• No results found

Multi Signature Protocol for Network Layer Attacks in Mobile Ad Hoc Networks

N/A
N/A
Protected

Academic year: 2020

Share "Multi Signature Protocol for Network Layer Attacks in Mobile Ad Hoc Networks"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

125

Multi Signature Protocol for Network Layer Attacks in

Mobile Ad Hoc Networks

Mr. Sachin Korde1, Dr. M. V. Sarode2, Dr. V. M. Thakre3

PhD Scholar1, Head of Department2, 3 SGBAU, Amravati1

Government Polytechnic, Yavatmal2 SGBAU, Amravati3

sachin.kprde211@gmail.com1 mvsarode2013@gmail.com2

Abstract: Now a day, it is no longer optional to have security solutions even inevitable for every kind of

organizations and individuals. There are number about common equipment as are common for corporations as

properly as like for single users to furnish safety who includes; Anti-Spam, Anti-Virus etc., and network safety bear grow to be quintessential difficulty into MANET. Security is one of the fundamental problems into the MANET specifically including observance in imitation of size and complexity of the network. The aim of the thesis is according to talk about exclusive aspects concerning security in MANET (e.g. multi-layer intrusion detection method within multi hop network over MANET, security issues relates among multihop network and mobile nodes between MANET etc) and additionally implement some of the solutions (e.g. comparative instruction about exclusive routing protocol (AODV, DSR and TORA) safety threats inside MANET network like intruder behavior, tapping and integrity, MANET link layer and network layer operations with honor to information security etc) with respect in conformity with MANET network. Motivated by these limitations; no single technique gives solution for more than 2-3 attacks. They are unable to cover all kinds of attacks, especially when more than two attacks occur in the network. Evaluation often requires detailed analysis of all types of attacks. For this reason, we will create the solution for authentication of node using mechanism of digital multi signature for dynamic group key agreement protocol.

Keywords- MANET, security, attack, AODV, malicious

1. INTRODUCTION

Mobile Ad hoc Networks are autonomous and decentralized wireless systems. Mobile Ad hoc Networks correspond regarding mobile nodes that are arbitrary within transferring in and outdoors within the network. Nodes are the systems or units i.e. mobile phone, laptop, personal digital assistance, MP3 player and private computer systems that are collaborating between the network and are mobile. These nodes perform work namely host/router or each at the identical time. They perform shape unrestricted topologies depending on theirs connectivity together with every mean within the network. These nodes bear the capacity to configure themselves and because of theirs self-interest formal ability, they can be deployed urgently barring the need on someone infrastructure. Internet Engineering Task Force (IETF) has Mobile Ad hoc

Networks working group (WG) that is committed in imitation of developing IP routing protocols. Routing protocols are some regarding the challenging and strong research areas. Many routing protocols hold been developed for Mobile Ad hoc Networks, i.e. AODV, DSDV, DSR etc. Security in Mobile Ad hoc Network is the nearly vital difficulty for the simple functionality on the network. The availability regarding network services, confidentiality and morality regarding the facts perform stand executed by way of assuring so much protection issues have been met.

(2)

126 elements have changed the battlefield situation because

of the Mobile Ad hoc Networks against the safety threats. The Mobile Ad hoc Networks work barring a centralized administration the place the nodes communicate with each other regarding the basis about mutual trust. This characteristic makes Mobile Ad hoc Networks extra susceptible to be exploited with the aid of an attacker inside the network. Wireless links additionally redact the Mobile Ad hoc Networks more susceptible to attacks, which make such less complicated because the attacker to continue 2 interior the network and reach access in conformity with the permanent communication. Mobile nodes current within the measure of wireless link perform overhear and too take part among the network.

Mobile Ad hoc Networks ought to hold a secure access because transmission and communication and it is a quite challenging and imperative problem as like so is growing threats on attack on the Mobile Networks. Security is the allege about the day. In system in accordance with grant secure communication and transmission, the engineers need to understand different kinds concerning attacks and their consequences over the Mobile Ad hoc Networks.

Wormhole attack, Black hole attack, Sybil attack, flooding attack, routing table overflow attack, Denial of Service (DoS), selfish node misbehaving, impersonation assault are the type regarding attacks that Mobile Ad hoc Networks may go through from. A Mobile Ad hoc Networks is greater open to these types concerning attacks because communication is based of mutual trust between the nodes, so is no medium point because network management, no endorsement facility, vigorously changing topology and constrained resources.

