Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks

Size: px
Start display at page:

Download "Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks"

Transcription

1 th International Conference on Information Technology - New Generations Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks Kashif Saleem Abdelouahid Derhab Center of Excellence in Information Assurance (CoEIA) King Saud University (KSU), Riyadh Kingdom of Saudi Arabia (KSA) {ksaleem, abderhab}@ksu.edu.sa Mehmet A. Orgun Intelligent Systems Group (ISG) Department of Computing Macquarie University NSW 2109, Australia [email protected] Jalal Al-Muhtadi Center of Excellence in Information Assurance (CoEIA), College of Computer and Information Sciences (CCIS), King Saud University (KSU), Riyadh, Kingdom of Saudi Arabia (KSA) [email protected] Abstract Wireless Sensor Networks (WSNs) are often deployed in remote and hostile areas and because of their limited power and vulnerability, the sensors may stop functioning after sometime leading to the appearance of holes in a network. A hole created by the non-functioning sensors in turn severs the connection between one side and the other side of the network and alternative routes need to be found for the network traffic. Prior research tackled the holes problem only when packets reach some nodes near the hole. In this case, the feedback packets are generated and accordingly the data packets need to be rerouted to avoid the holes. The traffic overhead for rerouting consumes additional battery power and thus increases the communication cost as well as reducing the lifetime of the sensors. To deal with the dynamical changes in network topologies in an autonomous manner, ant colony optimization (ACO) algorithms have shown very good performance in routing the network traffic. In this paper, we analyze the scalability and stability of the ACO-based routing protocol BIOSARP against the issues caused by holes in WSNs. Network simulator 2 (ns-2) is utilized to perform the analysis. Findings clearly demonstrate that BIOSARP can efficiently maintain the data packet routing over a WSN prior to any possible holes problems, by switching data forwarding to the most optimal neighboring node. Keywords Autonomous; Energy; Fault tolerance; Holes Issues; Routing protocols; Scalability; Wireless sensor networks I. INTRODUCTION Wireless sensor networks (WSNs) are meant to work independently and intelligently, because these kind of networks are mostly deployed in areas that are out of human reach. Generally, most low-power wireless networks usually have unreliable links with limited bandwidth and their link quality can also be heavily influenced by environmental factors [1]. In WSNs, network anomalies such as holes are caused by the limited power and limited lifetime of the deployed sensors are among the most common and critical problems. Regions effected by the holes are a set of nodes or an area that prevent data from being transferred from one side of network to another side. The holes appear due to inactivity periods, vulnerability to destruction and battery power depletion, link quality, network attacks, physical disasters, etc. [2, 3]. Most commonly known types of the holes problem are jamming holes, sink/black holes/worm holes, coverage holes and routing holes [2]. Due to the holes problem the sink node could not receive important information and that effects overall communication of the network and in some cases even the complete network goes offline, which results in huge loss [4]. Nature inspired algorithms [5] are shown to provide highly robust, self-organizing and autonomous systems to tackle holes problems in WSN. Routing protocols designed for WSNs should intelligently distribute the energy over the network to provide maximum lifetime with efficient network performance [2]. In biological inspired autonomous systems ACO algorithms are a class of constructive meta-heuristic algorithms that mimic the cooperative behavior of real ants to achieve complex computations and have been proven to be very efficient to many different discrete optimization problems [6]. Ant Colony Optimization (ACO) is widely used to solve difficult combinatorial optimization problems such as the ACO meta-heuristic, the quadratic assignment problem (QAP), and the traveling salesman problem (TSP) [7]. Due to nature inspired characteristics of the ACO algorithms, such as collaboration, cooperation, distributed computation and stochastic search, ACO is particularly suitable for scalability, robustness and suitability for dynamic environments. Based on the aforementioned advantages, ACO algorithms have received much attention in network applications. In this paper, we show that the recent improved ACO based Biological Inspired Secure Autonomous Routing Protocol (BIOSARP) [8] for WSNs can overcome the above mentioned holes problems [9]. In [8, 9], the authors have developed an improved ant colony optimization (IACO) algorithm to acquire optimal route decisions and artificial immune system (AIS) to detect abnormalities. The autonomous routing protocol BIOSARP depends on the probabilistic value called as pheromone value of neighboring nodes stored in a routing table. The pheromone value is calculated based on the Sincerest gratitude to Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Kingdom of Saudi Arabia /15 $ IEEE DOI /ITNG

