rate controlling and scheduling in wireless adhoc … · dr.dekson.d.e professor, cse & it,...

185
RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC NETWORKS Thesis submitted in partial fulfillment for the degree of Doctor of Philosophy in Computer Science and Engineering By T.BUVANESWARI Under the guidance of Dr. DEKSON.D.E Vinayaka Missions University (Vinayaka Missions Research Foundation Deemed University) Arriyanoor, Salem-636 308 Tamilnadu, India March 2016

Upload: others

Post on 04-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

RATE CONTROLLING AND SCHEDULING IN WIRELESS

ADHOC NETWORKS

Thesis submitted in partial fulfillment for the degree of

Doctor of Philosophy in

Computer Science and Engineering

ByT.BUVANESWARI

Under the guidance of

Dr. DEKSON.D.E

Vinayaka Missions University(Vinayaka Missions Research Foundation Deemed University)

Arriyanoor, Salem-636 308

Tamilnadu, India

March 2016

Page 2: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

Dr.DEKSON.D.E

Professor, CSE & IT, Chennai.

Aarupadai Veedu Institute of Technology, 10.03.2016

Paiyanoor, Chennai

CERTIFICATE

I, Dr.DEKSON.D.E certify that the thesis entitled “RATE CONTROLLING

AND SCHEDULING IN WIRELESS ADHOC NETWORKS” submitted by

Ms.T.BUVANESWARI for the award of the degree of Doctor of Philosophy is the

record of research work carried out by her during the period from 2011 to 2016 under my

guidance and supervision and that this has not formed the basis for the award of any other

degree, diploma, associateship, fellowship or any other similar titles in this or any other

institution of higher learning.

(Signature & Official seal of the guide)

Page 3: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

DECLARATION

I, T.BUVANESWARI declare that the thesis entitled “RATE

CONTROLLING AND SCHEDULING IN WIRELESS ADHOC

NETWORKS” submitted by me for the award of Doctor of Philosophy

is the record of research work carried out by me during the period

from January 2011 to March 2016 under the guidance of

Dr.DEKSON.D.E, Professor, CSE & IT, Aarupadai Veedu Institute

of Technology, Paiyanoor, Chennai and that has not formed the

basis for the award of any other degree, diploma, associateship,

fellowship or any other similar titles in this or any other institution of

higher learning.

Place : SalemDate : 10.03.2016 (Signature of the candidate)

Page 4: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

ACKNOWLEDGEMENTS

I would like to take the opportunity to thank God almighty who has been

showering his blessings on me bestowed strength, knowledge and courage all

these days.

I express my sincere gratitude to our founder of Vinayaka Missions

University, Dr.A.Shanmugasundaram and I am grateful to respectable

Madam Chairman Mrs.Annapoorani Shanmugasundaram for constant

support.

I have a great pleasure in expressing my deep sense of gratitude to my

highly spirited and learned research guide Dr.Dekson.D.E, Professor, CSE &

IT, Aarupadai Veedu Institute of Technology, Paiyanoor, Chennai for his

potential guidance and constant encouragement in completing this research work

successfully.

I am also thankful to Prof. Dr. K. Rajendran , Dean (Research) Vinayaka

Missions University, Salem for his valuable suggestion in completing this

research in time. I would thank the Management, Board and Committee

Members, Faculty and Staff of Vinayaka Missions University for helping me in

various ways possible.

I would like to show my great appreciation to my family and friends for

their continuous support during all these years.

Page 5: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

TABLE OF CONTENTS

CHAPTERNO. TITLE PAGE

NO.