2. RESEARCH ISSUE IN MANET

There are many research problems that must be solved to support the implementation of MANETs [1]. Solutions to these problems should be compromise of all three components prevention, detection and reaction. There are some characteristics of security solutions of MANETs which will clearly provide multi fence security solutions with respect to network protection and also provide desirable network performance.

1. The security solution should also implement across many individual components in order to provide collective protection to secure entire network. In terms of computation capabilities are concerned like energy

supply, memory as well as communication capacity each device has to work within its own.

2. The security solution should also provide security with respect to different layers of the protocol stack and each layer provides line of defense. It is also not possible that only one single-layer solution can handle all potential attacks.

3. The security solutions should avoid threats from both outsiders as well as inside. According to outside attacks are concerned it should avoid attacks on the wireless channel as well as network topology where as in case of inside attacks are concerned an intruder who enter into the network through compromised devices and gain access to different network knowledge.

4. The security solutions should enforce all three components of security like prevention, detection, and reaction.

5. The security solutions should be affordable as well as practical in resource constrained and highly dynamic networking scenario.

3. LITERATURE REVIEW

Wireless mobile ad hoc networks are used when communicating entities should remain in a position according to adapt between dynamic, long-range environments besides the need regarding a static infrastructure because packet routing decisions. These structures are dense instances confined into resources, such as much electric and computational power.

For these systems after work, the underlying communication relies concerning efficient, reliable, ad hoc routing protocols. While there has been a great deal action evaluating the overall performance on these protocols, security and survivability over this networks has lately become a intensive research focus. Attacks that appear between infrastructure networks may additionally be more difficult in accordance with detect of mobile ad hoc networks. Mobile Ad hoc networks are also susceptible to a broader range of attacks; [5, 6] describes such attacks. Mobile ad hoc networks rely heavily on routing for communication; therefore, there has been much focus on routing protocol security. Many techniques have been implemented for different kind of attacks.

(3)

127 opposition to wormhole attacks, and we present a

particular protocol, known as TIK, that implements leashes.

Ming Yu, Mengchu Zhou [3] proposed a fresh algorithm that detects inward attacks by using using each message and route redundancy for the duration of route discovery. The route-discovery messages are protected by pairwise hidden keys among a source and destination and partial intermediate nodes along a route established by the use of public key cryptographic mechanisms.

Hidehisa Nakayama [4] proposed a current anomaly-detection schedule based on a dynamic instruction technique so much approves the training records after be updated at particular time intervals. Our potential discipline method includes calculating the projection distances based on multidimensional statistics using weighted coefficients and a forgetting curve.

Srdjan Capkun [7] brought Integrity (I) regions, a novel security venerable so enables message authentication of wireless networks besides the usage of preestablished and precertified keys. Integrity areas are primarily based over the proving about essence oncoming through time-of-arrival ranging techniques

Karim El Defrawy, Gene Tsudik [8] addressed a quantity on issues arising of ambiguous location-based MANET settings by using designing and examining a privacy-preserving and secure link-state primarily based routing protocol (ALARM). ALARM utilizes nodes’ cutting-edge locations in imitation of securely disseminate and assemble topology snapshots then advanced data.

Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai [9] brought instant technique by considering the unique characteristics on reactive jammer nodes, a new scheme in accordance with deactivate to them by correctly identifying whole trigger nodes, whose transmissions invoke the jammer nodes, has been proposed then developed.

Ziming Zhao, Hongxin Hu [10] proposed a risk-aware response mechanism according to systematically cope along the recognized routing attacks. Our risk-aware approach is based about an extended Dempster-Shafer mathematical principle of evidence introducing a concept over value factors

Elhadi M. Shakshuki, Nan Kang [11] proposed or appointments a new intrusion-detection dictation named Enhanced Adaptive ACKnowledgment (EAACK) specifically designed because MANETs. Compared after current approaches, EAACK demonstrates higher malicious- behavior-detection rates among definitive instances while does no longer notably have an effect on the network performances.

Quansheng Guan, F. Richard Yu [12] proposed current method through at the same time thinking about authentication yet topology control. Specifically, they analyzed the advantageous throughput together with higher bed authentication schemes or physical-layer schemes associated in imitation of trough stipulations or relay picks for CCs. A peace authentication or topology control (JATC) plan is proposed after improve the throughput

Shiva Murthy G, Robert John D’Souza [13] proposed a secure node disjoint multipath routing protocol for wireless sensor networks. Here, the data packets are transmitted between a secure behavior by the usage of the digital signature crypto system.

