EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Securing AODV Routing Protocol in Design of Mobile Ad hoc Networks

Download or read book Securing AODV Routing Protocol in Design of Mobile Ad hoc Networks written by Nirbhay Chaubey and published by LAP Lambert Academic Publishing. This book was released on 2015-01-20 with total page 132 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing is an important function in MANETs. Performance of various Proactive, Reactive and Hybride Routing Protocol have been studied, analyzed and evaluated through the simulations in Network Simulator-2. Early work in routing mainly focussed on providing efficient mechanisms for finding paths in dynamic networks. Security issues were not taken into consideration. Interestingly, designing adequate security schemes for these innovative networks is very challenging. The objective of writing this book are (i) To make the readers aware of the fundamentals of Mobile Ad hoc Networks and its working (ii) To understand the issues and challenges of deployment and maintenance of MANETs (iii) Study, analysed and evaluate performance of proactive, reactive and hybrid routing protocol through the simulations in Network Simulator-2 (iv) Provide a broad and comprehensive overview of the research that has been done to secure AODV routing protocol in design of MANETs and (v) Propose a novel approach to secure AODV routing protocol from insider attacks. This book will be very much useful for Ph.D, Research Scholar and Graduate Students who wish to carry out their research in Mobile Ad Hoc Networks.

Book Security for Wireless Ad Hoc Networks

Download or read book Security for Wireless Ad Hoc Networks written by Farooq Anjum and published by John Wiley & Sons. This book was released on 2007-03-05 with total page 265 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board.

Book Design and Implementation of the Extended Routing Information Protocol for Mobile Ad Hoc Networks in Linux

Download or read book Design and Implementation of the Extended Routing Information Protocol for Mobile Ad Hoc Networks in Linux written by Ravikumar Putta and published by GRIN Verlag. This book was released on 2012-11-28 with total page 79 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2012 in the subject Computer Science - Software, Coventry University (MSRSAS - computer science and networking), course: Design and Implementation of the Extended Routing Information Protocol[ERIP] for Mobile Ad-hoc Networks in Linux, language: English, abstract: A Mobile Ad-hoc Network (MANET) is a network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as node mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols, like low overhead operation, routing security and best path selection. This Thesis deals with the design and implementation of the Extended Routing Information Protocol (ERIP) for mobile ad-hoc networks in Linux. ERIP is a proactive protocol, characterized by low overhead operation, best path selection based on hop count, loop free working and routing security. Raw sockets are used for exchange of routing information, whereas data exchange happens via TCP or UDP sockets as required by the application. Low overhead operation of ERIP is guaranteed by using the incremental dump strategy. Incremental dumping of the routing table is realized by scheduling only partial updates, instead of full. The routing table is encrypted before broadcast using a simple shared key algorithm to provide routing security. The routing functionality of the implemented protocol is tested by first running ERIP on two laptops and using VLC media player to stream multimedia data between the laptops. The two laptops were then moved out of range of each other and intermediate nodes (laptops) were brought in that were running the same routing protocol. The data was communicated over multiple hops in near real time. The best path selection property was proved by setting up a network of ERIP nodes that had multiple paths between source and destination with different hop counts. The implemented protocol consistently routed data through the path that had the least hop count. Porting the developed protocol to the Linux kernel would allow it be part of the standard Linux distribution. Also, more complex cryptography algorithms can be implemented to provide data and routing security.

Book Defence System for MANETs  Mobile Adhoc Networks

Download or read book Defence System for MANETs Mobile Adhoc Networks written by Mir Shahnawaz Ahmad and published by GRIN Verlag. This book was released on 2019-04-11 with total page 59 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2016 in the subject Engineering - Computer Engineering, grade: A+, , language: English, abstract: The main aim of this work is to guarantee a security solution which provides defence against attacks. To achieve that, a secure routing protocol (SMAODV) is presented which makes use of the multiple paths between source-destination pairs for removing the malicious routes from the network thereby reducing the effect of the attack to a great extent. MANET is a class of ad hoc networks which spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET’s towards the attacks is huge as compared to their wired counterparts. MANET’s are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared medium, constrained resources etc. The ramification being that the security needs of MANET’s become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANET’s come from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open me reachable to both the legitimate users of the network as well as the malicious nodes. Consequently, there is a bankruptcy of clear line of defence from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. When these types of attacks occur in ad hoc networks then even the standard routing protocols like AODV, DSDV, DSR, LAR, and LAMR etc. do not provide the required security. The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attack. But, the attack on availability which is the most common and easiest of them all cannot be avoided by authentication and encryption because even the authentic user can be the attacker. Also, encryption cannot be helpful to prevent such attacks. Therefore in such a situation if a proper solution is not provided the entire MANET operation will get crippled.

