In mobile ad-hoc networks (MANET), the movement of the nodes may quickly change the networks topology resulting in the increase of the overhead message in topology maintenance. The nodes communicate with each other by exchanging the hello packet and constructing the neighbor list at each node. MANET is vulnerable to attacks such as black hole attack, gray hole attack, worm hole attack and sybil attack. A black hole attack makes a serious impact on routing, packet delivery ratio, throughput, and end to end delay of packets. In this paper, the performance comparison of clustering based and threshold based algorithms for detection and prevention of
cooperative in MANETs is examined. In this study every node is monitored by its own cluster head (CH), while server (SV) monitors the entire network by channel overhearing method. Server computes the trust value based on sent and receive count of packets of the receiver node. It is implemented using AODV routing protocol in the NS2 simulations. The results are obtained by comparing the performance of clustering based and threshold based methods by varying the concentration of black hole nodes and are analyzed in terms of throughput,
packet delivery ratio. The results demonstrate that the threshold based method outperforms the clustering based method in terms of throughput, packet delivery ratio and end to end delay.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
This document summarizes a research paper that proposes a new method for detecting wormhole attacker nodes in mobile ad hoc networks (MANETs). The method detects malicious nodes based on analyzing hop counts and time delays in routes, without requiring any special hardware or protocol modifications. The proposed method is simulated using OPNET software with scenarios of 50 nodes, both with and without wormhole attacks. The results show that without prevention, a wormhole attack decreases average hop count and increases delays. However, when the proposed method is applied, it is able to detect the attacker nodes and avoid their paths, regaining normal hop counts and delays.
Secure multipath routing scheme using keyijfcstjournal
Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be
targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but
under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by
nodes in deployment area to their securely located Sink, route security has to be guaranteed. Under
dynamic load and selective attacks, availability of multiple secure paths is a boon and increases the
attacker efforts by many folds. We propose to build a subset of neighbors as our front towards destination
node. We also identified forwarders for query by base station. The front is optimally calculated to maintain
the security credential and avail multiple paths. According to our knowledge ours is a novel secure
multipath routing protocol for WSN. We established effectiveness of our proposal with mathematical
analysis.
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
Mobile adhoc networks are connected by wireless
links which forms a random topology of mobile nodes.Random
topology and self-organising network provides on-demand
networking and dynamic topology.Due to lack of infrastructure
support each node are self-organising and any nodes can join
and leave the network at any time.Providing security to these
network is a challenging issue because these type of networks
suffer for various kinds of malicious attacks.One of the attacks
which are most difficult to detect in Mobile adhoc network is
Gray hole attack.In this paper an analytical Gray Hole attack
model is developed for AODV protocol.Experiments are
simulated for Gray Hole attacks under variety of adhoc
network condition.
Administrator&trust based routing protocolNinad Samel
This document proposes a new routing scheme called Administrator and Trust Based Secure Routing (ATSR) for mobile ad hoc networks (MANETs). ATSR selects administrator nodes to route packets based on parameters like battery power, node coverage, reliability, and trust. It uses digital signatures and asymmetric cryptography to provide message confidentiality and integrity. Simulation results show ATSR is efficient, robust, and trustworthy. The document describes the working methodology of ATSR, related work, the proposed algorithms for administrator selection and trust/willingness calculation, packet formats, and security analysis.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Impact of black hole attack on aodv routing protocolZac Darcy
A
m
obile
a
d
-
hoc
n
etwork (MANET)
is a
collection
of wireless mobile nodes
that dynamically self
-
organize
to form an
arbitrary and temporary network.
The mobile nodes can communicate wit
h each other
without
any fixed infrastructure.
MANET
can be set
up quickly to facilitate communication in a hostile environment
such as battlefield or emergency situation.
The various severe security threats are
increasing
on the
MANET
. One of these secur
ity threats is black hole attack which drops all received data packets intended
for forwarding. In this paper, we are simulating and analyzing the impact of black hole attack on Ad Hoc
On
-
Demand Distance Vector (AODV) protocol. Th
e simulation is carried on
NS
-
2 and t
he simulation
results are analyzed
on
various network performance
metric
s such as packet delivery ratio, normalized
routing overhead
and
average end
-
to
-
end delay
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document summarizes a research paper that simulates the Ad Hoc On-Demand Distance Vector (AODV) routing protocol under black hole attacks in mobile ad hoc networks (MANETs). The paper analyzes how black hole attacks affect key AODV routing metrics like packet delivery ratio and end-to-end delay. Through simulations with varying numbers of nodes, the paper finds that black hole attacks significantly reduce packet delivery ratios by diverting traffic to malicious nodes. The simulations provide insight into how AODV performance degrades under such attacks.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
Mobile Ad Hoc Network (MANET) is one kind of new wireless network
structures which is also known as infrastructure less network. Unlike devices in traditional
wireless LAN solution, all nodes are movable and the topology of the network is changing
dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile
Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks
due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic
network topology, open medium, autonomous terminal and management. As a result,
attackers can take advantage of flaws in routing protocols to carry out various attacks. The
black hole attack is one of such security issue in MANET. It could disturb the routing
protocol and bring about huge damage to the network’s topology. In this attack, a malicious
node gives false information of having shortest route to the destination node so as to get all
data packets and drops it. In this paper, we propose an algorithm which mitigates the
impact of black hole attack in AODV routing.
