SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS
|
|
|
- Charleen Powell
- 10 years ago
- Views:
Transcription
1 SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS 1 A.Senthilkumar and 2 Dr.C.Chandrasekar 1 Assistant.Professor, Department of MCA, Sengunthar Engineering College, Tiruchengode , Tamilnadu, India. [email protected] 2 Associate Professor, Department of Computer Science, Periyar University, Salem , Tamilnadu, India. [email protected] Abstract A Secure Routing capabilities on the order of Node to Base Station will be capable of both wired connectivity to the internet as well as wireless connectivity to the sensor network. One aspects of sensor networks organized hierarchically, with a base station serving as a gateway for collecting data from a multi-hop network of resource-constrained sensor nodes. Strategies for multiple destination base stations is analyzed as a strategy to provide tolerance against individual base station attacks and or compromise. Test performance should be similar to Optimization Methods. Keywords: Wireless Sensor Networks, Energy aware Routing, Resource Constraint Sensor Nodes, Sensor Network Architecture, Secure Routing, Protocols, Base Station Placement. I.INTRODUCTION: Wireless sensor networks growing in popularity of application and wide range of application are emerging location aware sensor networks in the office and home. A notable feature of the architecture of a wireless sensor network is its hierarchy, rooted in a base station. One aspects of Sensor networks that complicates the design protocol aggregation work in secure routing. End-to-end security is possible in more conventional networks because the intermediate routers to have access to the content of messages. Proposals for routing protocols in sensor networks optimize for the limited capabilities of the nodes. We consider strategies for securing the sensor network, multipath routing to multiple destination base stations is analyzed as a strategy to provide tolerance against individual base station attacks. This strategy is considered both for the route discovery phase and data routing phase. Confusion of address and field identification in header and function. The relocation of base station in the network topology our analyze the extent to which base station mobility and placement can affect the network. The test performance of the three strategies, we have simulated wireless sensor networks in ns2 simulator. 1.1 Node to Base Station (BS) Secure Routing : Sensor nodes use Kn to encrypt and transmit the data. Transmission of encrypted data from nodes to cluster leader. Appending id# to data and then forwarding it to higher level of cluster leaders, eventually reaching the base station. NODES NODE TO BASE STATION SECURE ROUTING BS BS BS BS BS SECURE ROUTING Figure1: Node to Base Station Secure Routing. 1.2 Nodes to Base Station (BS) Secure Routing Algorithm: BS1 BS2 BS3 BS4 BS5 Step 1: if sensor node i want to send data to its cluster leader go to step 2, else exit the algorithm. Step 2: Sensor node i requests the cluster leader to send the Kc to decrypt the data if needed. Step 3: Sensor node i uses Kc and its own Kn to computer the encryption key Ki, Cn. Step 4: Sensor node I encrypts the data with Ki, Cn and appends its ID# and the Ts to the encrypted data and then sends them to the cluster leader. Five Main Contribution We purpose threat models and security goals for secure routing in wireless sensor networks. (i) Multiple base stations: Route Discovery, Route Request, Route feedback, Performance Evaluation of Route Discovery. (ii) Multiple Base Stations: Performance Evaluation of Multiple Paths, Passive Attack by Compromised ISSN :
2 Sensor Nodes, Base Station Failure, Base Station Scalability. (iii) Disguising Base Station Location: Confusion of ID s, Relocation of Base Stations. (iv) Base Station Placement Strategies: Possibility of Relocating Base Stations, Determining Optimal Locations. (v) Attacks on Sensor Network Routing: Selective Forwarding, Attack on Specific Sensor Network Protocols. II. TEST THE PERFORMANCE OF THE THREE STRATEGIES AND ALGORITHMS CAN BE USED FOR THE DESIGN: We have simulated wireless sensor networks in ns2 Simulator, for a Random Network Topology we generate 100 Nodes and put them in a 1250 * 1250 M 2 Square Area. For Grid Network Topology, we generate 7 * 7 Nodes and put them in a 1430 * 1430 M 2 Square Area. For each Experiment, we randomly generate 15 to 25 Network Topologies. The results shown in various graphs in the paper are average values of each test. Small (<10 Network devices) Medium (~ 25 devices) Wireless access networks, such as CDMA based and fixed wireless (WLL) networks. 