Book Security Aware Routing Protocol for Manet

Download or read book Security Aware Routing Protocol for Manet written by Prasad Lokulwar and published by LAP Lambert Academic Publishing. This book was released on 2012-08 with total page 84 pages. Available in PDF, EPUB and Kindle. Book excerpt: An ad hoc network is a collection of autonomous mobile nodes to forming an instant multihop radio infrastructure-less network in a dynamic topology. Many routing protocols for mobile ad-hoc networks are presented since last decade.Ad-hoc networks are in a great demand now a days and have a lot of advantages.In this direction, we have designed the Ad Hoc On Demand Routing Protocol (AODV) using Network Simulator (NS) which is efficient as well as we have implemented the security technique so the we can prevent the data loss at the time of transmission. The main advantage of using the Network Simulator for the design of AODV is that we can actually observe the working of the specific protocol without the establishment of the network as NS provides the environment for the working of protocol. In this paper, we provided the security to the AODV routing protocol using asymmetric Cryptography with the help of RSA algorithm.

Book Secure MANET Communication Based on Hybrid Cryptosystem

Download or read book Secure MANET Communication Based on Hybrid Cryptosystem written by Noor Ul Amin and published by LAP Lambert Academic Publishing. This book was released on 2013 with total page 64 pages. Available in PDF, EPUB and Kindle. Book excerpt: Design and development of security-aware and performance efficient routing protocols for Mobile Ad hoc Network is an active area of research. AODV is one of prominent routing protocol for MANET routing. To exchange session key using public key crypto in a single step with route establishment phase CAODV was proposed. Inspired from CAODV in this work we propose a security extension of AODV and developed a new routing protocol for MANET- SCAODV- adding security field which enable the protocol to run in sixteen different modes according to the security desired. The proposed protocol can also exchange session key in single step with route establishment. We evaluate and compare the performance of SCAODV protocol with AODV and CAODV. Simulation results demonstrate that SCAODV consistently outperforms CAODV protocol in terms of routing latency, data packet delay, packet delivery ratio and packet drop. Proposed protocol has the properties of resistance to Spoofed Routing and Secure Key Exchange with Confidentiality, Integrity, Authenticity, Non repudiation and Verifiability.

Book Secured Routing Protocol for Ad Hoc Networks

Download or read book Secured Routing Protocol for Ad Hoc Networks written by Lakshmi Venkatraman and published by . This book was released on 2001 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: In this thesis, we have analyzed the threats to the routing protocols in ad hoc wireless networks and have put forth methods to enhance secure routing. Mobile ad hoc networking is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. Due to such characteristics, these networks have much harder security requirements than the traditional, wired and static Internet. Efficient and effective routing in such networks is an especially hard task to accomplish securely, robustly and efficiently at the same time. One of the most severe threats to routing in such networks is the possibility of compromised nodes, which inflict unpredictable and undetectable Byzantine failures. The contemporary routing protocols do seem to manage the dynamically changing conditions rather well. In contrary, they offer either no security mechanisms at all, or have only partial solutions for protecting the routing. We believe that security schemes should be integrated with the routing protocols because the kinds of attacks and their solutions would differ from one protocol to another. Moreover, the imple-mentation will be optimal if it is designed for a specific protocol. We have presented a scheme for reactive routing protocols, specifically AODV, that performs the dual functions of preventing external attacks and also detecting compromised nodes. External attacks are prevented by means of authentication techniques that rely on mutual trust between nodes. We have also minimized the overhead involved in authentication. We have identified various forms of misbehaviors and have proposed solutions for certain deterministic ones. When either form of attack is detected, the system responds suitably to negate the effect of these attacks and also prevent future threats from the same nodes. Besides routing security, we have studied the issue of data authentication for hierarchical ad hoc networks and have proposed a data authentication scheme. In our scheme each cluster head acts as the certification authority for its cluster members.

