scholarly journals A Survey on Efficient Secure Routing in Industrial Network for Improved QoS

The industrial units adapt different networks for the management of their units, processes and resources. The industrial sector uses different networks for their smooth functioning which would require accessing various network services by their users, employees and customers. However, the industrial networks arenot exemptions from network threats. Number of threats exist which challenge the functioning of industrial network like DDoS (Distributed Denial of Service), black hole, eavesdrop attack and so on. Most attacks focus towards degrading the QoS performance of industrial network. To handle this, different approaches are available in literature which works based on several features like traffic, hop count, payload, service frequency, retransmission frequency, node behaviors, and location of nodes and so on. Similarly, most threats occur over the routing procedure. Towards maximizing the QoS of industrial network, it is necessary to analyze various routing protocols and their way of handling different threats. This article analyzes various routing protocols and threats towards QoS of Industrial networks.

Author(s):  
Thomas M. Chen ◽  
Greg W. Tally

Internet users are currently plagued by an assortment of malicious software (malware). The Internet provides not only connectivity for network services such as e-mail and Web browsing, but also an environment for the spread of malware between computers. Users can be affected even if their computers are not vulnerable to malware. For example, fast-spreading worms can cause widespread congestion that will bring down network services. Worms and viruses are both common types of self-replicating malware but differ in their method of replication (Grimes, 2001; Harley, Slade, & Gattiker, 2001; Szor, 2005). A computer virus depends on hijacking control of another (host) program to attach a copy of its virus code to more files or programs. When the newly infected program is executed, the virus code is also executed. In contrast, a worm is a standalone program that does not depend on other programs (Nazario, 2004). It replicates by searching for vulnerable targets through the network, and attempts to transfer a copy of itself. Worms are dependent on the network environment to spread. Over the years, the Internet has become a fertile environment for worms to thrive. The constant exposure of computer users to worm threats from the Internet is a major concern. Another concern is the possible rate of infection. Because worms are automated programs, they can spread without any human action. The fastest time needed to infect a majority of Internet users is a matter of speculation, but some worry that a new worm outbreak could spread through the Internet much faster than defenses could detect and block it. The most reliable defenses are based on attack signatures. If a new worm does not have an existing signature, it could have some time to spread unhindered and complete its damage before a signature can be devised for it. Perhaps a greater concern about worms is their role as vehicles for delivery of other malware in their payload. Once a worm has compromised a host victim, it can execute any payload. Historical examples of worms have included: • Trojan horses: Software with a hidden malicious function, for example, to steal confidential data or open a backdoor; • Droppers: Designed to facilitate downloading of other malware; • Bots: Software to listen covertly for and execute remote commands, for example, to send spam or carry out a distributed denial of service (DDoS) attack. These types of malware are not able to spread by themselves, and therefore take advantage of the self-replication characteristic of worms to spread. This article presents a review of the historical development of worms, and an overview of worm anatomy from a functional perspective.


2012 ◽  
Vol 3 (2) ◽  
pp. 339-342
Author(s):  
Kaushal Gandhi ◽  
Rajneesh Narula ◽  
Sumeer Khullar ◽  
Anish Arora

There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.


Author(s):  
SATWINDER SINGH ◽  
ABHINAV BHANDARI ◽  
KRISHAN KUMAR SALUJA ◽  
A.L. SANGAL

Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack


2019 ◽  
Vol 8 (3) ◽  
pp. 4820-4829

A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. There are many routing protocols used in wireless networks for transmission of message, among which, Location-Aided Routing (LAR) protocol is used to find the location of destination. This may be possible using Global Positioning System (GPS) in mobile. We concentrate on other malicious attacks that would have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the MANET functionality. From this point of view, LAR provides a solution against DoS and DDoS attacks. LAR does not have any security mechanism, so we propose a SE_LAR technique which includes traffic analysis methods and extended OEDA method. It is helpful to analyze the traffic, to detect an overwhelming traffic, legitimate nodes, congestion on network, and snooping attacks. Mobile Ad Hoc Network (MANET) is even more vulnerable to such attacks. So, in this paper, we propose Secure Location-Aided Routing (SE_LAR). Its results are compared with existing secure routing protocols like ISE_DREAM, SE_DREAM protocols. Using the existing SE_DREAM routing protocol malicious nodes are detected by traffic analysis process which is to monitor flooding impact on MANET. The OEDA method discriminates the attacker nodes from reputable nodes by evaluating the addresses in the response signal. But, it cannot be used for dense network, and cannot detect indirect Sybil attack. So, we introduce extended OEDA method with two schemes such as by refering cache memory of neighbor node scheme, and passive Sybil node identity detection, which is incorporated with SE_LAR routing protocol. OEDA method is currently incorporated with the SE_DREAM protocol, generally better known as ISE_DREAM, to produce the route to destination substantially more robust against DDOS attack. Finally we decide using the performance parameters to find out the best alternative among the three different routing protocols. Calculation of the performance of the computation compares SE_DREAM, ISE-DREAM and SE-LAR standards, the overall performance measurements by the NS2 simulator and using the parameters. To determine the effect of network size on the total performance of these protocols, we have three different phenomena.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


Sign in / Sign up

Export Citation Format

Share Document