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
An Ad hoc Network is a pool of wireless mobile node
s energetically forming a network without the use o
f
any pre-accessible network infrastructure or centra
lized administrator. These nodes communicate with
each other by hop-to-hop communication. This dynami
c topology of mobile ad-hoc networks (MANETs)
allows nodes to get attached and leave the network
at any second of time. Thus MANET can be used in a
variety of fields. Current MANETs are designed prim
ary for military utility. This generic characterist
ic of
MANET has rendered its vulnerability to security at
tacks. Due to which unprotected attacks of the
malicious nodes can occur at any time. This paper f
ocuses on one such attack known as “Black hole
attack” and the routing protocol being used here is
AODV
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
The document discusses a proposed system to detect Sybil attackers in a wireless network using a centralized base station without additional hardware like GPS. It aims to identify Sybil identities with accuracy even when nodes are mobile. A Sybil attacker can create multiple identities on a single device to launch coordinated attacks. The proposed system uses a Neighbor Discovery Distance algorithm and centralized authentication server to reduce packet delay and detect attackers, enabling efficient secure data transmission. It evaluates topology design, neighbor discovery, and how Sybil attacks work to spoof identities and impact networks. Simulation results showed the scheme can effectively detect static and mobile Sybil attackers.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
Considering the application of wireless sensor networks in critical area, such as battlefields, establishing security in these
networks is of utmost importance. One of the most serious and dangerous attack against these networks is Sybil attack. In this attack, a
malicious hostile node creates multiple fake identities simultaneously. This misleads legitimate nodes and, by mistake, they assume
each of these identifiers as real separate nodes. In this attack, malicious hostile node attracts so heavy traffic that can dramatically
disrupt routing protocols which has devastating effects on the network functions such as data integration, voting, and resource
allocation. The current research proposes a new lightweight algorithm for detecting Sybil attack in Mobile Wireless Sensor Networks
using sink nodes. The proposed algorithm is implemented to be assessed in terms of detection and error rates efficiency in a series of
experiments. Comparison of the experiment results with the results of other available algorithms revealed optimal performance of the
proposed algorithm.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Similar to Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Black hole and greyhole attack in wireless mesh networkAnbarasu S
1) The document discusses black hole and greyhole attacks in wireless mesh networks. These are network layer attacks where malicious nodes drop packets instead of forwarding them, disrupting routing.
2) It analyzes these attacks through simulation in OPNET, finding they reduce throughput and increase network load. Implementing OLSR routing protocol helps mitigate but not eliminate the attacks' effects.
3) Greyhole attacks are more difficult to detect than black holes, as nodes sometimes forward packets. The paper evaluates attacks' performance impact and potential prevention techniques for securing the network layer.
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
This document discusses minimizing the Gray-Hole attack in mobile ad-hoc networks. It proposes a method called Denial Contradictions with Fictitious Node Mechanism (DCFM) which uses internal network knowledge to identify potential malicious nodes trying to falsify routing information without relying on external trusted parties. DCFM works by checking for logical inconsistencies between a node's routing messages and the actual network topology to detect attacks. The paper analyzes how DCFM can help detect Gray-Hole attacks under the Optimized Link State Routing protocol and reduce packet dropping compared to other approaches through early identification of malicious nodes. Simulation experiments demonstrate the effectiveness of DCFM at minimizing the Gray-Hole attack in ad-hoc
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
This document discusses detecting black hole attacks in wireless sensor networks. It begins with an abstract that introduces black hole attacks as a security threat in mobile ad hoc networks (MANETs) where malicious nodes drop packets. The document then reviews previous work on defending against black hole attacks, including using trust values, dummy nodes, and sequence number verification. It proposes using a "preventor node" to create a secure environment and detect black hole attacks in MANETs to improve network performance and security.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
This document describes a proposed approach to prevent wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling packets between two distant nodes, making routes through the wormhole appear shorter than actual routes. The proposed approach hybridizes the WHOP wormhole detection protocol with time synchronization to more efficiently detect wormholes and reduce routing delays. It works by having the source node send a "hound packet" after route discovery to check for inconsistencies that could indicate a wormhole. Receiving nodes process the hound packet to detect abnormal hop counts or delays that would out a wormhole. Simulation results show this approach can secure data transmission while minimizing delays without expensive hardware.
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
This document reviews various energy efficient techniques for wireless sensor networks. It discusses several routing protocols that have been proposed to reduce energy consumption and extend the lifetime of wireless sensor networks, including a 3D geographical routing protocol, a trust and energy aware routing protocol, and a directional transmission based energy aware routing protocol. It also reviews security attacks that can occur in mobile ad hoc networks, such as black hole attacks, wormhole attacks, and denial of service attacks. Finally, the document summarizes several papers that have studied and proposed improvements to energy efficient routing techniques.
