detection and avoidance for ZRP protocol in MANETs,”
in 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 651-654, 2016.
[25] L. A. K. Al Dulaimi, et al., “Black hole attack behavioral analysis general network scalability,” Indonesian Journal
of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 677-682, 2019.
[26] S. Garg, “Performance analysis of AODV and TORA under DDoS attack in MANETs,” IJSR International Journal
of Science and Research, vol. 3, no. 10, pp. 297-304, 2014.
[27] M. A. Abdelshafy and P. J. B. King, “AODV and SAODV under attack: Performance comparison,” in
International Conference on Ad-Hoc Networks and Wireless, pp. 318-331, 2014.
[28] M. M. Ghonge, et al., “Selfish attack detection in mobile Ad hoc networks,” in 2017 International Conference on
Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1-4, 2017.
[29] K. A. P. Yamini, et al., “Handling Selfishness over Collaborative Mechanism in a Mobile Ad hoc Network,”
Journal of Cyber Security and Mobility, vol. 7, no. 1&2, pp. 39-52, 2018.
[30] M. Abdelhaq, et al., “The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing,”
International Journal of Network Security, vol. 16, pp. no. 4, pp. 399-404, 2014.