Nikolay A. Moldovyan [14] proposed scheme the usage of Russian digital signature (DS) standards as the underlying design there are designed the inadvisable DS protocols that are the preceding known implementation concerning the inadvisable DS primarily based of signature standards. They also proposed inadvisable common DS protocols primarily based on the DS standards.

Blazej Brzezniak [15] introduced an attack so much perform be launched with the aid of any protocol participant after terminating allotted key generation process.

Dae Hyun Yum, Jin Seok Kim, Sung Je Hong [16] proposed the idea regarding distance bounding protocols is in imitation of repeat fast bit exchanges. One party sends a challenge bit and every other party answers with a explanation bit and vice versa. By sure the round-trip time among the challenge and the response, an top bound over the scale among users can stay calculated. If messages are relayed, the round-trip period increases and accordingly mafia fraud attacks perform stand detected.

(4)

128 networks. Using analytical and simulation results, we

exhibit that a artistic placement of the wormhole when the nodesare uniformly distributed be able disrupt/control on average 32% on entire communications across the network. Also they analyzed a situation within which quite a few attackers redact wormholes between every sordid then a suit where twain malicious nodes attack a goal node in the network.

H. Kim et al [18] proposed a early defense mechanism against statistics flooding attacks including the aim of improving the throughput.

Mike Burmester, Breno de Medeiros [19] delivered the safety impenetrable because of the earth demand algorithm endairA is flawed, and moreover, that algorithm is inclined in imitation of a secret duct attack. We additionally analyze the protection fabric that was used for path find and argue that composability is an critical function because of global applications

Mueen Uddin [20] toughness proposed modern model referred to as Signature-based Multi-Layer IDS the use of mobile agents, as perform become aware of approaching threats together with extraordinarily excessive success dimension by means of dynamically and automatically growing and the usage of little or efficient multiple databases, and at the equal time, grant mechanism after replace these small signature databases at ordinary intervals the usage of mobile agents.

Jie Yang, Yingying (Jennifer) Chen [21] proposed after use spatial information, a bodily creed related with every node, hard in conformity with falsify, then not reliant about cryptography, as like the groundwork for 1) detecting spoofing attacks; 2) figuring out the range on attackers when more than one adversaries masquerading as the equal node identity; yet 3) localizing a couple of adversaries. We propose according to utilizes the spatial relation about acquired sign energy (RSS) traditional beyond wi-fi nodes in accordance with notice the spoofing attacks.

Zhang Jianhong, Xu Min, yet Liu Liying [22] introduced current technique to perceive firm messages and reduce verifying delay; a cluster on schemes hold been proposed in conformity with verify the records regarding VANET by way of bunch substantiation technique.

CaLynna Sorrells yet Lijun Qian [23] proposed a non-parametric model about the Pages increasing quantity (CUSUM) algorithm in accordance with limit the

discovery delay then up to expectation a network supervisor might also arouse in imitation of the match as soon as like possible after extinguish the impact concerning the attacks.

Radhika Goel, Anjali Sardana, yet Ramesh C. Joshi [24] proposed a young hybrid mannequin is being proposed for misuse and exclusion detection. C4.5 based totally double choice timber are used because of misuse yet CBA (Classification Based Association) based classifier is old because of anomaly detection.

Jianbin Hu, Hu Xiong, or Zhong Chen [25] proposed an enchancment among Kang et al.'s expanded plan as did now not grant user anonymity as much that claimed then relinquish a in addition enchancment in accordance with restore the trouble except losing anybody applications regarding the authentic scheme.

Kavitha Ammayappan [26] proposed a new impenetrable route trace protocol because of MANETs so overcomes the vulnerabilities on Ariadne yet EndairA, fit after hidden channel attacks. It use 'authentic neighborhood' because route discovery pro- impost which probably protects black channels over rout- ing power packets, besides making sure nature yet in- tegrity regarding routing power messages at hop-by-hop level.

Mina Malekzadeh [27] introduced lookup in parallelism according to our experiments; we boost an extension module because of wireless DoS attacks using OMNeT++ to assess the reliability concerning this simulation tool within evaluate according to our actual 802.11 wi-fi network testbed. To perform these goals, throughput, end- to-end delay, or pocket misplaced ratio.