2.1Objectives that motivated the Development of the new Heuristic Design Methods: The methods should be capable of designing efficient medium and large- scale access networks at polynomial time. Their performance should be similar to that of other optimization methods, as for instance the ones presented Performance of Study Large Networks: Moreover their performance usually degrades quickly with the number of nodes (because a unique resource has to be shared among all) we will thus abstract from the MAC layer and focus on routing protocols. This will enable us to study large networks and propose simpler, more tractable mathematical models, more suitable for computer simulations Various energy-aware Routing Protocols and Two Broad Categories: We will study various energy-aware routing protocols, propose different data traffic patterns and network sizes and we will study how well the different protocols scale with the number of node and if differences in generated network structures appear. Routing protocols for sensor networks are divided in two broad categories: Pro-Active Protocol, Reactive (or on-demand) Protocols Protocols belonging and enables a Node: The protocols belonging to the first group to build a network image locally at each node, this enables a node to quickly determine a route to any destination when it has a packet to route. The major problem with this approach is that it requires a lot of control traffic to propagate all the necessary network information to all the nodes and this image must then be regularly updated, this being also a cause of network traffic Two kinds of data traffic will be simulated: The first one is converge casting, where all nodes send data to one or more sinks (data collection points). It is a typically data collection scenario. The second one is random unicast (one to one) communications between nodes, and is less focused on an application. To simplify mathematic modeling, we will restrict the study to static networks, and won t include mobility. Network size will vary between tens to hundreds of nodes. Most traffic in Sensor Networks can be classified into one of three Categories: Many-to-Many: Multiple Sensor Nodes send sensor reading to a base station or aggregation point in the network. One-to-Many: A Single node (typically a base station) multicasts or floods a query or control information to several sensor nodes. Local Communication: Neighboring nodes send localized messages to discover and coordinate with each other. A node may broadcast messages intended to be received by all neighboring nodes or unicats messages intended for a only single neighbor. III. EFFICIENT SOLUTION FOR WIRELESS COMMUNICATION SYSTEMS: Recent years have witness tremendous developments regarding wireless network access. Given to methods for the design of in-door coded division multiple access (CDMA) based wireless networks and fixed wireless (e.g. wireless local loop- WLL) networks, which are referred to as wireless access networks, In these networks. 3.1 Two main types of Network Components: The Access Point / Base and Fixed Wireless User / Terminal Station: Each terminal should be connected to only one access point / base station and each access point / base station together with its associated terminals, constitute an access subnetwork. Moreover, the access point / base stations can be connected to one or more other subnetworks (e.g. the backbone subnetwork). The fixed wireless terminals (test points) claim for access to the network and the access point / base stations connect the terminals to the network. With the set T of fixed wireless terminals and the set S of possible (predefined) locations for the placement of access point / base stations. 3.2 The Process of wireless Network Planning Basically Consists of Three Phases: Base Station Placement and Wireless Terminal (test point) Empirical Approaches: A number of base stations must be placed in a number of (predefined candidate sites, essentially one base station in each selected sites. The design cost that have refers to base station placement ISSN :
3 (installation) and operation, should be minimum unfortunately, today there are no systematic methods to address the problem of wireless network planning, especially for CDMA based networks, fixed wireless and UMTS access networks. Allocation to the selected base station(s) in phase 1.practically, both phases can be considered as one. The planning process is mainly based on empirical approaches, nevertheless, recent design approaches based on integer linear programming (ILP) and mixed integer programming (MIP) techniques, deal with the above problem in a rather interesting way that it may be very advantages in practice. Integer Linear Programming (ILP): A wireless system planning procedure for in-door CDMA networks based on a complex Integer Linear Programming. Mixed Integer Programming: Simulation results regarding topologies with more that 27 wireless users are provided. In a series of complex MIP optimization models specially suited for UMTS base station planning are presented. The optimization methods are time demanding when applied to the solution of the design problems they involve particularly when the number of the network devices increase. IV. WIRELESS LAN DATA SERVICES: Wireless LAN data services provide moderate data rate and wide coverage area access to packetsswitched data networks. The data networks emerged after the success of the paging industry to provide a two-way connection for larger messages. WLANs provide high data rates (maximum of imbps ) in a local area ( < 100m) to provide access to wired LANs and the Internet. Today all successful WLANs Operate in unlicensed bands that are free of charge and rigorous regulations. 