scholarly journals Low-Complexity Security Algorithm Again Black-hole Attacking Node Considering Energy Balance for WSNs

Author(s):  
Phat Nguyen Huu

Wireless sensor network (WSN) is a network through radio waves to link a large number of unevenly distributed nodes on a wide range of areas for the purpose of sensing, processing and collecting data.The data transmitted in WSNs is usually sensitive that needs to be protected. WSNs are more vulnerable to attacks due to network characteristics such as wireless transmission, changing network topologies, computing power, limited memory and power of nodes comparing to wired networks. There are many types of attacks on WSNs such as sinkhole attacks, data integrity attacks, wormhole attacks, Black hole attacks, etc. In this article, we will evaluate the impact of Black-hole attacks in the WSN network when using the AODV routing protocol (Ad-hoc On-demand Distance Vector routing). The Black hole attack model will be simulated by Network Simulator 2 (NS-2) by the number of lost packets by counting the number of packets sent by the sending node, receiving packets to destination, and rest energy of the nodes in two cases.

Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


2013 ◽  
Vol 846-847 ◽  
pp. 1697-1700
Author(s):  
Yuan Ming Ding ◽  
Hao Qu ◽  
Xue Wang

Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.


Author(s):  
Stephen E. Lincoln ◽  
Tina Hambuch ◽  
Justin M. Zook ◽  
Sara L. Bristow ◽  
Kathryn Hatchell ◽  
...  

Abstract Purpose To evaluate the impact of technically challenging variants on the implementation, validation, and diagnostic yield of commonly used clinical genetic tests. Such variants include large indels, small copy-number variants (CNVs), complex alterations, and variants in low-complexity or segmentally duplicated regions. Methods An interlaboratory pilot study used synthetic specimens to assess detection of challenging variant types by various next-generation sequencing (NGS)–based workflows. One well-performing workflow was further validated and used in clinician-ordered testing of more than 450,000 patients. Results In the interlaboratory study, only 2 of 13 challenging variants were detected by all 10 workflows, and just 3 workflows detected all 13. Limitations were also observed among 11 less-challenging indels. In clinical testing, 21.6% of patients carried one or more pathogenic variants, of which 13.8% (17,561) were classified as technically challenging. These variants were of diverse types, affecting 556 of 1,217 genes across hereditary cancer, cardiovascular, neurological, pediatric, reproductive carrier screening, and other indicated tests. Conclusion The analytic and clinical sensitivity of NGS workflows can vary considerably, particularly for prevalent, technically challenging variants. This can have important implications for the design and validation of tests (by laboratories) and the selection of tests (by clinicians) for a wide range of clinical indications.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


Author(s):  
Lalit Tripathi ◽  
Kanojia Sindhuben

MANET (Mobile ad hoc networks) is a collection of wireless mobile nodes dynamically forming an infrastructure less network. Several routing protocols are designed for routing of packets in MANET. One of them is AODV (Ad hoc on demand Distance Vector) protocol whose performance is better for higher mobile nodes. It is more vulnerable to black hole attack by the malicious node. Black hole attack is a network layer attack in MANET that tries to hamper the routing process. During route discovery phase it sends false reply to the nodes and dropped data packets. In this paper, first we have implemented black hole attack in AODV and then analyzed the impact of black hole attack under deferent metrics like throughput, packet delivery ratio and packet loss. Simulator NS-2.35 is used for implementation and result analysis.


2013 ◽  
Vol 5 (3) ◽  
pp. 214-219
Author(s):  
Rajveer Kaur ◽  
Dr. Shaveta Rani ◽  
Dr. Paramjeet Singh

In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and  have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.


Author(s):  
Muhammad Mahmudul Islam ◽  
Ronald Pose ◽  
Carlo Kopp

Ad-hoc networks have been the focus of research interest in wireless networks since 1990. Nodes in an ad-hoc network can connect to each other dynamically in an arbitrary manner. The dynamic features of ad-hoc networks demand a new set of routing protocols that are different from the routing schemes used in traditional wired networks. A wide range of routing protocols has been proposed to overcome the limitations of wired routing protocols. This chapter outlines the working mechanisms of state-ofthe- art ad-hoc routing protocols. These protocols are evaluated by comparing their functionalities and characteristics. Related research challenges are also discussed.


Author(s):  
Narayan Thakre ◽  
Sameeksha Verma ◽  
Amit Chouksey

Vehicular Ad Hoc Networks (VANETs) are self-organizing, self-healing networks that offer wireless communication among vehicles and roadside equipment. Providing safety and comfort for drivers and passengers is a promising goal of those networks. Designing an applicable routing protocol according to the network application is one among the essential necessities for implementing a victorious vehicular network. In this paper, we tend to report the results of a study on routing protocols associated with conveyance applications and their communication desires. The main aim of our study was to spot that routing technique has higher performance in extremely mobile environment of VANET. The thesis works is based on comparison between Ad hoc on demand Distance Vector routing protocol (AODV), Modified Ad hoc on demand distance vector routing (MAODV) and Destination sequenced distance vector routing (DSDV) in VANET on the basis of packet delivery ratio and end-to-end delay. The tool which we used for the work of performance is Network Simulator 2 (NS-2).


Author(s):  
Jayanthi. E ◽  
Mohammed Ali Hussain

<span lang="EN-US">Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their wireless and vibrant features make them susceptible to wide range of types of security attacks when compared to the traditional wired networks. The prime challenge is to assure security in the network components and services. To work out the challenge, novel security measures are put forward for effective and secured communication. In our proposed work, we discuss the need for Security in MANET, focusing on certificate revocation. Providing security is challenging tasks due to its key features. Different authentication techniques, Digital certificate and components of Public Key Infrastructure are also discussed. The certificate revocation is a challenging task in MANETs due to absence of centralized repositories and trusted authorities. The different methods of certificate revocation using cluster based mechanism is analyzed and compared. The principle, advantages and disadvantages of certificate revocation are also compared. And the novel Certificate revocation techniques using fuzzy is discussed with reduced overhead.</span>


Sign in / Sign up

Export Citation Format

Share Document