2 remaining battery power, end to end delay, and packet reception rate (PRR) based on signal to noise ratio (SNR). These parameters are updated periodically in maintaining the regional knowledge in the network. BIOARP has shown an improved performance as compared to LQER, MM-SPEED, RPAR, RTPC, and RTLD [10]. With respect to security, BIOSARP has less processing time, and provides more efficient security measures over TinySec-AE, TinySec-Auth, TinyHash, LBRS-Auth, EBSS, SRTLD, and SPINS [11]. However, BIOSARP has not been studied extensively under networks anomalies such as the holes problem. Previously, we have analyzed the behavior and performance of BIOSARP in [12] to tackle the holes problems with and without a feedback mechanism. The analysis has shown that BIOSARP can reroute the network traffic effectively when the holes appear in a typical WSN configuration. In this paper, we extend the analysis to the study of the scalability and stability of BIOSARP to handle the holes problem. That is, we study the performance of BIOSARP under network topologies with an increasingly larger number of sensor nodes as well as an increasingly larger number of holes. Finally, the results of BIOSARP are compared with a recent state of the art routing protocol, ERTLD, in terms of packet delivery ratio, battery power, and data packet overhead. The paper is structured as follows. Ssection II reviews the related literature and BIOSARP. Section III presents the approach to the analysis of BIOSARP. The implementation, results and comparison are given in Section IV. Section V states the conclusions and future work. II. RELATED WORK In [13], the authors have used ACO to solve the state justification problem and shown its capability to avoid deadend states in sequential circuits. Later in [14], to reduce the state explosion problem that arises because of deadlocks in complex networks, the authors have used the ACO algorithm. They have evaluated their given technique on several benchmarks; it is shown that the ACO algorithm performs better over other heuristic-based search strategies. In WSNs, the utilization of the ACO algorithm to specifically handle holes problems or dead-ends has been discussed in [12]. The authors have shown that the ACO algorithm is promising in avoiding holes and rerouting the network traffic but it remains to be seen whether the ACO algorithm could scale up to larger networks and/or larger numbers and sizes of holes that are typical in real applications of WSNs. Below we discuss some recent ACO based routing protocols for WSNs. In [15], the author have proposed a routing protocol for Mobile WSN (MWSN) called Enhanced RealTime with Load Distribution (ERTLD), which is based on real-time load distribution (RTLD)[16]. In ERTLD, the author has additionally utilized a corona mechanism to forward the data packets to their destination. The ERTLD protocol has been compared with baseline routing protocols of RTLD, RACE, and MM-Speed [15]. The author claims that ERTLD gives better delivery ratio while minimizing end-to-end delay in MWSN and WSN. Saleem et al. [8] have proposed the improved ACO based routing protocol BIOSARP. The given ACO based routing mechanism reduces the cost of the broadcast function for neighbor discovery at every hop. To avoid a huge traffic overhead, the BIOSARP ACO function is designed with only two agents: Search Ant and Data Ant. The Data Ant selects the next forwarding node based on the pheromone value calculated and stored in the neighbor table. The Data Ant (data packet) moves hop by hop towards the destination by selecting the optimal pheromone values from the neighbor table. The routing management will forward a data packet to the neighbor that has an optimal pheromone value Best p k cv(t). While forwarding, the current node looks for the sink node id in the neighbor table. If the sink node is found, it forwards the data packet to the sink. Otherwise, it looks for an optimal pheromone value in the neighbor table. BIOSARP keeps track of all possible routes over per hop basis via pheromone values stored in the neighbor table of every neighboring node. Moreover, BIOSARP has a security management module on top of autonomous routing [17]. The security module of BIOSARP is based on the artificial immune system (AIS). Preventive measures based on the AIS mechanism [17] and reactive measures are based on a random key encryption mechanism [11]. The BIOSARP routing mechanism is validated by experimentation performed under TOSSIM and later implemented in TinyViz by using 10 TELOSB motes [18]. BIOSARP has shown better performance over the state of art routing protocols for WSNs. The consumption of resources is reduced by avoiding rediscoveries, replies and recalculations. Above mentioned algorithms, except BIOSARP, maintain the best path knowledge by knowing all node ids until the destination and then transfer the data packets directly. In BIOSARP, the improved ACO [8] is adapted to perform autonomous routing in WSNs. BIOSARP, rather than wasting resources on forward and backward agents, starts transferring data hop by hop and deposits pheromone values in routing table on the way. To handle the holes problem, the other routing protocols require huge and complex mathematical computations that generate a huge data packet overhead and consume extra battery power due to the involvement of additional processing. III. APPROACH TO PERFORMANCE ANALYSIS A well-known problem is the failure of finding routes when forwarding data packets in WSN. It occurs due to the existence of holes in the network and can be there even after neighbor discovery. The presence of holes may appear because of the large gaps in between nodes or attacks or due to the inactive nodes. Our objective to analyze the performance of BIOSARP and ERTLD by implementing them in the ns-2 environment. We configure a WSN model in the network simulator 2 (ns-2) with 121 and 49 nodes distributed in 80m x 80m grid topology as shown in Fig.1 (a) and (b). Holes are introduced in the configured WSN by initializing certain nodes with lower energy level and setting some other nodes to perform jamming attacks by sending unauthentic packets as shown in Fig.1 (a) and (b). 235