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
This document discusses a technique for detecting and removing multiple black hole attacks in mobile ad hoc networks (MANETs) using sequence number variation in the Ad hoc On-Demand Distance Vector (AODV) routing protocol. The technique modifies the AODV protocol to include a protected field in route request and route reply packets that is used to vary the sequence number, helping identify black hole and gray hole attacks. Simulations using the NS-2 network simulator show that the proposed technique improves performance metrics like packet delivery ratio, throughput, and latency compared to a previous method, enhancing network performance in the presence of attackers.
This document summarizes a research paper on reducing packet loss in mobile ad hoc networks (MANETs). The paper discusses how MANETs are vulnerable to various security threats like black hole attacks that can cause packet dropping. It evaluates existing authentication schemes like ACK-based schemes that have overhead issues. The paper then proposes a modified ACK-based scheme using finite state automata to overcome decision ambiguity and minimize packet dropping while authenticating nodes in the MANET. Simulation results show that the proposed approach improves packet delivery ratio, throughput and reduces routing load compared to not using secure authentication.
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
This document summarizes various techniques that have been proposed for secure data transmission in mobile ad hoc networks in the face of security attacks. It discusses works that use techniques like self-protocol trustiness and the Dempster-Shafer theory to detect blackhole attacks. A dynamic forwarding window technique is described for detecting denial of service attacks in wireless sensor networks. The document also reviews improved CONFIDANT and other techniques for detecting grayhole, sinkhole, and jellyfish attacks on AODV routing. Cryptographic techniques including elliptic curve cryptography have also been proposed and evaluated for secure transmission and misbehavior detection in MANETs.
This document discusses spectrum sharing for 6G communications. It begins with an abstract that introduces the topic and authors. The introduction provides background on ad hoc networks and their vulnerabilities. The proposed system aims to develop secure methods to detect and mitigate wormhole attacks in networks where large secure data transmission is needed, such as battlefields. It proposes a system with four parts: route discovery, detection of malicious nodes, secure data transmission, and route maintenance. Key aspects of the proposed system include hop count analysis, use of the AODV routing protocol, use of intelligent agents to authenticate nodes and transmit secret data using RSA encryption to provide secure communication. The conclusion states that the wormhole attack can be prevented using this approach.
Wireless Sensor Networks (WSNs) are used nowadays, and therefore have broad range of
interesting applications. WSN can be of hypersensitive nature and therefore might require enhanced
secured environment. In today's world WSNs are the basic means of communication. The resources like
battery power, processing capabilities, communication and transmitting range are limitations of the system.
One of the major challenges in Wireless Networks is the security concerns. Attacks affecting these types
of systems are increasing. One of the major resource consumption attacks called vampire attacks. It
includes Stretch attack and Carousal attack which affects node and even bring down the entire system by
draining the Battery power. In Stretch Attack, attackers construct wrong long routes which leads to
traversing almost every node in the network. Stretch attack, increases packet route length, and packets get
processed by a number of nodes. Carousel attackers introduce some packet within a route tranquil as a
sequence of loops, and so the same node appears in the route many times. The proposed system overcomes
this challenge by using the techniques which include the Energy weight detection algorithm and Route
Tracking algorithm, so energy consumption is reduced to a great extent. EWDA and Route Tracking
algorithm is used to detect and prevent the above problems.
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
This document discusses techniques for detecting malicious packet dropping in wireless ad hoc networks. It begins with an introduction to wireless ad hoc networks and the security issues they face, such as packet dropping attacks. It then reviews existing literature on detecting such attacks using techniques like reputation systems. The document proposes a new detection mechanism that calculates the auto-correlation function of packet loss bitmaps to identify correlations between lost packets and determine if packet dropping is intentional. It describes the key phases of this approach, including key generation, auditing suspected nodes, and detecting malicious nodes. Finally, it discusses using randomized routing to mitigate the effects of detected packet dropping attacks.
A novel defence scheme against selfish Node attack in manetijcsa
This document proposes a new intrusion detection system (IDS) algorithm to defend against selfish node attacks in mobile ad hoc networks (MANETs). Selfish nodes flood the network with false information and drop packets from other nodes. The proposed IDS identifies selfish node behavior and blocks their activities. Simulation results show the IDS enhances network performance from negligible to 92% and prevents infection from attacks. The IDS is integrated with the AODV routing protocol to detect and eliminate selfish nodes within its transmission range.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Similar to Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
How to Avoid Learning the Linux-Kernel Memory ModelScyllaDB
The Linux-kernel memory model (LKMM) is a powerful tool for developing highly concurrent Linux-kernel code, but it also has a steep learning curve. Wouldn't it be great to get most of LKMM's benefits without the learning curve?
This talk will describe how to do exactly that by using the standard Linux-kernel APIs (locking, reference counting, RCU) along with a simple rules of thumb, thus gaining most of LKMM's power with less learning. And the full LKMM is always there when you need it!
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Are you interested in learning about creating an attractive website? Here it is! Take part in the challenge that will broaden your knowledge about creating cool websites! Don't miss this opportunity, only in "Redesign Challenge"!
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
In this follow-up session on knowledge and prompt engineering, we will explore structured prompting, chain of thought prompting, iterative prompting, prompt optimization, emotional language prompts, and the inclusion of user signals and industry-specific data to enhance LLM performance.
