An Investigation of DOS Flooding Attack in VANET.

Size: px
Start display at page:

Download "An Investigation of DOS Flooding Attack in VANET."

Transcription

1 A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute of Technical Teachers Training and Research(NITTTR),Bhopal vikash.31st@gmail.com, rajeev14357@gmail.com,rkkapoor@nitttrbpl.ac.in Vehicular ad network is a sub set of mobile ad hoc network. In this network vehicles are played role as network nodes and the mobility is a defined as bi-directional mobility models. In this network basically two kind of communication performed first V2V (vehicle to vehicle) and V2I (vehicle to infrastructure). Here the need of infrastructure is used to support high mobility and bi-directional traffic in road. Therefore, RSU (road side units) are installed in between both ends in road. These road side units are works used to accept data from vehicles and forward to another vehicle in network or send it to the infrastructure monitoring server for data analysis. This infrastructure server can be used for designing a centralized control over the vehicular ad hoc network. In this paper an infrastructure server based IDS system designed for DOS flooding attack prevention. The proposed infrastructure consumes the concept of weighted clustering for clustering and cluster head selection. And using the concept of thresholding server logic is prepared for finding malicious behaviour detection in VANET clustered network. The simulation of proposed infrastructure is provided using NS2, simulation tool. Additionally using the trace files performance evaluated. The obtained performance of the proposed routing protocol is found adoptable during different experimentations. I. INTRODUCTION Ad hoc network is a group of mobile devices which is known as nodes, and these devices are communicating each other using a wireless connectivity. Additionally there is not some set infrastructure available for control and management, so the network topology and communication depends upon routing procedure. Applications of wireless networks are extended now in these days for provided that more security, reliability and availability. Vehicular ad hoc network is a type of wireless network. In this type of networks nodes are very mobile and travelling during alone highways. VANET is a relatively new technology of wireless network, therefore it keep paying attention engineers and scientists to find out new ways of secure and reliable communication. Due to this mobile character the basic communication is performed as the ad hoc network way. Therefore routing techniques are backbone of such network. The main tasks of these routing protocols are route maintenance, route discovery and efficient data delivery. Therefore the majority of attacks in such network are deployed using their routing techniques. A malicious attacker modifies the control packets, alter routing information and manipulate the exchanged packets for deploying attacks. Open and untrusted communication in these conditions may become critical. Therefore security in such network is basically required. In these networks liability of intermediate nodes during V2V and V2I is desired in order to maintain security and privacy through communication. Routing algorithms are played necessary role for security and path discovery. There are a quantity of technique are found for routing security in VANET, but most of them are developed and deployed for external attacks. On the other hand there is less research work and literature is available for preventing the internal attacks. Therefore in this work different routing based safety schemes are investigated for discovering suitable solution of internal attacks , IJAFRC All Rights Reserved

