scholarly journals Influence of Bottleneck Nodes on Malicious Packet Dropping Nodes Mitigation in Wireless Infrastructure-less Networks

Mobile ad hoc networks as an infrastructure free, and constrained resource environment network. The network aim is to establish internet connectivity everywhere regardless of location. The applications of network are healthcare, disaster relief and military, where reliable communication is major concern. Communication in the network is initiated by establishing the communication route between source and destination and sending the information through it. One of the characteristics of MANETs is a peer-to-peer network, where intermediate nodes have to cooperate for reliable communication by acting as routers. In literature number of routing protocols have been designed based on the MANET’s peer to peer characteristic. However, it may not be every time true that the intermediate nodes act as faithful routers, and they may untrustworthy either due to malicious behavior or bottleneck. Number of secure protocols have been designed to mitigate malicious behavior by neglecting the bottleneck. The paper aims to define the bottleneck, and its importance in communication. Finally, how bottleneck influence on the MANETs performance during malicious nodes mitigation

Author(s):  
Federico Franzoni ◽  
Xavier Salleras ◽  
Vanesa Daza

AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.


Starting with API level 14, ICECREAM SANDWITH, Android introduced API for peer to peer communication using Wi-Fi Direct. Since then many applications have been released that use this technology for data transfer and communication between two devices. But most of these have been used for just two-person communication. In this paper we propose to create a peer to peer network using the same technology. This paper focuses on creating a local wireless network of android smartphones using Wi-Fi direct. This paper also defines an algorithm using which each device can get the IP address of each of its peer. This paper will also help those who are trying to create applications on android using Wi-Fi Direct.


Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

The importance of the network security problems come into prominence by the growth of the Internet. The article presents a new kind of software, which uses just the network, to protect the hosts and increase their security. The hosts running this software create an Application Level Network (ALN) over the Internet. Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps by oneself. The developed software is named Komondor (Czirkos, 2006), which is a famous Hungarian guard dog. The novelty of the system Komondor is that Komondor nodes of each host create a Peer-To-Peer (P2P) overlay network. Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network. The use of the peer-to-peer network model for this purpose is new in principle. Test results proved its usefulness. With its aid, real intrusion attempts were blocked. This software is intended to mask the security holes of services provided by the host, not to repair them. For this it does not need to know about the security hole in detail. It can provide some protection in advance, but only if somewhere on the network an intrusion was already detected. It does not fix the security hole, but keeps the particular attacker from further activity.


Author(s):  
DIPTI GOGAWALE ◽  
MADHURI WAKODE

The Peer to peer architecture run over internet are widely used in unstructured topology. Random walk based and control flooding resource query algorithms are widely used in peer to peer network. In this paper we consider searching of file in ad hoc network. We propose Enhanced Selective Dynamic Query algorithm. The main aim of this algorithm is to minimize traffic cost and response latency for resource query response. When user want to search a query first history table is referred. If query is present in history table next searching is not required otherwise optimal combination of integer TTL value and set of neighbor for next query round is calculated in network by using knapsack for next query. This algorithm tries to achieve best tradeoff between traffic cost and response latency.


2021 ◽  
Author(s):  
Cristian Negulescu

Peer-to-peer or P2P file-sharing application on wireless ad hoc mobile network (MANET) has gained a lot of interest in the recent years. A peer-to-peer network is an overlay network that is deployed over ad hoc networks. Our work is analyzing two P2P systems over MANET. The systems evaluated are representing two distinct categories in terms of network topology such as unstructured and structured architectures. RAON or Resource-Aware Overlay Network, which is an improvement of an existent P2P system called Gia, is an unstructured system. CAN or Content-Addressable Network is an existent P2P system in the category of structured architectures. Based on the simulations of the two P2P systems over MANET, we evaluated the performance in terms of query search success rate and query search delay.


Sign in / Sign up

Export Citation Format

Share Document