Join EIS Founder & CEO Seth Earley and special guest Nick Usborne, Copywriter, Trainer, and Speaker, as they delve into these methodologies to improve AI-driven knowledge processes for employees and customers alike.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Performance Budgets for the Real World by Tammy EvertsScyllaDB
Performance budgets have been around for more than ten years. Over those years, we’ve learned a lot about what works, what doesn’t, and what we need to improve. In this session, Tammy revisits old assumptions about performance budgets and offers some new best practices. Topics include:
• Understanding performance budgets vs. performance goals
• Aligning budgets with user experience
• Pros and cons of Core Web Vitals
• How to stay on top of your budgets to fight regressions
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs
1. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2352
Performance Comparison of Cluster based
and Threshold based Algorithms for
Detection and Prevention of Cooperative
Black Hole Attack in MANETs
P. S. Hiremath
Department of Computer Science, Gulbarga University, Gulbarga
Email: Hiremathps53@yahoo.com
Anuradha T.
Department of Computer Science and Engineering,
P.D.A College of Engineering, Gulbarga.
Email: anuradhat26@gmail.com
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------
In mobile ad-hoc networks (MANET), the movement of the nodes may quickly change the networks topology
resulting in the increase of the overhead message in topology maintenance. The nodes communicate with each
other by exchanging the hello packet and constructing the neighbor list at each node. MANET is vulnerable to
attacks such as black hole attack, gray hole attack, worm hole attack and sybil attack. A black hole attack makes
a serious impact on routing, packet delivery ratio, throughput, and end to end delay of packets. In this paper,
the performance comparison of clustering based and threshold based algorithms for detection and prevention of
cooperative in MANETs is examined. In this study every node is monitored by its own cluster head (CH), while
server (SV) monitors the entire network by channel overhearing method. Server computes the trust value based
on sent and receive count of packets of the receiver node. It is implemented using AODV routing protocol in the
NS2 simulations. The results are obtained by comparing the performance of clustering based and threshold
based methods by varying the concentration of black hole nodes and are analyzed in terms of throughput,
packet delivery ratio. The results demonstrate that the threshold based method outperforms the clustering
based method in terms of throughput, packet delivery ratio and end to end delay.
Keywords - Mobile ad-hoc network, attacks in routing protocol, cooperative black hole attack, AODV routing
protocol, clustering, server, cluster head, trust value.
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: October 08, 2014 Date of Acceptance: November 03, 2014
-------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Mobile ad hoc networks (MANETs) have received
increasing attention of the researchers in recent years due
to their mobility feature and ease of deployment. MANET
is a collection of independent wireless mobile nodes.
MANET doesn’t need any centralized management and
so it is very vulnerable to attacks Each node can move
freely in space. Therefore, the topology of network
changes rapidly due to its mobility nature. Node can act as
a router or as a host. Accordingly, an untrusted node can
join the network to perform certain malicious actions that
negatively affect the network performance. In MANETs,
routing protocols are designed to guarantee efficient
packet routing. Routing protocols can be classified into
reactive, proactive and hybrid. Proactive protocols are
called table-driven protocols. Reactive protocols are on
demand protocols, e.g. Ad-hoc On-demand Distance
Vector (AODV).Minimal configuration and quick
deployment make ad hoc networks suitable for emergency
situations like natural disaster. The presence of dynamic
and adaptive routing protocols enables ad-hoc networks to
be deployed quickly.
Security is one crucial requirement for these network
services. Implementing security [1] [2] is therefore of
prime importance in such networks. Provisioning
protected communications between mobile nodes in a
hostile environment, in which a malicious attacker can
launch attacks to disrupt network security, is a primary
concern. If a node misbehaves, it should be removed from
the network and cut off from all activities immediately. In
the present research, the focus is on fundamental security
problem of eliminating black hole attack and methods for
detection and prevention of cooperative black hole attack
in MANETs. In clustering based approach, for secure
routing among different clusters of same MANETs, a node
is designated as the CH (cluster head) in order to monitor
2. Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2352-2358 (20
each node’s activity in its cluster during dat
Finally, the server (SV) that monitors the
calculates trust value of each node in the
also checks all node’s activity. It declares b
by channel overhearing method. Hence
hole node is listed in the black hole list[ ] a
broadcasts a packet to all the nodes in
Attacks on mobile ad hoc networks can be
following two categories. A passive attack d
proper operation of the network [1] wher
attacks tries to destroy the data. Hence, ther
normal operation. These attacks can be clas
categories, namely, external attacks and in
External attacks are supported by nodes
belong to the network. Internal attack
nodes within the network or they are part o
Black hole and wormhole is categoriz
internal attack. In this paper, introductio
should explain the nature of the problem, p
purpose, and the contribution of the paper. T
each section may be provided to understan
the paper.
BLACK HOLE ATTACK
Black hole attack is a kind of denial of
where a malicious node can attract all pack
claiming it has a shortest path or fresh rou
does not participate in forwarding the packe
and also to destination[ 2]. Black hole att
error in routing information, or reply to no
routing information. It is responsible for
which can lead towards congestion in the ne
instance, in Fig. 1 source node N1 wants
packet to destination node and initiates the r
process. Additionally, assume that node N3
node, which claims that it has a route to t
Whenever it receives route request packe
immediately sends the response to node N
response from the node N3 reaches to
earliest, the node N1 thinks that the rout
finished. Further, source node N1 ignores a
and begins to send data packets to node N
packets through N3 are absorbed or lost,
becomes a black hole.