2 Therefore in this work different routing based attacks are investigated where the routers or internal network node are compromised with the security. These compromised nodes show some non-legitimate behaviour through communication such as additional flooding, Jamming or resource consumptions. These attacks are liable for degrading the network performance in terms of battery power, available bandwidth, and computational ability. Therefore an appropriate technique for detecting or preventing such kind of serious attack is required to develop. II. BACKGROUND In VANET surroundings a variety of techniques also developed by different researchers for security, some of them are listed in this section. A. Flooding-Resilient Broadcast Authentication for VANETs The present broadcast authentication standard in VANETs is vulnerable to signature flooding: excessive signature verification requests that exhaust the computational property of victims. In this paper, Hsu- Chun Hsiao et al [6] propose two capable broadcast authentication schemes, Fast Authentication (FastAuth) and Selective Authentication (SellAuth). FastAuth secures periodic single-hop beacon messages. By exploiting the sender s capability to expect its own future beacons, FastAuth enables 50 period faster verification than earlier mechanisms using the Elliptic Curve Digital Signature Algorithm. SelAuth secures multi-hop applications in which a fake signature may spread out rapidly and impact a significant number of vehicles. SelAuth provides fast isolation of malicious senders, even under a dynamic topology, while consuming only 15% 30% of the computational resources compared to other schemes. They provide both analytical and experimental evaluations based on real traffic traces and NS-2 simulations. With the near-term deployment plans of VANET on every vehicles, given approaches can make VANETs realistic. B. Biometrics-based Data Link Layer Anonymous Authentication The vehicular ad-hoc network (VANET) aims to create road traffic safer and more efficient. Security and privacy are two key factor. On the one hand, vehicle-to-vehicle (V2V) authentication requires drivers to present some extra credentials. On the other hand, drivers require privacy protections on their identities, physical locations, and other contextual information. No responsive information should be unreasonably exposed through the authentication phase. Lin Yao et al [7] propose a novel biometrics based anonymous mutual authentication with provable link-layer position privacy preservation. Through its authentication, two vehicles negotiate their temporary session key and produce two temporary MAC addresses. These two addresses, in its place of the real ones, are used in all future communication frames. They more protect the biometric privacy with the help of a biometric encryption technique. Accessible analysis and simulation results show that the protocol is greater and lightweight with high security and privacy protection. C. Application Level Broadcasting Protocol S. Vijaya kumar et al [8] develops Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol. To address this necessitate they show that it performs well compared too many presented multi-hop protocols. The high cost aggravates inherent source constraint difficulty in MANETs, mainly in multimedia applications. To propos high anonymity protection, they suggest an Anonymous Locationbased Efficient Routing protocol (ALERT). It s also called Reliable Application Level Broadcasting (RALB) protocol. RALB dynamically dividers network field into zones and at random chooses nodes in zones as middle relay nodes, which form a no traceable anonymous route. RALB proposes anonymity protection to sources, destinations, and routes. RALB has policies to successfully counter intersection and timing attacks. Author theoretically analyses RALB for anonymity and efficiency. RALB achieves related routing , IJAFRC All Rights Reserved

3 helpfulness to the GPSR geographical routing protocol. The DADCQ protocol utilizes distance method to choose advancing nodes. The performance of this technique is contingent heavily on the value of the outcome threshold, but it is difficult to decide a value that results in good performance crossways. An anonymous communication protocol can make available intractability for strictly ensure anonymity of the sender when the sender communicates with the other, spatial distribution pattern, and wireless channel quality all touches the best possible value. The node recognizes its neighbour as a node that within the nodes radio range. Once the resource needs to send a packet, it usually keeps the position of the destination in the packet header which will help in promoting the packet to the destination with no route discovery or even attentiveness of the network topology. D. Public Key Infrastructure Vehicular ad hoc networks are raising technology for providing a wide range of security applications to vehicle passengers. Ensuring protection is one of the prerequisites for deploying reliable VANETs. In this article Albert Wasef et al [9] argue that public key infrastructure is the most feasible mechanism for securing VANETs can meet mainly security requirements. However, PKI cannot give sure security requirements such as location privacy, efficient authentication, and distributed and fair revocation. To complement the security services give by PKI, they introduce corresponding security mechanisms that can meet the aforementioned security necessities. Since denial of service attacks has strict consequences on network availability, which is one of the VANET safety requirements, author proposes a mechanism for mitigating the effect of DoS attacks in VANETs. Simulation results prove that the complement any mechanisms together with PKI can efficiently secure VANETs. E. Cross-layer Approach to Privacy-preserving Authentication Subir Biswas et al [10] present an anonymous authentication and verification idea for vehicular ad hoc networks (VANETs). Contribution includes vehicular communication authentication, as well as an efficient prioritized verification plan for periodic road-safety communication. A variation of elliptic curve digital signature algorithm (ECDSA) is used through identity-based (ID-based) signature where existing place information of a vehicle is utilized as ID of the corresponding vehicle. This requirements a thirdparty public key certificate for message authentication. For authentication requires verification of the signature of the received message. A high compactness road-traffic condition poses a challenge for verification of vehicular messages since essential verification time is often a lot longer than the average inter-arrival time. An adaptive verification plan uses cross layer features of WAVE-based VANETs and information relevance for verifying the received protection messages. Messages of every traffic class are verified next the corresponding verification priority. The verification probability depends on VANET s MAC-layer priorities and the application relevance of individual security messages. Performance analysis and simulation results have proved that security, privacy, scalability and efficient resource utilization. This section provides the security schemes those are generated freshly for VANET communication. In next section proposed routing security technique is described. III. ROUTING METHODOLOGY In order to find optimum solution of the VANET internal attack (DOS flooding attack) a methodology for detection and prevention is developed and designed in this section. In this presented work long highways are considered. Additionally a real world scenario is assumed, for instance in a highway various vehicles are travelling but some of them are belongs to same organization or transportation company. They are preferred to travel in a group. Thus vehicles are creating a group or a small network and they can perform communication, for supporting each other. In this context, if an intruder or compromised vehicular node can be creates issues in regular communication , IJAFRC All Rights Reserved