Kou-Min Cheng [28] proposed a safety increment within Ku then Wang's authenticated key settlement protocol. Two events job the pre-shared password in imitation of agreement a frequent session authorization by insecure network. However, it showed up to expectation this approach suffered out of the back respond attack or the on-line password conception attack.

(5)

129 place the jamming periodicity self-synchronizes with

the dwelling excerpt cycle.

Zhao Min, Zhou Jiliu [30] proposed joining authentication mechanisms, based totally of the obtruncate function, the tidings authentication code (MAC) yet the pseudo around characteristic (PRF), are proposed in accordance with supply fast information proving or team identification, identify a couple of black holes joint with every vile then to find out the sure routing fending off cooperative black hole attack

Jeba Veera Singh Jebadurai [31] stability longevity proposed a new technique in conformity with observe the sinkholes who uses the mutual perception among the cell nodes.

Muhammad Zeshan [32] toughness permanency has proposed a two folded approach, in conformity with notice yet afterward in imitation of isolate such nodes as come to be the share of the community in conformity with reason etiquette dropping attacks. stellar approach will become aware of the misconduct of nodes or choice perceive the malicious exercise of network, then afterwards on identification over nodes abuse into community sordid method intention isolate the malicious node fromnetwork.

Venkat Balakrishnan [33] delivered approach which presents a mechanism after discover the effective conduct regarding an expelled node and rejoins the expelled node back into the network. Furthermore, our strategy does now not require some additional packets in conformity with speak the behavior on the flooding node and hence does now not answer somebody extra overhead.

Aad, I., J.P. Hubaux [34] proposed plan yet study DoS assaults into system in imitation of investigate the injury up to expectation difficult-to-detect attackers be able cause. The first assault we study, referred to as the JellyFish attack, is targeted against closed-loop flows certain namely TCP; though protocol compliant, such has devastating effects. The second is the Black Hole attack, who has consequences comparable after the JellyFish, however over open-loop flows

Gao, X. and C. Wei [35] introduced DSR protocol including quantity symbolic letter algorithm then network model. Also that proposed to uses quantity character algorithm after address custom dropping nodes. The suggestion used to be consisted of iii related

algorithms: the growing secure algorithm, the checkup algorithm yet the prognosis algorithm

Feng Li [36] proposed a brawny Bayesian signaling recreation then analyze then current the underlining ligature of nodes’ superior aggregate over moves or the value or attain regarding the unaccompanied strategy. Regular nodes persistently update their beliefs based about the opponents’ behavior, whilst malicious nodes evaluate their jeopardy over being caught in accordance with decide so to flee.

But these techniques have some limitations; no single technique gives solution for more than 2-3 attacks. They are unable to cover all kinds of attacks, especially when more than two attacks occur in the network. Evaluation often requires detailed analysis of all types of attacks. For this reason, we will focus on network layer security attacks, in which we will evaluate performance of network layer security attacks.

4. PROPOSED WORK

4.1 Objectives of the proposed work are summarized as follows:

From the study of aforementioned work in the field of secure routing protocols for Mobile Ad Hoc Networks and from the review of current literature following research problems have been identified.

1. Review and study MANET routing protocols to gain an understanding of issues associated with this field.

2. Survey the network layer security attacks in Mobile of Ad hoc Networks.

3. Review the area of different techniques or approaches to understand their principles as applied to the subject of study.

4. The proposed system which involves following goals:

a. Investigate and study different types of routing protocols in MANET.

b. Investigate and study different types of Network layer attacks for MANET. c. Investigate and study authentication

techniques.

d. Create the simulation of various routing protocols for MANET and evaluating their performance under the various types of Network layer attacks.

(6)

130 signature for dynamic group key

agreement protocol.

5. Implement the proposed system in a case study simulation scenario.

6. Analyze, compare, and validate the simulation scenario results.

5. RESEARCH METHODOLOGY

The main goal to adopt research methodology is to produce new knowledge, and here is the form of research methods:

Constructive research

It develops solutions to a problem. Here we will divide our work into two models theoretical model and simulation model. In the theoretical model we will study different types of network layer security attacks and their issues. In the simulation model we will implement different network layer attacks & run simulation with MANET configuration and try to find out the impact of those attacks on Mobile Ad Hoc Networks.