LIST OF TABLES I

LIST OF FIGURES II

LIST OF ABBREVIATIONS VI

1. INTRODUCTION

1.1 Introduction to Computer Networks 1

1.2 Classification of Networks

1.2.1Bus Network

1.2.2Ring Network

1.2.3Star Network

1.2.4Mesh Network

2

3

4

5

1.3 Classification of Wireless Networks

1.3.1 Wireless Local Area Network (LAN) and

Personal Area Network (PAN)

1.3.2 Wide Area Network and Mobile Area

Network

7

8

1.4 Introduction to Mobile Adhoc Network 10

Page 6: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

1.5 Main Advantage of MANET 11

1.6 Applications of MANET 13

1.7 Issues in Mobile Adhoc Network 14

1.8 Routing in Mobile Adhoc Network

1.8.1 Routing Factors in MANET

16

18

1.9 Security Issues in MANET

1.9.1 Passive Attacks

1.9.2 Active Attacks

1.9.3 Packet Dropping

1.9.4 Black holes

1.9.5 Gray holes

1.9.6 Denial of Service (DoS)

1.9.7 Falsifying Route Error Messages

1.9.8 Route Cache Poisoning

1.9.9 Routing Table Overflow Attack

1.9.10 Other Advanced Attacks

20

25

27

28

28

28

30

31

32

32

33

1.10 Introduction to False Location Attacks 35

1.11 Approaches in Handling False Location Attacks 37

Page 7: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

1.12 Objective 38

2. LITERATURE SURVEY 41

3.

IMPLEMENTATION OF LIGHT WEIGHT LOCATION

VERIFICATION PROTOCOL BASED ON BEHAVIOR

LEARNING PROCESS FOR MOBILE ADHOC

NETWORKS

3.1 Introduction 65

3.2 Methods Explored 72

3.3 Light Weight Location Verification System

3.3.1 Registration

3.3.2 Behavior Collection

3.3.3 One step Location Verification

75

76

80

86

3.4 Conclusion 88

4.

SECURE DISCOVERY SCHEME AND MINIMUM

SPAN VERIFICATION OF NEIGHBOR LOCATIONS IN

MOBILE ADHOC NETWORKS

4.1 Introduction 89

Page 8: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

4.2 Methods Explored 93

4.3 Secure Discovery Scheme

4.3.1 Group Join

4.3.2 Neighbor Discovery Scheme

4.3.3 Location verification Process

99

103

107

4.4 Conclusion 108

5.

TWO HOP NEIGHBOR DISCOVERY BASED

LOCATION VERIFICATION PROTOCOL FOR

MOBILE ADHOC NETWORK USING NODE

DUPLICATION METHOD

5.1 Introduction 109

5.2 Methods Explored 112

5.3 Two Hop Neighbor Verification Approach

5.3.1 Two Hop Neighbor Discovery

5.3.2 Node Duplication Approach

5.3.3 Location Verification Protocol

5.3.4 Node Duplication Location Verified Routing

(NDLVR)

116

118

120

124

Page 9: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

5.4 Conclusion 128

6. RESULTS AND DISCUSSION

6.1 A Light Weight Location Verification Protocol based

on Behavior Learning Process for Mobile Adhoc

Networks

130

6.2 Secure Discovery Scheme and Minimum Span

Verification of Neighbor Locations in Mobile Adhoc

Networks

134

6.3 Two Hop Neighbor Discovery Based Location

Verification Protocol for Mobile Adhoc Network

Using Node Duplication Method

139

6.4 Conclusion 145

7. CONCLUSION AND FUTURE WORK 146

REFERENCES 148

LIST OF PUBLICATIONS 169

Page 10: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

I

LIST OF TABLES

TABLE NO. TITLE PAGE NO.

Table 1.1 List of routes between node 1 and node 19 18

Table 3.1 Login Message format 76

Table 3.2 Base Station Node Matrix 80

Table 4.1 Shows the Group join Message Format 99

Table 6.1 Details of Simulation Parameters 129

Page 11: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

II

LIST OF FIGURES

FIGURENO.

TITLE PAGE NO.