3 (a) Fig. 1. (a) Small density WSN, (b) Large density WSN (Sink node is in Red, Source nodes are in Blue, and Malicious nodes are in Purple) We examine the behavior of data routing by BIOSARP while increasing the number of nodes causing the holes from 4, 8, and 12 in small density WSNs and from 10, 20, and 30 in large density WSNs. Furthermore, BIOSARP is compared with state of the art routing protocol ERTLD [15] in terms of delivery ratio, energy consumption and data packet overhead. We inspect the state of the routing problem handler to analyze BIOSARP with respect to routing holes as shown in Fig.1 (a) and (b). When a sensor node receives a data packet to forward from its parent, it looks for the sink in its neighbor table. If the sink is found in its neighbor table, the current node forwards the data packet directly to the sink. If the sink node id is not found, then it calculates the next optimal node based on the values available in the neighbor table and forwards the data packet. In the case where the next node could not be found, the neighbor rediscovery is invoked. The neighbor rediscovery function searches other neighboring nodes to find a route to the sink. The holes problem occurs due to a defective region and nodes given in Fig.1 (a) and (b) in purple color. IV. IMPLEMENTATION AND ANALYSIS In this section, the self-adaptive behavior of BIOSARP is explained through simulation implementation and results. The ns-2 based simulation has been conducted to simulate a WSN model with 121 and 49 nodes distributed in 80m x 80m grid topology. MAC and physical layer of IEEE have been embedded in the WSN model to function similar to the MICAz motes. The end-to-end deadline was fixed at 250 ms and (b) simulation time at 400s, while the traffic load has been varied from 1 to 10 packet/s. The network model as shown in Fig. 1 (a) and (b), is configured based on the IEEE standard. All nodes are homogenous except malicious nodes that are enabled and the number of malicious nodes is increased gradually in the next simulation. While simulating the malicious node, they are initialized with 0.9J and some nodes perform jamming attacks periodically. Under large density, 90, 100, 110 and 120 are the source nodes and node 0 is the sink node. Under small density, 37, 43, 31 and 25 are the source nodes and node 0 is the sink node. The simulations are done in six categories that are based on the node density, and in every category the packet rate per second varies from 1.16, 1.86, 4.22, 6.17, 7.3, and 9.6. In the first category, a small density WSN with 49 nodes, simulation is performed with 4 malicious nodes (1, 3, 5, 7), and then in the next category of simulation, 4 more malicious nodes are added (10, 18, 21, 23), and in the third category further 4 malicious nodes are added (20, 12, 15, 13). In the end, there are a total of 12 malicious nodes as shown in Fig.1 (a). Furthermore, the large density WSN is configured with 121 nodes and simulation is performed by involving 10 malicious nodes (22, 4, 14, 6, 16, 2, 24, 8, 7, 5) in the fourth category. In the fifth category simulation, 10 malicious nodes are added (35, 37, 39, 41, 43, 45, 47, 31, 29, 27), and in the last category simulation, 10 more malicious nodes (33, 64, 68, 72, 76, 80, 56, 52, 58, 64) are added to make a total of 30 malicious nodes as shown in Fig.1 (b). A. BIOSARP routing in the presence of holes problems In order to show the effect of BIOSARP, one of the scenarios has been utilized as shown in Fig. 2. Initially, BIOSARP avoids the nodes that are non-self and secondly the nodes with less resources that can cause holes in the near future. While routing data, the next neighboring node or forwarding node is selected, based on the pheromone value calculated through a probabilistic rule. The data packets can flow through a path chosen by BIOSARP; the path is from source 37 to nodes 31, 29, 6, and 0. That means these nodes get the best pheromone values and provide the best performance, as compared to other neighboring nodes. With the continuous usage of the node id 29, the performance declines in terms of the remaining battery power. Fig. 2. BIOSARP switches to node with id 30 at seconds and the blue path continues 236