4 Therefore a new technique is presented for detecting and preventing the internal attack. For demonstration of the proposed methodology the working can be divided in five modules as given in figure 3.1. In this diagram first clustering is performed for creating scalable communication, then an efficient cluster head is selected for providing service, then information is provided to server for analysis of nodes behaviour and finally the malicious node detection and prevention is performed. The proposed detection and prevention technique is works on the basis of clustered organization of nodes. In this process the vehicles are first organized in cluster. For that purpose nodes attributes such as connectivity, battery power, memory and distance is evaluated from all the nodes. The optimum node from the above combination is selected as cluster head. In this organization cluster head is responsible for communicating with the infrastructure server. Cluster head compute the nodes ID, MAX FLOODING, MAX PDR (max packet dropping) for all the nodes. For transmitting this information to the intelligence server cluster head first find the nearest RSU (road side units) which is directly connected with the infrastructure server. Server obtain network parameters are tested then malicious node is decided. After that server send an acknowledgement to the concerning cluster head for malicious node information. This acknowledgement contains the information about the malicious node which is terminated by the cluster head. The different steps of the attack detection and prevention model are given as: A. Clustering In order to perform clustering in network, network oriented parameters are required to find first. The clusters are the logical organization of network nodes. Where a node is denoted as cluster head, remaining nodes are neighbor of cluster head is known as client nodes. Nodes that belong to the similar cluster head are termed as internal cluster node and nodes that belong to other clusters are known as external clusters. The clustering approaches helps in improving performance and scalability of network. Therefore some appropriate attributes are selected for clustering. 1. Clustering parameters Figure 1 Proposed System a. Connectivity: the nodes in wireless network are able to communicate directly with those nodes that are in a specified radio range. If the target node is not in range then nodes relay the packets , IJAFRC All Rights Reserved

5 to intermediate nodes for delivering data to target node. Node with higher order of connectivity shows direct communicating nodes. Therefore less number of control messages is injected in network. This results low bandwidth consumption. 2. Battery power : networks nodes having limited resources. Therefore once these are consumed then recovery of these resources is not possible immediately. For example any node loses their energy then it is out of the communication sessions, therefore with longer battery life nodes are selected for cluster head. The main advantages of such node selection, as a cluster head this node alive longer in network, therefore able to serve efficiently and for long time. a. Memory : in ad hoc network devices are prepared with the inbuilt memory and battery power, therefore these resources are considered as limited resources. Memory of the network devices are utilized to hold the intermediate packets and intermediate computational data. If the buffer is filled then node is on high load of data processing or that is in congestion, thus overfilled buffer of any node simulates the low processing capability of devices. Thus free buffered nodes are considered as cluster head. b. Distance: wireless connectivity is depends upon bandwidth. According to the observations if distance between two nodes is increases the strength of radio signal in network is become poorer. Thus fewer distance nodes are much efficient then higher distance nodes. This section describes the clustering parameters which are incorporated in the clustering scheme. The next section demonstrates the cluster head selection technique. 2. Cluster head selection In the previous section clustering parameters are discussed. But the measurements of these parameters are different from each other. Thus, for finding most appropriate node a weighted clustering scheme is suggested for combining the network parameters for comparison. C = node connectivity B = remaining battery power M = Free Memory D = distance between nodes N= number of nodes Weight estimation and cluster head selection 1. For i=1 to N 2. Find C, B, M and D 3. Calculate 4. End for 5. tempw=w[1]; 6. maxw=0; 7. For j=1 to N 8. If tempw< W[j] 9. maxw= W[j] 10. end if 11. end for 12. return maxw , IJAFRC All Rights Reserved

