scholarly journals Attacks in Wireless Networks

Author(s):  
Sachin Dev Kanawat ◽  
Pankaj Singh Parihar

Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances in security requirements and services in communications in wireless networks. Wireless networks are being used in many commercial and military applications to collect event driven and real time data. Deployment nature of networks makes them vulnerable to security threats. Due to the resource limitations traditional security measures are not more enough to keep safe the nodes. Research in network security domains has produced several security solutions. In this paper we have observed security mechanisms. We have studied these security mechanisms with respect to packet overheads and compared the packet transmission time, average latency and energy consumption. The comparison shows that the packet overheads are lesser as compared to other schemes. It have been observed that packet delivery ratio decreases when we increase number of nodes while energy and latency increases.

Author(s):  
Maode Ma

The requirement of providing real-time data service by wireless networks is a critical issue in the design of current wireless networks. Distributed Queueing Request Update Multiple Access (DQRUMA) has been proposed as a demand assignment medium access control (MAC) protocol to efficiently control the medium sharing by multiple mobile users. With the help of a packet transmission policy, DQRUMA has a potential to provide QoS service for the time-constrained burst data traffic. In this article, we study the problem of providing real-time service to fixed-size packets with or without time constraints in wireless networks. In particular, we propose a novel scheduling scheme for the DQRUMA protocol to control the packet transmission in packet-switched wireless networks. We have conducted extensive simulation experiments to evaluate the performance of the proposed algorithm and to compare its real-time performance with those of other packet transmission policies. This study proves that the new algorithm is an efficient transmission policy for the DQRUMA to support real-time service in wireless networks.


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Mostofa Kamal Nasir ◽  
Rafidah Md. Noor ◽  
Mohsin Iftikhar ◽  
Muhammad Imran ◽  
Ainuddin Wahid Abdul Wahab ◽  
...  

Vehicular ad hoc networks (VANETs) are getting growing interest as they are expected to play crucial role in making safer, smarter, and more efficient transportation networks. Due to unique characteristics such as sparse topology and intermittent connectivity, Delay Tolerant Network (DTN) routing in VANET becomes an inherent choice and is challenging. However, most of the existing DTN protocols do not accurately discover potential neighbors and, hence, appropriate intermediate nodes for packet transmission. Moreover, these protocols cause unnecessary overhead due to excessive beacon messages. To cope with these challenges, this paper presents a novel framework and an Adaptive Geographical DTN Routing (AGDR) for vehicular DTNs. AGDR exploits node position, current direction, speed, and the predicted direction to carefully select an appropriate intermediate node. Direction indicator light is employed to accurately predict the vehicle future direction so that the forwarding node can relay packets to the desired destination. Simulation experiments confirm the performance supremacy of AGDR compared to contemporary schemes in terms of packet delivery ratio, overhead, and end-to-end delay. Simulation results demonstrate that AGDR improves the packet delivery ratio (5–7%), reduces the overhead (1–5%), and decreases the delay (up to 0.02 ms). Therefore, AGDR improves route stability by reducing the frequency of route failures.


2021 ◽  
Author(s):  
Udayakumar Allimuthu ◽  
K Mahalakshmi

Abstract MANET (Mobile Ad-hoc Networks) are distributed or delegated away from a central server, authoritative location of wireless networks that communicate without pre-existing structure. Ad-hoc networks are compromising the many types of attacks and routing. In MANET, the routing plays a vital role in terms of packets interaction and data transmission. Due to decentralized control, the MANET data transmission becomes insecure because of dispersed routing on the mobile ad-hoc nodes. Since the efficient route on MANET only controls the packets and does not simplify the route between the source to the destination, the maintenance of route interaction becomes a crucial process. Maintain effective data transactions over the MANET network, and it is essential to improve the route and locate the attacker. Nevertheless, MANET allows for route interaction against security threads. In this research article, four processing schemes are suggested to preserve the security measures against routing protocols. Especially in node communication, the rushing attacker has a significant impact on packet-based data transmission in MANET. Also, for this research, an Attacker detection automation of the Bees Colony Optimization (ADABCP) method is used, as a result of which the desired result is brought about in the effective attacker detection on the routing process. Moreover, the proposed Hybrid Random Late Detection (HRLD) routing protocol manages the MANET routing and overcomes the MANET congestion communication. The Swift Implicit Response Round Trip Time (SIRT) mechanism is generated by the Route Finding Manipulation (RFM) to enhance the performance. This RFM scheme helps to find the optimal routing in a secured manner. The proposed (SIRT-ADABCP-HRLD) approach was compared to the existing ESCT, ZRDM-LFPM, and ENM-LAC approaches, found to have improved by routing and data transmission. Compared to the conventional method, the method mentioned above achieves a better ratio for the end-to-end delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption.