Fig.1. Black hole attack
A cooperative black hole attack is
attack where there are more than one bla
that collectively collaborate in the netwo
performance degradation of the network [6]
ons
14) ISSN : 0975-0290
ta transmission.
entire network
e network and
black hole node
detected black
and then server
n the network.
classified into
does not disrupt
reas the active
re won’t be the
ssified into two
nternal attacks.
s that do not
ks are due to
of the network.
zed as active
on of the paper
previous work,
The contents of
nd easily about
f service attack
kets by falsely
ute with it, and
ets to next node
tack can cause
ode with wrong
r loop creation
etwork [3]. For
s to send data
route discovery
3 is a malicious
the destination.
ets (RREQ), it
N1. In case the
node N1 the
te discovery is
all other replies
N3. Finally, all
, and thus N3
defined as an
ack hole nodes
ork and cause
].
The rest of the paper is org
Clustering approach is presented in
work is presented in Section III. P
presented in Section IV. In Section V
are presented and discussed. Finally,
the conclusions.
CLUSTER APPROACH
A MANET can be divided into
clusters. The nodes in a MANET
cluster head node and cluster membe
head CH is one hop away from its
facilitate the cluster head discovery
member keeps the IP addresses of oth
can hear. When the former cluster hea
cluster member does not receive thr
continuously from its cluster head, i
wireless link between them is broken
has moved away). Thus, a cluster m
latest refresh cluster head in its routi
cluster head, which is one hop away
itself a cluster head if it cannot hear
head. The selected cluster head is in
cluster member has joined its group.
will obtain the confirmation of its new
it receives the HELLO packet that carr
Message
Type
Length
IP
IP (cluster member)
IP (neighbor cluster heads
(a) Cluster head
Message
Type
Length
IP
IP (cluster head)
IP (cluster heads that can
(b) Cluster member
Fig. 2. Hello message format of (a
and (b) cluster member
II. RELATED WO
Recently, researchers pay much att
security issues. It is difficult to sec
networks, due to vulnerability o
dynamically changing topology, and la
Various kinds of algorithms for detec
of a black hole attack have been pr
network security in the literature. Bu
reported on detection and prevention
hole attack using clustering appro
describes the related work of previous
are supporting our proposed work. It is
the trust based collaborative approac
hole nodes is examined. In this metho
2353
ganized as follows:
Section II. Related
Proposed work is
V simulation results
Section VI contains
o several overlapped
are classified into
er node. The cluster
cluster member. To
y process, a cluster
her cluster heads that
ad moves away or a
ree HELLO packets
it considers that the
(or the cluster head
member adopts the
ing table as its new
from it, or becomes
any existing cluster
nformed that a new
The cluster member
w cluster head when
ries its IP address.
Reserve Word
s)
Reserve Word
be heard)
a) cluster head CH
RK
tention to MANET
cure mobile ad hoc
of wireless links,
ack of infrastructure.
ction and prevention
roposed to enhance
ut very less work is
of cooperative black
oach. This section
s methodologies that
s observed in [4] that
ch to mitigate black
odology, every node
3. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2354
monitors neighboring nodes and calculates trust value on
its neighboring nodes. The black hole attack in wireless
ad hoc networks is studied as a major issue in [5], where
in two technologies for communication between server
and access points and the access points to nodes are used.
This leads the node to modify its routing table, so
communication starts between node and server through
access point. In [6], a novel approach for detection and
prevention of cooperative black hole attack in a MANET,
by thresholding RREP sequence number, is proposed by
varying the concentration of black hole nodes. The
enhancement of basic AODV routing protocol, which
avoids black hole is discussed in [7]. A survey of black
hole attacks in MANETs is presented in [8]. The cluster
head selection is invoked on-demand, and thus it reduces
the communication costs. A survey of different clustering
schemas has been done in [9], which focuses on different
performance metrics.
III. PROPOSED WORK
The proposed methodology is based on clustering
approach for detection and prevention of cooperative black
hole attack. Mobile nodes follow the law of independent
mobility. These nodes are frequently taking part in
communication. In addition, they are able to send, receive
and route data during communication. Cluster heads(CHs)
are access points which are designated nodes. The main
responsibility of these nodes is to monitor the trusted
nodes when intra-cluster communication occurs. When
any node among its members sends and receives packet,
the count of packets is monitored by CH and this
information is called trust value. Also, this information is
forwarded to server node (designated node). The RREQ-
RREP messages of AODV routing protocol are used in
real-time for route discovery. Each node exchanges hello
message and construct neighbor list. Cluster formation
takes place when the designated cluster head (CH) sends
announcement to all the nodes in the network. The nodes,
which reply that they are its cluster members, are trusted
nodes with unique id assigned by the cluster head. Server
checks all node’s activity and declares black hole node
by channel overhearing method. In this method
Server(SV) listens to all channels, and observes each
node’s send and receive information. If any node lies, it
will declare that particular node as black hole node. Black
hole node receives data packets but never forwards these
packets to destination. Server sends along with node id,
the announcement by broadcasting to the entire network.