Steps in Research Process:

1. Formulating the Research Problem 2. Extensive Literature Review 3. Developing the objectives

4. Preparing the Research Design including Sample Design

5. Collecting the Data 6. Analysis of Data

7. Generalization and Interpretation

8. Preparation of the Report or Presentation of Results-Formal write ups of conclusions reached.

5. CONCLUSION

In this paper, we proposed multisignature based security technique for different attacks of network layer. Vulnerability of nodes, absence of infrastructure and dynamic changing topology make the security of mobile ad hoc network more difficult. With development of computing environment, the security attacks detection/prevention techniques are also increasing. We are implementing proposed method in network simulator to evaluate its performance under network layer attacks.

REFERENCES

[1] Sudha Singh, S.C. Dutta, and D.K. Singh, ―A study on Recent Research Trends in MANET‖ International Journal of Research and Reviews in

Computer Science (IJRRCS)., Vol. 3, no. 3, pp. 1654–1658,. June 2012.

[2] Yih-Chun Hu, ―Wormhole Attacks in Wireless Networks,‖ IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS., vol. 24, no. 2, pp. 370 – 380 , . 2006.

[3] Ming Yu, Mengchu Zhou, ―A Secure Routing Protocol against Byzantine Attacks for MANETs in Adversarial Environments,‖ IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY., vol. 58, no. 1, pp. 449– 460,. 2009.

[4] Hidehisa Nakayama, ―A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks,‖ IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY., vol. 58, no. 5, pp. 2471 – 2481,. 2009.

[5] Majid Khabbazian, Hugues Mercier, and Vijay K. Bhargava, ―Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks,‖ IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS., vol. 8 , no. 2 , pp. 736 – 745, . 2009.

[6] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , ―A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,‖ Wireless Network Security Signals and Communication Technology , pp 103-135., 2007

[7] Srdjan Capkun, ―Integrity Regions: Authentication through Presence in Wireless Networks ,‖ IEEE TRANSACTIONS ON MOBILE COMPUTING., vol. 9, no.11, pp. 1608–1621, . 2010.

[8] Karim El Defrawy, Gene Tsudik, ―ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,‖ IEEE TRANSACTIONS ON MOBILE COMPUTING., vol. 10, no. 9, pp. 1345–1358,. 2011.

[9] Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai , ―A Trigger Identification Service for Defending Reactive Jammers in WSN,‖ IEEE TRANSACTIONS ON MOBILE COMPUTING., vol. 11, no. 5, pp. 793–806, . 2012.

[10] Ziming Zhao, Hongxin Hu , ―Risk-Aware Mitigation for MANET Routing Attacks,‖ IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING., vol. 9, no. 2, pp. 250 – 260, . 2012.

(7)

131 [12] Quansheng Guan, F. Richard Yu , ―Joint Topology

Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications,‖ IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ., vol. 61, no. 6, pp. 2674–2685, . 2012.

[13] Shiva Murthy G, Robert John D’Souza, and Golla Varaprasad, ―Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks,‖ IEEE SENSORS JOURNAL ., vol. 12, no. 10, pp. 2941 –2949, . 2012.

[14] Nikolay A. Moldovyan, ―Blind Signature Protocols from Digital Signature Standards ,‖ International Journal of Network Security ., vol. 13, no. 1, pp. 22–30, . 2011.

[15] BÃla_zej Brzezniak, Lucjan Hanzlik, ―Attack against Ibrahim's Distributed Key Generation for RSA,‖ International Journal of Network Security., vol. 15, no. 1, pp. 237–240, . 2013.

[16] Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, ―Distance Bounding Protocol for Mutual Authentication,‖ IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS .,vol. 10, no. 2, pp. 592– 601,. 2011.

[17] KHABBAZIAN et al., ―Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks,‖ IEEE TRANSACTIONS ON WIRELESS COMMUNICATION., vol. 8, no. 2, pp. 736–745, . 2009.

[18] H. Kim et al. , ― Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks,‖ IEEE Transactions on Consumer Electronics., vol. 56, no. 2, pp. 579–582, . 2010. [19] Mike Burmester, Breno de Medeiros, ―On the

Security of Route Discovery in MANETs ,‖ IEEE TRANSACTIONS ON MOBILE COMPUTING., vol. 8, no. 9, pp. 1180 1188, . 2009.

[20] Mueen Uddin et al., ― Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents‖, International Journal of Network Security, Vol.15, No.2, PP.97-105, Mar. 2013. [21] Jie Yang, Yingying (Jennifer) Chen, ―Detection

and Localization of Multiple Spoofing Attackers in Wireless Networks,‖ IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS ., vol. 24, no. 1, pp. 44–58, . 2013.