4 The energy consumption is also very little by BIOSARP as compared to the energy consumption by ERTLD. With respect to data packet overhead, BIOSARP generates very few control packets compared to ERTLD in the presence of 30 malicious nodes. This is because the protocol selects the most optimal neighboring self-node to transfer the data packet towards the destination. Hence, the results demonstrate that BIOSARP can avoid holes in the network and can efficiently route the data packets even in presence of the holes problem Fig. 3. The switching of nodes while routing data DELIVERY RATIO Accordingly, the pheromone value also drops because it is calculated based on the remaining battery power. At the time of forwarding, if node 31 finds a node with a better pheromone value, it selects it as optimal and starts forwarding to that particular node. Similarly, as shown in Fig. 2 and Fig. 3, when the simulation time is seconds, the path changes to nodes 31, 30, 28, 6, and 0. Node 31 starts to forward the data towards node 30, and then node 30 checks its neighbor table and finds node id 28. The data finally reaches to node 0 via node 6. The data forwarding continues on this path, until the parent node finds a node with a better pheromone value in its neighboring table. B. Results Comparison and Discussion This section shows the results obtained from the scenarios implemented in ns-2 and the comparisons. The results in Fig. 4 show that, in a small density network with the maximum number of malicious nodes, BIOSARP gives up to 79% delivery ratio and even in a large density network with the maximum number of malicious nodes, it maintains the delivery ratio of up to 60%. While maintaining the delivery ratio, the energy consumption goes higher as shown in Fig.5, but without any malicious activity (or without any holes), the energy consumption is very little. Moreover, in the presence of malicious nodes, the data packet overhead grows, because of more handshakes and thus more control packets are generated as shown in Fig. 6. Furthermore, BIOSARP is compared with state of the art routing protocol ERTLD to compare their performance. The scenarios are configured with a large density WSN and simulations are conducted in the presence of 30 malicious nodes and as well without any malicious activity. Fig. 7 shows that the delivery ratio given by BIOSARP is far better than ERTLD even in the presence of malicious nodes Fig. 4. Delivery Ratio ENERGY CONSUMPTION Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious Fig. 5. Energy Consumption 49 Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious 237