4.1 Penetration of Signals: If one intends of bring a wireless service to the rooftop of a residence and distribute that service inside the house using other alternative such as existing cable or TP wiring that person may select LMDS equipment operating in licensed bands at several tens of GHz. If the intension is to penetrate the signal into the building for direct wireless connection to a computer terminal, the person may prefer equipment operating in the unlicensed ISM bands at 900 MHz or 2.4 GHz. The first approach is more expensive because it operates at licensed higher frequencies, where implementation and the electronics are more expensive and the frequency bands. The second solution does not have any interference control mechanism because it operates in unlicensed bands. 4.2 Packet Size in Wireless Data Networks Access Methods for Wireless LANs: Problem 1: Determine the transfer time of a 20 KB file with a Mobile Data Network with a Transmission rate of 10 Kbps. Solution : the early mobile data networks, such as ARDIS and mobile, limited the length of a file to around 20KB for a data rate of around 10Kbps it would take 20 (KB) * 8 (B / b) * 10 Mbps = 16 Seconds to transfer such a file. Problem 2: Repeat for an WLAN operating at 2 Mbps. Solution: An IEEE Network Operating at 2 Mbps should Transfer this file in 80ms. Problem 3: What is the length of the file that the WLAN of Part (b) can carry in the time that mobile data service of part (a) carries its 20KB file. Solution: In a 16 Second time interval the same WLAN transfers a 4MB file. V. ROUTE FEEDBACK Each sensor node sends its local connectivity information (a set of identities of its neighbor nodes as well as the path to itself from A base station B) back to the base station B using A feedback message. A separate feedback message is send to every base station whose request message was forwarded in the first round. The mechanism used to send feedback messages to different base stations is same. After a node has forwarded its request message in round one. It waits a certain timeout interval before generating a feedback message. This interval allows a node to listen to the local broadcasts of its neighbors, who will also be forwarding the same request message. A feedback message containing neighbor list and path to B is propagated to B using the reverse path taken the request message initiated by B. 5.1 Four Different Computing Scenarios could be adopted Two independent routes available between every node and one of the base stations, our protocol s goal is to route messages correctly in the presence of a single node. Protocol deals quite well with multiple nodes as well. We have performed a set of experiments to measure the number of nodes that can be blocked when a set of nodes turn and (simply) drop data packets. The average number of nodes that can be blocked as a function of the number of nodes. A single base station with a single path. A single base stations with two redundant paths. Three base stations with a single path. And Three base stations with two redundant paths (computed using the second strategy). 5.2 Attacks are difficult to address completely at the network level These attacks must be addressed at multiple levels in our analysis, we have assumed that sensor nodes use an appropriate rate-based control mechanism while forwarding data packets, but not other nodes. However, a node in the vicinity of a base station can isolate that base station from the rest of the network by simply launching. ISSN :
4 5.3 Launching experiments with two topologies are tested In random generates topology; the position of each node is randomly selected. While in the grid topology, each node is placed on a square grid to accommodate the simulator, it was necessary to per tub each position in grid topology to a small region around each vertex in a square grid graph. 5.4 Attack Compromised by Active Sensor Node Performed a set of experiments to analyze the effect of an active attack. The attack we have simulated in these experiments is comprised of repeatedly, sending data packets to the base stations to block the wireless medium and not allow other nodes to send their data packets. 