[22] Zhang Jianhong1, Xu Min2, and Liu Liying3, ―On the Security of a Secure Batch Verification with Group Testing for VANET,‖ International Journal of Network Security, Vol.16, No.5, PP.355–362, Sept. 2014.

[23] CaLynna Sorrells1 and Lijun Qian2, ―Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks‖, International Journal of Network Security, Vol.16, No.6, PP.468-476, Nov. 2014

[24] Radhika Goel, Anjali Sardana, and Ramesh C. Joshi, ―Parallel Misuse and Anomaly Detection Model,‖ International Journal of Network Security., vol. 14, no. 4, pp. 211–222, . 2012. [25] Jianbin Hu, Hu Xiong, and Zhong Chen , ―Further

Improvement of An Authentication Scheme with User Anonymity for Wireless Communications,‖ International Journal of Network Security ., vol. 14, no. 5, pp. 297–300 , . 2012.

[26] Kavitha Ammayappan, Vinjamuri Narsimha Sastry, and Atul Negi , ―A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks,‖ International Journal of Network Security ., vol. 14, no. 3, pp. 121–141, . 2012.

[27] Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam, and Jalil Desa, ― Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed,‖ International Journal of Network Security., vol. 13 , no. 1 , pp. 13 – 21, . 2011.

[28] Kou-Min Cheng, Ting-Yi Chang, and Jung-Wen Lo, ―Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol,‖ International Journal of Network Security,. vol. 11, no. 1, pp. 55–57, . 2010.

[29] M. Balakrishnan, H. Huang, R. Asorey-Cacheda , ―Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc Networks,‖ IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS ., vol. 11, no. 11, pp. 3860–3868, .2012.

[30] Zhao Min, Zhou Jiliu, ―Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks‖, IEEE International Symposium on Information Engineering and Electronic Commerce, IEEE Xplore Press, 978-0-7695-3686-6/09, pp. 26-30, 2009.

[31] Jeba Veera Singh Jebadurai, Alfred Raja Melvin A, ―Sinkhole Detection in Mobile Ad-hoc Networks Using Mutual Understanding among Nodes‖, IEEE International Conference on Electronics Computer Technology, IEEE Xplore Press , 978-1-4244-8679-3/11, pp. 321-324, 2011.

(8)

132 Networks‖, IEEE International Seminar on Future

Information Technology and Management Engineering, IEEE Xplore Press 978-0-7695-3480-0/08, pp. 568-572, 2008.

[33] Venkat Balakrishnan, Vijay Varadharajan, and Uday Tupakula , ―Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications‖, IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, IEEE Xplore Press 978-0-7695-2846-5/07, pp. 29, 2007.

[34] Aad, I., J.P. Hubaux, E.W. Knightly, ―Impact of Denial of Service Attacks on Ad Hoc Networks‖, IEEE/ACM TRANSACTIONS ON NETWORKING., vol. 16, no. 4, PP. 791-802., 2008.

[35] Gao, X. and C. Wei, ―A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks‖. IEEE International Conference on IFIP Network and Parallel Computing Workshops, IEEE Xplore Press 978-0-7695-2943-1/07, pp: 209-2014,. 2007. [36] Feng Li , ―Attack and Flee: Game-Theory-Based

References

Related documents

general case, that is, for any Riccati equation with elliptic functions as its coefficients, its integrability defined by the solvability of its monodromy group means that its

specified (a) Location of supplier and (b) Place of supply.. intrastate supply, else inter-state. If it is intra-state supply then CGST and SGST will be levied. However, if

a) Tracking the root cause of corporate sickness by unraveling the chain of causes;.. b) Identifying the typologies of corporate sickness – viz., operating, strategic,

 “The much anticipated promotion of Startup India with Prime Minister of India has brought plenty of optimistically amongst the entrepreneurs in India.. We are ecstatic

Parashar, Matrix transformations in spaces of bounded and convergent difference sequences of order m , Analysis 17 (1997), no.. Mishra, Matrix maps involving certain sequence spaces

To study the mean return performance of Mid and large cap regular equity mutual fund. To study the mean return performance of SIP mutual fund and

Here we develop some coincidence and fixed point theorems for compatible single-valued and multi-valued maps satisfying some generalized contraction type condition... Coincidence

Suthep Suantai: Department of Mathematics, Faculty of Science, Chaing Mai Uni- versity, Chiang Mai, 50200 , Thailand. E-mail address