scholarly journals Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc

Author(s):  
Santosh Sahu ◽  
Sanjeev Sharma

A cross layer QoS framework is a complete system that provides required QoS services to each node present in the network. All components within it cooperate together for providing the required services. In existing QoS frameworks there is no security mechanism provided while Security is a critical aspect for QoS in the MANET environment. Cross layer QoS framework  tend to be vulnerable to a number of threats and attacks like, over/under-reporting of available bandwidth, over-reservation, state table starvation, QoS degradation,  information disclosure, theft of services timing attack, flooding attack, replay attack, and denial of service (DoS) attack,  attacks on information in transit and attacks against routing. So it is necessary when designing protocols for QoS framework, the harmony between security and QoS must be present as one impacts the others. In this work we proposed secure and proficient cross layer (SPCL) QoS frameworks which prevents from various types of threats and attacks.  The proposed SPCL QoS framework achieves better performance compared to existing QoS frameworks  in metrics of throughput, packet drop ratio, end-to-end delay, and average jitter in both condition when malicious node present in the network and when malicious node not present in the network

Author(s):  
Shahin Vakilinia ◽  
Mohammadhossein Alvandi ◽  
Mohammadreza Khalili Shoja ◽  
Iman Vakilinia

In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.


2014 ◽  
Vol 13 (9) ◽  
pp. 5029-5038
Author(s):  
Deepali Raut ◽  
Kapil Hande

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this work the effect of Black hole and Gray Hole attack on DSR protocol has been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed using NS2 simulator. 


Author(s):  
Er. Ashu Garg ◽  
Sourav

Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assesment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare out come proposed scheme with the earliest established schemes.


2005 ◽  
Vol 4 (2) ◽  
pp. 489-494
Author(s):  
Kanika Lakhani

Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a powerful, multifeatured security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, blackhole, is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. By doing this, the malicious node can deprive the traffic from the source node and can be implemented as a denial-of-service attack where the packets can be dropped later on. In this paper, a solution is proposed to identify the malicious node and implanting security against the threats of blackhole by notifying other nodes in the network of the incident. The simulation of the proposed algorithm demonstrates that the solution prevents the nodes in the network from blackhole attack and also improves the overall performance of AODV in the presence of black hole attack.


Author(s):  
SETHI ANITA ◽  
VIJAY SANDIP ◽  
KUMAR RAKESH ◽  
◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document