6 MaxW is a network node having the highest weight for efficient clustering and performance is selected as cluster head. In such clustered organization of node the entire nodes in network is bounded using a predefined set of rules and can be discussed as: 1. Nodes under similar cluster heads are known as internal cluster nodes, when they wants to exchange information the source node first send information to cluster head and then cluster head directly provide data to targeted node as figure 2, where a source node using the cluster head send data to the target node. Figure 2. Inter Cluster 2. Secondly if both the nodes are belongs to different cluster heads, than first the source node send data to their cluster head and cluster head discover target cluster where the destination is belongs, cluster head then transmit data to the Figure 3 Intra Cluster Communication Concerned cluster head and this deliver data to end client, this effect can be demonstrated using figure 3. In this diagram a source node send data to their cluster head cluster head transmit data to another cluster head and finally the data is delivered to the end target machine. 3. Information Gathering According to the clustering concept all the nodes in a cluster is able to communicate only with the help of cluster head. Thus, for whole communication and organization of nodes is responsibility of cluster head. In the proposed technique one more responsibility is assigned to the cluster head for communication with infrastructure server and information gathering of nodes. When a cluster head is elected the cluster head compute the following information from their cluster members. a. Nodes ID : a unique ID which differentiate a network device to other , IJAFRC All Rights Reserved

7 b. MAX FLOODING : the amount of packets (control messages and data packets) are flooded by a specific node c. MAX PDR : the amount of packets dropped during different communication sessions. This information is incorporated with a message and sent to the server end using RSU (road side unit). 4. Information Transmission In VANET technology the network nodes are wireless devices that are connected with each other using wireless links. These links having a limited range of connectivity therefore, the RSU (road side units) are additionally installed for proving connectivity between two nodes. These units are bi-functional which are providing both kinds of services wired and wireless. Among vehicle to RSU communication is performed using wireless connectivity and RSU to RSU and RSU to server is performed using high speed data buses. Figure 4. VANET with RSU As given in figure 4 box shape nodes are considered as vehicles and the round shape nodes are considered as RSU, these RSUs are connected by a backbone network which is directly connected to infrastructure server. This server is accepting a rich amount of data for processing and then providing the decisions to the cluster heads. 5. Attack detection and removal The server collects data samples during communication sessions and creates a threshold first using given formula. For detection of malicious attacker the following steps are taken place: 1. For each node in a cluster 2. If MAXFLOOD>= threshold 3. Label as malicious node 4. Else 5. Legitimate node 6. End if 7. End for , IJAFRC All Rights Reserved

8 In order to make decisions threshold value is compared with the current sample values, if information is found as the malicious behavior then the current node ID is extracted from the sample data. Now a decision making packet is transmitted to the concerned clustered head with the malicious node ID. The targeted cluster head now have the malicious labeled nodes ID thus during the communication if the malicious node initiate a communication then this session is forcefully dropped by the cluster head. 6. Attack Model In VANETs, nodes act as both routers and ordinary nodes. Due to dynamic network topology and lack of centralized infrastructure, network security has brought a new challenge to networking communities. Unlike traditional networks, VANETs are more vulnerable to DoS attacks due to limited resources that force nodes to be greedy in resource utilization. When there is no cooperation, activities of even a small number of nodes may significantly decrease the performance of the network. For example, a misbehaving node that discards any packets passing through it can result in repeated retransmissions, which in turn cause network congestions. Battery power is another critical resource for mobile nodes. If the battery power has been used up due to malicious attacks such as the sleep deprivation attack, the victim will not be able to provide network services. Key issues in network with the DOS flooding attack 1. During attack false RREQ packets are injected in the network. Due to this the available bandwidth is consumed. 2. For each transmission a significant amount of energy is consumed, due to false control message exchange different neighbor nodes are also transmitting the RREQ packets to their neighbors thus energy of network nodes are rapidly drain. 3. Finally due to frequent flooding in network the congestion in network can be occurred this causes the frequent packet drops in network, thus network performance is degraded. IV. SIMULATION SETUP This section provides desired network configuration for simulation of internal attack detection and prevention scheme is given using table 1. Table 1 Simulation Setup Simulation properties Values Antenna model Omni Antenna Dimension 750 X 550 Radio-propagation Two Ray Ground Channel Type Wireless Channel No of Mobile Nodes 13 Routing protocol AODV Time of simulation 10.0 Sec. The proposed technique is simulated under two different scenarios. 1. Attack simulation using traditional routing technique in this simulation scenario the traditional AODV routing is implemented and dos attack is deployed. After deploying the attack, network performance is evaluated. 2. Attack simulation using proposed routing technique the proposed technique is an AODV routing modification that allows the network for detection and prevention of DOS attack. In this , IJAFRC All Rights Reserved