The Hybrid Wireless Networks (HWN) interconnects both mobile networks and wireless networks or combines a cellular and a multi-hopping wireless networks or inter and intra networks. These are networks in which any mobile node in a wireless network may have connectivity either directly or via a gateway node to an infrastructure based wireless network. The quick development of wireless networks has triggered enormous applications. They have been used in various fields such as commerce, emergency services, health care, education, entertainment, etc. In spite of more advantages in HWN, it has some challenges such as to increase data transmitting capacity, to strengthen the network connection, proper bandwidth allocation in Mobile Ad hoc Network (MANET), to maintain a connection during the handover, to reduce the connection failure in between two networks. Here, this research considered to improve the Quality of Service (QoS) by reducing the invalid reservation problem, race conditional problem and link failure. In this paper for guarantying reliable and continuous data transmission and also to ensure that cooperative routing is done faster response and effective packet transmission. Cooperative communications are the most recent fields of research: they combine wireless channels’ link quality and broadcasting nature. Ad-hoc mobile networks are successful in communication if routing and transmission of participating nodes are working. A flow is divided into batches of data packets. On departing from source node, every packet of alike batch encloses similar forwarder list. Proactive Source Routing (PSR) protocol offers every node along nodes in networks, the identity of path nodes are enclosed by forwarder list commencing the location of source node. On progressive packets forwarding nodes modifies the forwarder list on any modification notified in network topology. In addition, a few nodes in extra which is not in list of transmitting node may also be transmitted if it is helpful, called small-scale retransmission. Cooperative and optimized QoS distributed multipath routing protocol (COQDMRP) combines the link-quality and broadcasting nature of wireless channels. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. Also, here the routing utilizes the neighbouring nodes which are basically referred as “Co-operative nodes” that can help transmitting the data from the source and destination. Since many nodes take part in the routing process, it helps to improve the overall throughput and packet delivery ratio. This proposed solution could be deployed in cases where a portion of nodes are in remote areas, packets with varied priority, highly scaled distributed HWN and network with considerable amount of nodes with less battery power. It is designed to achieve high throughput and packet delivery ratio, and low energy consumption. end - to - end delay and packet loss ratio.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 504
Author(s):  
T Gobinath ◽  
A Tamilarasi

In Wireless Sensor Network (WSN), fault occur due to node failure, malicious attack and link failure. Link failure causes the loss of sensitive data in a network leads to the emergency situation and influence generated and incoming data resulting in high probability of erroneous data, false packet transmission, wrong decision making and rigorous communication interruption. It leads to increase of traffic overhead and faulty node count in the network. In order to avoid this problem Emergency Node(EN) based process is proposed. Simulation clearly shows that the proposed method increased the packet delivery ratio and decreased the average delay, Energy consumption in WSN.


2014 ◽  
Vol 591 ◽  
pp. 189-192
Author(s):  
G. Sankara Malliga ◽  
T. Meeradevi ◽  
M. Umaparvathi ◽  
B. Parvathavartini ◽  
S. Thayammal ◽  
...  

Transmission Control Protocol (TCP) is working well in wired networks. TCP needs modification to work well in wireless networks. This work analyses the performance of the proposed two TCP cross layer flavours, namely the TCP-AL and TCP-WPAL. The cross layer interaction (TCP-WPAL) produces better performance than the TCP-AL. The PDR (Packet Delivery Ratio) of the TCP-WPAL is increased, and the delay and jitter of the TCP-WPAL are decreased in multihop wireless networks. Keywords: TCP, Wireless networks, TCP-AL and TCP-WPAL


Author(s):  
Smys S ◽  
Vijesh Joe

IoT objects that have a resource constrained nature resulting in a number of attacks in the routing protocol for lossy networks and low-power networks. RPL is very vulnerable to selfish behaviours and internal attacks though they are built with encryption protection to secure messages. To address this vulnerability, in this paper, we propose a novel trustworthiness methodology based on metric for incorporating trust evaluation, enhancing the robustness of security mechanism. Simulation results indicate that the proposed work is efficient in terms of throughput, nodes’ rank changes, energy consumption and packet delivery ratio. Moreover, using mathematical modelling, it has been observed that this methodology meets the demands of loop-freeness, optimality and consistency. This shows that this metic has both monotonicity and isotonicity requirements to enable the routing protocol. Incorporating the concepts of game theory, we can use this technique as a strategy to iterate Prisoner’s Dilemma. Both evolutionary simulation and mathematical analysis indicate that the proposed metric-based routing protocol is an efficient technique in promoting evolution and stability of the IoT network.


2019 ◽  
Vol 8 (2S3) ◽  
pp. 1041-1046

This paper presents the preliminary information of research that deals with communication protocol for Wireless Sensor Network (WSN) with retention of energy efficiency. The motive of this research is to accomplish a common goal of energy efficiency, using different forms of methodologies. Hence, the adoption of different methodologies and a common goal of energy efficiency in WSN are achieved. This paper explains the outcome accomplishment the proposed ENLPL Algorithm, Globular topology, load balancing technique of Processing Time, Data Aggregation Time, Packet Delivery Ratio and Energy Consumption pertaining to optimizing energy using probabilistic technique, and Dynamic Reconfiguration. . The work also explains about the comparative analysis among the models to showcase the best scenario of usage in sensorbased applications


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sign in / Sign up

Export Citation Format

Share Document