5.5 A key management of probabilistic approach towards multiple base Stations A key of deploying multiple base stations in a wireless sensor network can tolerate failure of one or more base stations. Number of sensor nodes that cannot reach any base station as a result of one or more base station failure. Four different computing scenarios, comprising of two, three, four, and five base stations respectively. In all computing scenarios, two redundant paths were computed using the second strategy. Base station failures automatically to relate by having redundant base stations. VI. CONCLUSION & FUTURE WORK Secure routing is acceptance and use of sensor networks for many applications. Base station is analyzed as a strategy to provide individual base station attacks or sensor node compromises problem to design a sensor network routing protocol that satisfies our proposed security goals. The possible presence of laptop-class adversaries and insiders and the limited applicability of end-to-end security mechanisms careful protocol design as well. Applications for wireless sensor networks. Characteristics of wireless sensor networks. Efficient heuristic solutions for wireless communication systems. Requirements for routing algorithms. Algorithms and protocols for wireless sensor networks. Traditional mechanisms. Data-driven mechanism. Performance evaluation of Route discovery and multiple path. Confusion of ID s. Wireless LAN data services. Wireless Network Process. VII. REFERENCES 2.D.Ganesan, R.Govindan,S.Shenker and Estrin Energy Efficient Multipath Routing in Wireless Sensor Networks Mobile Computing and Communication Review,Vol 1, Muhammad Mahmudul Islam, Ronald Pose and Carlo Kopp, (2008).Routing Protocols for Adhoc Networks. 4. Dormido, S.; Sánchez, J.; Kofman, E. Sampling, event-based control and communication (in Spanish). Rev. Iber. Auto. Infor. Indu. 2008, 5, Guanqun Yang, Wei Zhou and Daji Qiao, "Defending Against Barrier Intrusions Using Mobile Sensors" In Proc. International Conf. on Wireless Algorithms, Systems and Applications, Prof.Dr.Gunnar Karlsson KTH Stockholm, Wireless Content Distribution, Srdan Capkun, Jean-Pierre Hubaux, Secure positioning of wireless devices with application to sensor networks. IEEE INFOCOM, March Bryan Parno, Adrian Perrig and Virgil Gligor. Disotributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy Wensheng Zhang, Guohong Cao, Group Releying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. IEEE INFOCOM, March A.A. Somasundara, A.Ramamoorthy, and M.B.Srivastava. Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks with Dyanmic Deadlines, Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varchney. A Key Management Scheme for Wireless Sensor Networks Using Depolyment Knowledge. IEEE INFOCOM 04, March 7 1,2004, HongKong. 12. C. Karlof and D.Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, First IEEE International Workshop on Sensor Network Protocols and Applications, May J.Deng, R.Han and S.Mishar, The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks, to appear in IEEE 2nd International Workshop on Information Processing in Sensor Networks(IPSN 03), Palo Alto, CA, USA, April, C.Karlof and D.Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, First IEEE International Workshop on Sensor Network Protocols and Applications, May Wood, J.A. Stankovic. Denial of Service in Sensor Networks. IEEE Computer, 35(10): 54-62, October A.Senthilkumar received the MCA Degree from the Madras University, India, in He received the M.Phil degree in Computer Science, Manonmaniam Sundharnar University, Tirunelveli, India. He is Currently Assistant Professor in Department of MCA, Sengunthar Engineering College, Tiruchengode, India. He has 11 Years of Experience in Teaching. And Currently Pursuing PhD degree in computer applications from Anna University Coimbatore, India. His fields of interest, Computer Networks, Network Security, Wireless Sensor Networks. He Has 12 Publications to his credit in National, and International Journals and Conference. 1 Guanqun Yang and Daji Qiao, "Barrier Information Coverage with Wireless Sensors", In Proc. IEEE INFOCOM ISSN :
5 Dr.C.Chandrasekar received the PhD Degree from the Periyar University, Salem, India. He is Currently Associate Professor in Department of Computer Science, Periyar University, Salem, India. He has 14 Years and 3 Months of Experience in Teaching. His fields of interests Mobile and Communication Networks. He Has 32 Publications to his credit in National, International Journals and Conference. ISSN :
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Enhancing Base Station Security in Wireless Sensor Networks
Enhancing Base Station Security in Wireless Sensor Networks Jing Deng, Richard Han, and Shivakant Mishra [email protected], {rhan,mishras}@cs.colorado.edu Technical Report CU-CS-951-3 April 23 University
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 [email protected],
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
New System Security Model for a Mobile Operator s Meshed Access Network
New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Survey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