9 scenario an attacker is again deployed and the performance is evaluated and compared with the previous scenarios. V. RESULT ANALYSIS This section provides results analysis and performance evaluation of the designed routing technique. 1. End to end delay The total amount of time required to successfully deliver a data packet from source to a targeted device is known as end to end delay. The end to end delay includes the data travelling time and propagation delay during communication. Figure 5 shows the end to end delay of the proposed VANET routing technique. In this diagram X axis includes the simulation time and end to end delay in terms of milliseconds is given using Y axis. Red line demonstrates the end to end delay during attack deployment in network. During DOS attack deployment the traffic of network is unevenly increases due to RREQ packets. Thus the network performance is slows down and the end to end delay becomes higher with the respect to the normal network end to end delay. On the other hand the green line demonstrates the performance of proposed secure VANET routing protocol. That algorithm successfully able to detect and prevent the malicious activity over the network thus the end to end delay is fewer with the respect of attack conditions. 2. Routing overhead Figure 5. END TO END DELAY The amount of additional packets injected in order to establish communication session is known as routing overhead. The routing overhead during both the scenarios is given using figure 6. In this diagram X axis represents the simulation time and Y axis demonstrates the amount of packets additional injected. The routing overhead of attack is demonstrated using red line and preventive technique is given using green line. According to result the proposed routing technique is able to detect and prevent DOS attack. Additionally, able to reduce the amount of control message exchange, initially the amount of flooding is higher than the remaining simulation time. Because first time network nodes creating clusters and performing the route discovery and after that the network is saturated and initial operations are performed then the routing overhead reduces continuously and most of the time remains constant , IJAFRC All Rights Reserved

10 Figure 6. Routing Overhead 3. Packet Drop Ratio The amount of packet dropped during the communication is known as packet drop ratio. In order to find packet drop ratio in terms of percentage can be evaluated using the given formula Figure 7. Packet Drop Ratio Figure 7 shows the packet drop ratio for both conditions respectively. In diagram X axis shows the simulation time in terms of seconds and the amount of packet drop in terms of percentage is given using Y axis. The performance of network during attack condition is demonstrated using red line. Most of the time during attack a significant amount of packet dropped during communication Sessions, additionally the amount of packet drop is increases as the simulation time increases. Because when the RREQ flooding attack is deployed in network the initial bandwidth is consumed rapidly over each time slice. Therefore the red line shows the incremental line for the packet drop ratio. On the other hand the proposed technique s packet drop ratio is demonstrated using green line. Most of time proposed routing technique drop a constant amount of packets thus the performance of network is enhanced in terms of packet drop ratio. VI. CONCLUSION In search of optimum VANET security an essential contribution [2] is found. Using the key management technique the author preserves the network performance for external attacks. The extension of the work [2] is provided in this research work. In order to extend the work an internal attack preservation , IJAFRC All Rights Reserved