The nodes which receive this announcement will mark the
node with its id in its array blacklist[ ], Now the blacklist[
] gets updated as and when the black hole nodes are
detected, and also eliminates that node by not forwarding
any more packets with that node id. Here the
communication takes place between cluster head and
server initially. If server is not reachable then
communication takes between CH and CH and then
through server, untill it reaches the destination.
Algorithm 1. Detection and prevention of cooperative
black hole attack using clustering approach.
Step 1. Let N be the total number of nodes and x be the
number of black hole nodes. Let blacklist [ ] be
the array of size x of detected nodes. Let TV be
the Boolean variable denoting the trust value
(set to 0 or 1)in order to check the node’s
activity to monitor each node CH. CH[ ] needs
to maintain a record of send and receive count of
data packets at each node and it is declared as an
array, SEND_COUNT = RECEIVE_COUNT =
0 (data packets). SV be the server (also checks
all node’s activity and declare the black hole
node by channel overhearing method, where
server listens to all channels . It can observe that
each node send and receives information. If any
node lies, it will declare the node as black hole),
and CH[ ] be the array of Cluster Heads (CHs).
NL be the neighbor list constructed by
exchanging the hello messages from each node.
Initialize the array blacklist[ ] with null values .
Let S be the source node.
Step 2. Input the values of N and x.
Step 3. Randomly assign x% nodes as black hole nodes
among N nodes.
Step 4. The CH sends the announcement to all the
nodes in the network. Which ever nodes respond
by sending the reply to it, they become its
cluster members. If any node among members
sends and receives packets, count is monitored
by CH, and also CH forwards its member’s
information (sending, receiving and forwarding
of data packets) to server. Every 10sec, CH will
send announcement about its location.
Receiving node verifies whether it has any
CH_id already. If not store the current node as
CH. If it has CH_id already, it computes
distance of current and previous id, joins CH
with less distance and leaves from previous or
current CH. Joining nodes act as member’s for
that CH, through this intra cluster
communication. Initially, CH participates in
intra cluster communication.
Step 5. A cluster is denoted by C1={M}, where M is the
set of members existing in cluster C1. Let CH1
be the cluster head of C1. Define the successor
set of M as S and predecessor set as D. When a
source node S (SЄC1) seeks to set up a
connection to a destination D, S sends a route
request message (RREQ) to its cluster head
(CH1). The RREQ message includes the
following fields (source address S, destination
address D, session ID). If D is a member of
cluster C1 as well and hears the request message,
then
(i) It sets up multiple paths from source node S to
next hop nodes untill message reaches
destination D. If all paths have been established,
then it chooses the loopfree reliable paths.
4. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2355
(ii) If destination node D is not in the same cluster
as source S, the source node S sends a route
request message (RREQ) to its cluster head
CH1. The CH1 looks for which cluster the
destination node D belongs to, and forwards
the request to the next cluster head (CH2) or
server SV which has the information of all the
CHs. At the same time, it sets up multiple links
from source S to the destination node D.
Step 6. After route discovery phase, source node S starts
sending the data packet to CH. First CH tries to
communicate with the server SV (intra cluster
communication). If SV is out of range, CH1
sends RREQ to the next CH untill it reaches SV
or CH which has cluster member as destination
D.
Step 7. If SV receives a data packet from any of the
CHs, (a SV monitors entire network and also
CHs, SV has the information of each CH), SV
computes the trust value (TV) of each node by
checking the SEND_COUNT and
RECEIVE_COUNT of the node. The
intermediate node which receives a packet from
the source node, checks the trust value (TV) of
this node and forwards it to CH after
establishment of the path, as and when data is
transmitted, the Trust Value[ ] is computed
based on SEND_COUNT and
RECEIVE_COUNT of the receiving node as
follows:
If RECEIVE_COUNT - SEND_COUNT = 0,
then
TV is set to 1
else TV is set to 0.
Step 8. If TV=1 then the receiving node is not a black
hole node. Forward the data packet to
the next hop. Go to step 10. else (i.e. TV=0)
declare the receiving node as a Black hole (it
only receives the packet but, never forwards to
destination as it will drop the packet). Go to step
9.
Step 9. The SV announces by broadcasting a packet with
node id declared as Black hole. Then all the
nodes receive this packet and update their
blacklist[ ] and eliminate that node by not
forwarding any more packets to it. Then go to
step 7.
Step 10. Repeat steps 7 to 10 untill data packet reaches
the destination.
Step11. Compute the performance metrics, namely,
throughput, packet delivery ratio and end
to end delay.
Step 12.The non-zero elements of blacklist [ ] are the
detected black hole nodes among
N nodes.
Step 13. Stop.
IV. EXPERIMENTAL RESULTS AND
DISSCUSSION
The simulation experiments are conducted using NS-2.34
simulator by using the proposed algorithm. The simulation
runs of 100sec, 200sec, 300sec, 400sec and 500sec are
carried out and cooperative black hole attack using
clustering approach is observed. The simulation
parameters used in the experimentation are given in the
Table 1.