Book Ad Hoc Mobile Wireless Networks

Download or read book Ad Hoc Mobile Wireless Networks written by Chai K Toh and published by Pearson Education. This book was released on 2001-12-03 with total page 502 pages. Available in PDF, EPUB and Kindle. Book excerpt: The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense "Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere, anytime, for virtually any application. The field is rapidly coming of age, reflecting powerful advances in protocols, systems, and real-world implementation experience. In Ad Hoc Mobile Wireless Networks, one of the field's leading researchers brings together these advances in a single consolidated and comprehensive archive. C.K. Toh covers all this, and more: Key challenges: device heterogeneity, diverse traffic profiles, mobility, and power conservation Routing protocols for ad hoc networks, including Associativity Based Routing (ABR) and other IETF MANET protocols Real-world implementation issues-including a complete prototype implementation Ad hoc wireless network performance: results obtained from the latest field trials Leading approaches to service discovery Addressing TCP over an ad hoc wireless network environment Support for multicast communications The role of Bluetooth and WAP Ad Hoc Mobile Wireless Networks introduces detailed application scenarios ranging from home and car to office and battlefield. C.K. Toh also introduces several of the field's leading projects, from Motorola's PIANO platform to UC Berkeley's "Smart Dust." Whether you're a researcher, scientist, implementer, consultant, technical manager, CTO, or student, you won't find a more authoritative and comprehensive guide to the new state of the art in ad hoc networking.

Book Self Organised Security in Mobile Ad Hoc Networks

Download or read book Self Organised Security in Mobile Ad Hoc Networks written by Alaa Hassan and published by . This book was released on 2015-07-15 with total page 176 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Ad Hoc Wireless Networks

    Book Details:
  • Author : C. Siva Ram Murthy
  • Publisher : Pearson Education
  • Release : 2004-05-24
  • ISBN : 0132465698
  • Pages : 1050 pages

Download or read book Ad Hoc Wireless Networks written by C. Siva Ram Murthy and published by Pearson Education. This book was released on 2004-05-24 with total page 1050 pages. Available in PDF, EPUB and Kindle. Book excerpt: Practical design and performance solutions for every ad hoc wireless network Ad Hoc Wireless Networks comprise mobile devices that use wireless transmission for communication. They can be set up anywhere and any time because they eliminate the complexities of infrastructure setup and central administration-and they have enormous commercial and military potential. Now, there's a book that addresses every major issue related to their design and performance. Ad Hoc Wireless Networks: Architectures and Protocols presents state-of-the-art techniques and solutions, and supports them with easy-to-understand examples. The book starts off with the fundamentals of wireless networking (wireless PANs, LANs, MANs, WANs, and wireless Internet) and goes on to address such current topics as Wi-Fi networks, optical wireless networks, and hybrid wireless architectures. Coverage includes: Medium access control, routing, multicasting, and transport protocols QoS provisioning, energy management, security, multihop pricing, and much more In-depth discussion of wireless sensor networks and ultra wideband technology More than 200 examples and end-of-chapter problems Ad Hoc Wireless Networks is an invaluable resource for every network engineer, technical manager, and researcher designing or building ad hoc wireless networks.

Book Improving Intrusion Detection in MANETs  Researching Systems in Mobile Ad Hoc Networks

Download or read book Improving Intrusion Detection in MANETs Researching Systems in Mobile Ad Hoc Networks written by Andy Reed and published by GRIN Verlag. This book was released on 2015-12-11 with total page 27 pages. Available in PDF, EPUB and Kindle. Book excerpt: Research Paper (undergraduate) from the year 2015 in the subject Computer Science - IT-Security, , language: English, abstract: This paper investigates the rise in popularity of MANETs (Mobile Ad Hoc Networks) and discusses their valuable role in all manner of situations that require a rapid deployment, and a highly flexible and dynamic approach to mobile networking. The paper examines the advantages, along with the limitations of MANETs, and identifies many of the current security concerns. Examining these concerns has exposed DoS attacks as being of high priority when planning for, and provisioning a secure network. The role of the IDS has been identified as being a crucial element in the security requirements. However, it has also been identified that the IDS is not a single solution, and that there are a number of options available, each suited to a particular scenario. Many of the IDS solutions have been identified as being complex and difficult to administer and maintain, and can lead to aggressive resource consumption. In conclusion to this paper it is felt that there is further work to be done to `develop a low resource intensive node based IDS design methodology to help protect MANET nodes from DoS attacks’.

Book Advances in Computer Science and Information Technology  Networks and Communications

Download or read book Advances in Computer Science and Information Technology Networks and Communications written by Natarajan Meghanathan and published by Springer. This book was released on 2012-04-23 with total page 671 pages. Available in PDF, EPUB and Kindle. Book excerpt: The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.

Book Secure Routing and Medium Access Protocols in Wireless Multi hop Networks

Download or read book Secure Routing and Medium Access Protocols in Wireless Multi hop Networks written by Soufiene Djahel and published by GRIN Verlag. This book was released on 2011-10-28 with total page 170 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.