5 DATA PACKET OVERHEAD Nodes with 0 Malicious 49 Nodes with 4 Malicious 49 Nodes with 8 Malicious 49 Nodes with 12 Malicious 121 Nodes with 0 Malicious 121 Nodes with 10 Malicious 121 Nodes with 20 Malicious 121 Nodes with 30 Malicious DATA PACKET OVERHEAD ERTLD Nodes with 0 Malicious ERTLD Nodes with 30 Malicious BIOSARP Nodes with 0 Malicious BIOSARP Nodes with 30 Malicious 20 0 Fig. 6. Data Packet Overhead DELIVERY RATIO Fig. 7. Delivery Ratio of BIOSARP and ERTLD ENERGY CONSUMPTION ERTLD Nodes with 0 Malicious ERTLD Nodes with 30 Malicious BIOSARP Nodes with 0 Malicious BIOSARP Nodes with 30 Malicious ERTLD Nodes with 0 Malicious Fig. 8. Energy Consumption of BIOSARP and ERTLD ERTLD Nodes with 30 Malicious BIOSARP Nodes with 0 Malicious BIOSARP Nodes with 30 Malicious 10 0 Fig. 9. Data Packet Overhead of BIOSARP and ERTLD V. CONCLUSION AND FUTURE WORK In this article, we have analyzed the scalability and stability of ant colony optimization (ACO) based routing protocol BIOSARP to handle the holes issues in WSNs. The WSN scenario with holes problems is configured in the network simulator 2 (ns-2) to compare the performance of BIOSARP with state of art routing protocol ERTLD. The results show that BIOSARP can tackle holes problems effectively and offers a scalable and stable solution. In particular, the comparison shows that BIOSARP maintains the network performance, even in the presence of holes, in terms of delivery ratio, battery power consumption, and data packet overhead. Hence, BIOSARP is capable of handling the routing problems caused by holes in advance. The analysis reveals that BIOSARP can self-adapt to the dynamical changes in the network topology. Our immediate future work is to enhance the routing protocol with IPv6 and mobility factors to come up with mobile internet protocol 6 (MIPv6) for WSN. ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers for their valuable comments and suggestions that helped improve the presentation of this paper. REFERENCES [1] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D.Estrin, "Statistical Model of Lossy Links in Wireless Sensor Networks," in ACM/IEEE IPSN, Los Angeles, USA, [2] N. Ahmed, S. S. Kanhere, and S. Jha, "The holes problem in wireless sensor networks: a survey," SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, pp. 4-18, [3] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, "SPEED: A stateless protocol for real-time communication in sensor networks," in 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, USA, 2003, pp [4] P. K. Singh and G. Sharma, "An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET," in Trust, Security and 238