Table 1.Simulation parameters and their Values.
Parameters Value
Packet Size 1500bytes
Simulator NS-2.34
Transmission
range
250mts
Node placement Randomly
Number of black
holes
5%,10%,15%,
20% and 25% of
total nodes
Simulation run
time
100sec to 500sec
Number of Mobile
Nodes
50 nodes
Topology 1500 * 1500 (m)
Routing Protocol AODV
Traffic
Constant Bit
Rate (CBR)
The results of simulation are presented graphically in
the Figs. 3-7. The performance of the network is
analyzed in terms of three metrics, namely,
throughput, packet delivery ratio and end to end
delay, by varying percentage of black hole nodes
x% = 5, 10, 15, 20 and 25% of N = 50 total nodes.
Fig. 3. Throughput for varying number of black hole
nodes x=5, 10, 15, 20 and 25% of N=50 nodes: After
detection and prevention of black hole attack.
0
10000
20000
30000
40000
50000
100 200 300 400 500
Throughput
simulation Time
5%
10%
15%
20%
25%
5. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2356
Throughput: It is the rate of successfully transmitted
data packets per second in the network during the
simulation. The Fig. 3 shows the throughput for
varying number of black hole nodes and total number
of nodes N=50, after detection and prevention of
black hole attack using the proposed clustering
approach. It is observed that, as the number of black
hole nodes increases, throughput continues to be
decreased . There is improvement in performance due
to detection and prevention of black hole attack, as
shown in Table 2. The throughput is increased by
26.02% by using the proposed method, in comparison
with that in the presence of black hole attack with 5%
of nodes as black holes. With increase in
concentration of black holes, there is reduction in
throughput. As concentration of black hole nodes
increases, the available paths are fewer leading to
further reduction in throughput.
Table 2. Comparison of throughput for MANETs in
the presence of black hole attack and that after
detection and prevention of the attack
Number of
black hole
nodes(x%)
With black
hole attack
After
detection
and
prevention
Increase in
Throughput
5% 27330 36974 26.02%
10% 23301 30145 22.23%
15% 21853 27632 21.89%
20% 17741 21226 16.41%
25% 5586 6405 12.78%
Fig. 4. Packet delivery ratio (PDR) for varying number of
black hole nodes x=5,10, 15,20 and 25% of N=50 nodes:
After detection and prevention of black hole attack.
Table 3. Comparison of packet delivery ratio (PDR) for
MANETs in the presence of black hole attack and that
after detection and prevention of the attack.
Number
of black
holes
(x%)
With black
hole attack
After detection
and
prevention
%Increase
in PDR
5% 71.51% 86.76% 17.52%
10% 63.01% 75.89% 16.98%
15% 59.43% 69.53% 15.13%
20% 44.20% 50.81% 13.05%
25% 18.05% 20.72% 12.65%
Packet delivery ratio (PDR): It is the ratio of total number
of data packets received successfully at destination to the
number of data packets generated at the source. The
Fig.4shows the PDR for varying number of black hole
nodes x=5, 10, 15, 20and 25% of total nodes N=50, after
detection and prevention of black hole nodes. There is
improvement in performance due to detection and
prevention of black hole nodes, as shown in the Table 3.
As the concentration of black hole nodes increases, the
performance degrades due to non available paths as nodes
become black holes.
Fig.5. End to end (E2E) delay for varying number of
black hole nodes x=5, 10, 15, 20and 25% of N=50
nodes: After detection and prevention of black hole
attack.
Table 4. Comparison of end to end (E2E) delay for
MANETs with black hole attack and after detection
and prevention of the attack.
Numberof
blackhole
nodes (x%)
With black
hole attack
After
detection and
prevention
Decrease
in E2E
delay
5% 86.452 69.921 23.64%
10% 100.768 74.233 35.74%
15% 111.254 80.180 38.75%
20% 123.278 87.100 41.53%
25% 147.198 93.434 57.54%
0
20
40
60
80
100
120
100 200 300 400 500
packetdeliveryratio
simulation time
5%
10%
15%
20%
25%
0
50
100
150
200
100 200 300 400 500
endtoenddelay
simulaion time
5%
10%
15%
20%
25%
6. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2357
End to End Delay: It is the average time interval
between the generation of a packet at a source node
and successful delivery of that packet at destination
node. The Fig.5 shows the end to end (E2E) delay for
varying number of black hole nodes x=5, 10, 15, 20
and 25% of total nodes N=50, after detection and
prevention of black hole attack using the proposed
clustered approach method. It is observed that there is
a decrease in end to end delay due to detection and
prevention of black hole attack. As the concentration
of black hole nodes in the network increases, the
performance degrades due to the non-availability of
paths for data transmission, as shown in Table 4.
The Figs. 6-8 depict the performance comparison of
proposed method based on clustering approach with
that based on non-clustering approach [6] in terms of
throughput, PDR and E2E delay, respectively. The
numerical results of the two methods are compared
in Table 5. It is observed that, in general, the
clustering approach leads to network performance
degradation and hence, is not desirable. The
plausible reason for this network degradation in
cluster based approach is the increase in
computational overhead in data communication due
to maintainance of cluster heads.