Book Mobile Ad Hoc Networks

Download or read book Mobile Ad Hoc Networks written by Xin Wang and published by BoD – Books on Demand. This book was released on 2011-01-30 with total page 528 pages. Available in PDF, EPUB and Kindle. Book excerpt: Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks.

Book Enhancement of Ad Hoc On Demand Distance Vector Protocol Security Using Secure Message Transmission

Download or read book Enhancement of Ad Hoc On Demand Distance Vector Protocol Security Using Secure Message Transmission written by Satya Balagam and published by . This book was released on 2011 with total page 64 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ad hoc on-demand distance vector (AODV) routing protocol offers quick adaptation to dynamic link changes, incurs low processing and memory overhead, has a low initial setup while connecting to networks, and determines unicast routes to destinations within the ad hoc network. This routing protocol allows for efficient and reliable discovery of routes. Although the connection setup delay is lower for the AODV protocol compared to other ad hoc routing protocols, such as the dynamic source routing (DSR) protocol and destination sequenced distance vector (DSDV) protocol, the AODV routing protocol involves a heavy control overload and delay while finding the routes in adverse conditions, such as the presence of malicious nodes in the network or connection failures due to network congestion. This thesis studies the secure message transmission (SMT) protocol, which safeguards data transmission against arbitrary malicious behavior of other nodes and evaluates its performance over the AODV routing protocol. The analysis of the performance of the AODV routing protocol in combination with the SMT protocol was done by considering a scenario of mobile ad hoc networks under adverse conditions, with half of the nodes acting maliciously and dropping both data and control packets. The AODV routing protocol in combination with the SMT protocol imposes up to 46% less routing overhead, delivering up to 17% more data packets, with a throughput of 12% more and end-to-end delays that are up to 24% lower than those of the native AODV routing protocols in the scenarios considered. Thus the AODV routing protocol performs well with the SMT protocol, and is reliable. The NS-2 network simulator was utilized to compare performances. The advantages of the proposed approach of using the AODV routing protocol together with the SMT protocol are more apparent in the presence of malicious nodes in the network.

Book Cross Layer Optimization for Protocols in Mobile Adhoc Networks

Download or read book Cross Layer Optimization for Protocols in Mobile Adhoc Networks written by Anita Yadav and published by GRIN Verlag. This book was released on 2020-03-17 with total page 142 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Miscellaneous, grade: 16, , language: English, abstract: In this thesis, we have modified AODV routing protocol by incorporating link prediction algorithm using a proposed link prediction model. This algorithm predicts the link availability time and even before the link breaks; either it repairs the route locally or sends information to the source nodes to enable them to initiate a new route search well in time. This algorithm improves the quality of service of the network. Simulation results show that AODV routing algorithm with link availability model performs better than the existing AODV. Advances in wireless technology and hand-held computing devices have brought revolution in the area of mobile communication. The increasing mobility of humans across the globe generated demand for infrastructure-less and quickly deployable mobile networks. Such networks are referred to as Mobile Adhoc Networks (MANET). Usually, nodes in a MANET also act as a router while being is free to roam while communicating each others. Adhoc networks are suited for use in situations where infrastructure is unavailable or to deploy one is not cost-effective. Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes will also causes frequent routes breaks and adversely affects the required performance for the applications. Availability of a route in future mainly depends on the availability of links between the nodes forming the route. Therefore, it is important to predict the future availability of a link that is currently available. We have proposed an analytical model for link prediction using Newton divided difference method. This link availability algorithm is incorporated in AODV routing algorithm (AODVLP) to evaluate the performance of AODV routing protocol using the metrics viz. delivery rate, average end-to-end delay, average RTS collisions per node and route failure. In the existing AODV protocol, packets are routed until a link in the existing path fails. This results in degradation of quality of service of network in terms of end-to-end delay and delivery ratio.

Book Advances in Wireless Ad Hoc and Sensor Networks

Download or read book Advances in Wireless Ad Hoc and Sensor Networks written by Maggie Xiaoyan Cheng and published by Springer Science & Business Media. This book was released on 2008-12-15 with total page 316 pages. Available in PDF, EPUB and Kindle. Book excerpt: Within thirteen self-contained chapters, these volume provides a complete survey of the state-of-the-art research that encompasses all areas of ad hoc and sensor networks. Written by distinguished researchers in the field, these chapters focus on the theoretical and experimental study of advanced research topics involving security and trust, broadcasting and multicasting, power control and energy efficiency, and QoS provisioning. This book is a great reference tool for graduate students, researchers, and mathematicians interested in studying mobile ad hoc and sensor networks.