6 Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp [5] E. Patouni, D. Kypriadis, and N. Alonistioti, "A lightweight framework for prediction-based resource management in future wireless networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 144, [6] B. Zhang, Y. Wu, J. Lu, and K.-L. Du, "Evolutionary Computation and Its Applications in Neural and Fuzzy Systems," Applied Computational Intelligence and Soft Computing, vol. 2011, pp. 1-20, [7] G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, "An improved ant-based routing protocol in Wireless Sensor Networks," in Collaborative Computing: International Conference on Networking, Applications and Worksharing, CollaborateCom 2006., New York, NY, 2006, pp [8] K. Saleem and N. Fisal, "Enhanced Ant Colony algorithm for selfoptimized data assured routing in wireless sensor networks," in Networks (ICON), th IEEE International Conference on, 2012, pp [9] M. Adnan, M. Razzaque, I. Ahmed, and I. Isnin, "Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey," Sensors, vol. 14, pp , [10] K. Saleem and N. Fisal, "Energy Efficient Information Assured Routing Based on Hybrid Optimization Algorithm for WSNs," in Proceedings of the th International Conference on Information Technology: New Generations, 2013, pp [11] K. Saleem, M. S. Khalil, N. Fisal, A. A. Ahmed, and M. A. Orgun, "Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs," in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2013), Melbourne, Australia, 2013, pp [12] K. Saleem, A. Derhab, J. Al-Muhtadi, and M. A. Orgun, "Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user s connectivity experience," Computers in Human Behavior. doi: /j.chb [13] L. Min and M. S. Hsiao, "An ant colony optimization technique for abstraction-guided state justification," in Test Conference, ITC International, 2009, pp [14] G. Francesca, A. Santone, G. Vaglini, and M. L. Villani, "Ant Colony Optimization for Deadlock Detection in Concurrent Systems," in Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual, 2011, pp [15] A. Ali Ahmed, "An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks," Computer Networks, vol. 57, pp , [16] A. A. Ahmed and N. F. Fisal, "Secure real-time routing protocol with load distribution in wireless sensor networks," Security and Communication Networks, vol. 4, pp , Aug [17] K. Saleem, N. Fisal, S. Hafizah, and R. Rashid, "An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP," in Computational Intelligence in Security for Information Systems. vol. 6694, Á. Herrero and E. Corchado, Eds., ed: Springer Berlin / Heidelberg, 2011, pp [18] K. Saleem, N. Fisal, and J. Al-Muhtadi, "Empirical Studies of Bio- Inspired Self-Organized Secure Autonomous Routing Protocol," Sensors Journal, IEEE, vol. 14, pp ,

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Technology Longowal, Punjab, India

Technology Longowal, Punjab, India An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2

More information

A Survey on Load Balancing Techniques Using ACO Algorithm

A Survey on Load Balancing Techniques Using ACO Algorithm A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square

More information

Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC

Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC M. S. Sneha 1,J.P.Ashwini, 2, H. A. Sanjay 3 and K. Chandra Sekaran 4 1 Department of ISE, Student, NMIT, Bengaluru, 5560 024,

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Development of cloud computing system based on wireless sensor network protocol and routing

Development of cloud computing system based on wireless sensor network protocol and routing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 204, 6(7):680-684 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Development of cloud computing system based on wireless

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

More information

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks : an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:

More information

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved.

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved. EFFICIENT LOAD BALANCING USING ANT COLONY OPTIMIZATION MOHAMMAD H. NADIMI-SHAHRAKI, ELNAZ SHAFIGH FARD, FARAMARZ SAFI Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

An Improved ACO Algorithm for Multicast Routing

An Improved ACO Algorithm for Multicast Routing An Improved ACO Algorithm for Multicast Routing Ziqiang Wang and Dexian Zhang School of Information Science and Engineering, Henan University of Technology, Zheng Zhou 450052,China [email protected]

More information

Improved Termite Hill Routing Protocol using ACO in WSN

Improved Termite Hill Routing Protocol using ACO in WSN 2013 International Computer Science and Engineering Conference (ICSEC 2013) Improved Termite Hill Routing Protocol using ACO in WSN 1 Chandni, 2 Kanika Sharma 3 Himanshu Monga Electronics and Communication

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Monitoring behavior-based Intrusion Detection System for 6loWPAN networks

Monitoring behavior-based Intrusion Detection System for 6loWPAN networks International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 11 No. 4 Jun. 2015, pp. 894-907 2015 Innovative Space of Scientific Research Journals http://www.ijias.issr-journals.org/ Monitoring

More information

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Performance Analysis of Modified Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Ms. Shagun Chaudhary 1, Mr. Prashant Thanvi 2 1 Asst. Professor,Dept. of ECE, JIET School

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Influences of Communication Disruptions on Decentralized Routing in Transport Logistics

Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring

More information

Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm www.ijcsi.org 54 Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm Linan Zhu 1, Qingshui Li 2, and Lingna He 3 1 College of Mechanical Engineering, Zhejiang

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,

More information