11 technique is developed. In this simulation model VANET environment is created statically. The proposed solution for the VANET internal attack leads to incorporate the following concepts for implementation. 1. Routing protocol The organization and management of topology in VANET is performed using routing strategies. Therefore attack is deployed most of the time using routing. Thus a secure routing technique required to design for preventing VANET. 2. Clustering concept VANET supports high mobility scenarios, different vehicles having different speed and directions. Thus the frequent path breaks and network partition occurred. In order to scale the network and improve the performance of network, clustering technique is helpful for V2V and V2I communication. 3. Thresholding In order to create filter and detection of attack a comparative limit is prepared using threshold of the PDR and maximum flooding basis. For creating the proposed routing concept for securing the VANET, AODV routing protocol is modified for incorporating the detection and prevention. And simulation of the technique is provided in NS2 environment. The performance of the network with enhanced routing is evaluated in terms of packet drop ratio, end to end delay and routing overhead. The obtained result shows the effectiveness of the proposed routing technique. VII. REFERENCES [1] Maxim Raya and Jean-Pierre Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security 15 (2007) IOS Press [2] Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, A Dynamic Privacy- Preserving Key Management Scheme for Location-Based Services in VANETs, IEEE Transactions on Intelligent transportation systems, Vol. 13, No. 1, March 2012 [3] Hongmei Deng, Wei Li, and Dharma P. Agrawal, Routing Security in Wireless Ad Hoc Networks, IEEE Communications Magazine, October 2002, /02/$ IEEE [4] Stephen Specht and Ruby Lee, Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures, Technical Report CE-L , May 16, 2003 [5] Balmahoon R, Peplow R, Vehicular Ad-Hoc Networks: An Introduction to Privacy, Southern African Telecommunication Networks and Applications Conference (SATNAC) will be held from 2 to 5 September 2012 [6] Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur, AravindIyer, Flooding-Resilient Broadcast Authentication for VANETs, MobiCom 11, September 19 23, 2011, Las Vegas, Nevada, USA. Copyright 2011 ACM /11/09...$10.00 [7] Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, and Kangbin Yim, Biometrics-based Data Link Layer Anonymous Authentication in VANETs, Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), IEEE , IJAFRC All Rights Reserved

12 [8] S. Vijayakumar, A. Noble Mary Juliet, Dr. M. L. Valarmathi, A Reliable Application Level Broadcasting Protocol For VANET, IJCSMC, Vol. 3, Issue. 5, May 2014, pg [9] Albert Wasef And Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen, Complementing Public Key Infrastructure to Secure Vehicular Ad Hoc Networks, IEEE Wireless Communications, October 2010, /10/$ IEEE [10] Subir Biswas, Jelena Misic, A Cross-layer Approach to Privacy-preserving Authentication in WAVE-enabled VANETs, IEEE Transactions on Vehicular Technology, Volume:62, Issue: 5,Jun 2013 [11] Fabian Garcia Nocetti, Julio Solano Gonzalez, Ivan Stojmenovic, Connectivity Based k-hop Clustering in Wireless Networks, Telecommunication Systems 22:1 4, , 2003 Kluwer Academic Publishers , IJAFRC All Rights Reserved

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS

COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS SECURITY AND P RIVACY IN E MERGING WIRELESS N ETWORKS COMPLEMENTING PUBLIC KEY INFRASTRUCTURE TO SECURE VEHICULAR AD HOC NETWORKS ALBERT WASEF AND RONGXING LU, UNIVERSITY OF WATERLOO XIAODONG LIN, UNIVERSITY

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,

More information

Analysis of Denial of Service Attack Using Proposed Model

Analysis of Denial of Service Attack Using Proposed Model Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s Ghassan Samara, Sureswaran Ramadas National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia ghassan@nav6.org,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Vampire Attack Detecting and Preventing in Wireless Sensor Network International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL Komal Rani 1, Meenakshi 2 1 M.Tech Scholar, Central University of Punjab er.komrani@gmail.com 2 Centre for computer science

More information

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks CH. SHIREESHA 1, P PROMAD KUMAR 2 1 M.Tech Student, CSE, SR Engineering College, Warangal,Telangana,India. 2 Assistant

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Certificate Revocation Management in VANET

Certificate Revocation Management in VANET Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. Gsamara@zu.edu.jo ABSTRACT Vehicular

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National

More information

Security Sensor Network. Biswajit panja

Security Sensor Network. Biswajit panja Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

DDoS Attack on WAVE-enabled VANET Through Synchronization

DDoS Attack on WAVE-enabled VANET Through Synchronization DDoS Attack on WAVE-enabled VANET Through Synchronization Subir Biswas Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Department

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) ACM MOBILE NETWORK AND APPLICATIONS Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) Bharat Bhargava, Xiaoxin Wu, Yi Lu, and Weichao Wang Abstract A mobile

More information

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com

More information

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

A New Security Mechanism for Vehicular Communication Networks

A New Security Mechanism for Vehicular Communication Networks A New Security Mechanism for Vehicular Communication Networks Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. gsamarah@yahoo.com

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Efficient Certificate Management in VANET

Efficient Certificate Management in VANET Efficient Certificate Management in VANET Ghassan Samara #1, Wafaa A.H. Al-Salihy *2, R. Sures #3 # National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia 1 ghassan@nav6.org, 3 sures@nav6.org

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information