Fig. 6. Throughput for varying number of black hole
nodes x=5,10,15,20 and 25% of N=50 nodes:
Comparison of cluster approach and without cluster
approach, after detection and prevention of black hole
attack.
Fig. 7. Packet delivery ratio (PDR) for varying
number of black hole nodes x=5, 10, 15,20 and 25% of
N=50 nodes: Comparison of cluster approach and without
cluster approach, after detection and prevention of
black hole attack.
Fig. 8. End to end delay (E2E) for varying number of
black hole nodes x=5, 10, 15, 20 and 25% of N=50 nodes:
Comparison of cluster approach and without cluster
approach, after detection and prevention of black hole
attack.
V. CONCLUSION
In this paper, a clustering based approach is
proposed, which distributes traffic among diverse multiple
paths to avoid congestion, optimize bandwidth and
improve the sharing rate of channel. It uses cluster
hierarchical structure to decrease routing control overhead
and improve the networks scalability. It can balance the
network load, dynamically deal with the changes of
network topology and improve reliability. The proposed
method is a novel cluster oriented method for detection
and prevention of cooperative black hole attack in mobile
ad-hoc networks. The simulation experiments are carried
out by varying concentration of black holes in the network
and also by varying the simulation run time. The
simulation results shows that, as the concentration of black
hole nodes increases the performance of the network
decreases, due to the non-availability of paths as more
nodes, become black holes. After comparing the results
for cluster approach and without cluster approach, it is
observed that without cluster approach shows better
performance than the cluster approach. It is attributed to
the enhanced computational cost due to maintenance of
cluster heads during data transmission.
ACKNOWLEDGEMENTS
The authors are grateful to the referees for their helpful
suggestions and support.
REFERENCES
[1]. Sudhiragrawal, Sanjeev Jain and sanjeevshanna.,“A
survey of Routing Attacks and Security Measures in
Mobile ad- hoc Neworks”, Journal of computing,volume
3, Issue 1, January 2011, ISSN 2151-9617, pp 41-47.
[2]. Pradip M. Jawandhiya and mangesh M. Ghonge, r.
M.S Ali, Prof. J.S Deshpande., “A survey of Mobile ad-
0
100000
200000
300000
400000
5%
10%
15%
20%
25%
Throughput
Number of black holes
with cluster
without
cluster
0
20
40
60
80
100
5% 10% 15% 20% 25%
Packetdeliveryratio
Number of black holes
with cluster
without
cluster
0
10
20
30
40
50
60
70
5%
10%
15%
20%
25%
endtoenddelay
Number of black holes
with cluster
without
cluster
7. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2352-2358 (2014) ISSN : 0975-0290
2358
hoc Neworks”, International Journal of Engineering
Science andtechnology, Vol. 2(9), 2010, pp4063-4071.
[3]. Jitendra savner and Vinit Gupta., “Clustering of
Mobile Ad hoc Networks: An Approach for Black Hole
Prevention”, International conference on issues and
challenges in intelligent computing techniques
(ICICT)2014, PP 361-365.
[4]. Fidel Thachil and K C Shet., “A Trust based
approach for AODV protocol to mitigate black hole attack
in MANET”, IEEE 2012,978-0-7695-4817-3/12, pp 281-
285.
[5]. Muhammad Raza and syedirfanhyder., “A Forced
Routing Information Modification Model for preventing
Black Hole Attacks in Wireless Ad Hoc Network”,IEEE
2011, 978-1-4577-1929 -5/12, pp 418-422.
[6]. P. S. Hiremath and Anuradha T., “Detection and
Prevention of Cooperative black hole attack in a
MANET”,International Journal of Research in Computer
and Communication Technology, Vol3, Issue 5, May-
2014, pp 604-609.
[7]. Tamilselvan L and Sankaranarayanan.,V. (2007).
“Prevention of black hole attack in MANET”, The IEEE
2nd International Conference on Wireless Broadband and
Ultra Wideband Communications.(auswireless 2007).
[8]. Fan-hsuntseng,Li-Dier Chou and Han-Chieh Chao.,
“A Survey of Black Hole Attacks in Wireless Mobile Ad
hoc Networks”, Human-centric Computing and
Information Sciences 2011,1:4, Springer, pp 1-16.
[9]. Ratishagarwal and Dr.maheshmotwani., “Survey of
Clustering algorithms for MANET”,International Journal
on Computer Science and Engineering Vol.1(2), 2009, pp
98-104.
Table 5.Performance comparison of cluster based and threshold based methods after detection and prevention of the
cooperative blackhole attack.
Percentage of
blackhole nodes
(x%)
Clustering (proposed method) Without clustering (method in [6])
%Increase in
throughput
%Increase
in PDR
%Decrease in
E2Edelay
%Increase in
throughput
%Increase
in PDR
%Decrease in
E2E delay
5% 26.02% 17.52% 23.64% 51% 29.10% 11.67%
10% 22.23% 16.98% 35.74% 44% 24.10% 15.33%
15% 21.89% 15.13% 38.75% 42% 23.59% 19.37%
20% 16.41% 13.05% 41.53% 40% 22.53% 23.32%
25% 12.78% 12.65% 57.54% 37% 19.01% 28.43%