Figure 1.1 Simple network 2

Figure 1.2 Sample Bus Topology 3

Figure 1.3 Ring Topology 4

Figure 1.4 Star topology 5

Figure 1.5 Mesh topology 5

Figure 1.6 Wireless LAN 7

Figure 1.7 A Cellular network 9

Figure 1.8 A Mobile Adhoc network 10

Figure 1.9 Sample Mobile Adhoc Network 18

Figure 1.10 Security Threats 25

Figure 1.11 Example Scenario of False Location 36

Figure 3.1 Sample MANET Topology 66

Figure 3.2 Adversaries Fake Positions 70

Page 12: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

III

Figure 3.3 Registration Process with the Base Station 77

Figure 3.4 Flow Chart of Registration 78

Figure 3.5 Transmission of Behavior Message 82

Figure 3.6 Flow chart of Behavior Collection Process 85

Figure 3.7 Flow chart of One Step Verification 86

Figure 4.1 Shows the Example Scenario of the Fake

Location90

Figure 4.2 Architecture of One Step Verification Scheme 97

Figure 4.3 Proposed Addressing Scheme 98

Figure 4.4 Address Allocation Scenario 99

Figure 4.5 Flow Chart of Group Join 102

Figure 4.6 Flow Chart of Neighbor Discovery Scheme 106

Figure 5.1 Example of Two Hop Neighbor Verification 111

Figure 5.2Architecture of Two Hop Neighbor Discovery

Approach117

Figure 5.3Flow Chart of Two Hop Neighbor Discovery

Algorithm120

Figure 5.4 Flow Chart of Node Duplication Method 123

Page 13: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

IV

Figure 5.5Flow Chart of Node Duplication Location

Verification127

Figure 6.1Adversary Detection Accuracy between Existing

method and LLV130

Figure 6.2Latency Ratio Produced By Existing Method

and LLV131

Figure 6.3Displacement Allowed According to

Transmission Range131

Figure 6.4Traffic introduced by Existing SL, NPV and LLV

Methods132

Figure 6.5Security Performance Produced by Existing SL,

NPV and LLV Methods133

Figure 6.6Throughput Performance by Existing SL, NPV

and LLV Methods133

Figure 6.7Adversary Detection Accuracy produced by SL,

NPV, LLV and SDS134

Figure 6.8Network overhead introduced by SL, NPV, LLV

and SDS135

Figure 6.9Time Complexity introduced by SL, NPV, LLV

and SDS136

Figure 6.10Comparison of Latency Ratio Produced by SL,

NPV, LLV and SDS136

Figure 6.11Displacement Allowed by SL, NPV, LLV and

SDS according to Range137

Figure 6.12 Traffic introduced by SL, NPV, LLV and SDS 138

Page 14: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

V

Figure 6.13Security Performance Produced by SL, NPV,

LLV and SDS138

Figure 6.14Throughput Performance Produced by SL, NPV,

LLV and SDS139

Figure 6.15Adversary Detection Accuracy produced by SL,

NPV, LLV and NDLVR140

Figure 6.16Network overhead introduced by SL, NPV, LLV

and NDLVR141

Figure 6.17Time complexity introduced by SL, NPV, LLV

and NDLVR141

Figure 6.18Comparison of Latency Ratio introduced by SL,

NPV, LLV and NDLVR142

Figure 6.19Displacement Allowed by SL, NPV, LLV and

NDLVR according to Range143

Figure 6.20 Traffic introduced by SL, NPV, LLV and NDLVR 143

Figure 6.21Security Performance introduced by SL, NPV,

LLV and NDLVR144

Figure 6.21Throughput Performance introduced by SL,

NPV, LLV and NDLVR145

Page 15: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

VI

LIST OF ABBREVIATIONS

WANET Wireless Adhoc network

MANET Mobile Adhoc Network

VANET Vehicular Adhoc network

TCP Transmission Control Protocol

UDP Unified Datagram Protocol

AODV Ad-Hoc On-Demand Distance Vector

DSR Dynamic Source Routing

LBS Location Based Service

LLV Light Weight Location Verification Protocol

SDS Secure Discovery Scheme

NDLVR Neighbor Discovery Based Location VerificationProtocol

Page 16: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

1

CHAPTER – 1

INTRODUCTION

The growth of information technology introduced various

developments in the mode of communication, where the communication

meant to share information between any two entities. This chapter presents

a detailed introduction to various communication methods and discusses

how the communication has been performed between two entities.

1.1 Introduction to Computer Networks

A computer network is the collection of computing devices

interconnected through some form of communication medium. The

communication medium helps the communicating devices to communicate

between them. The network formed by different computing devices

grouped in a different manner to enable communication between them. To

perform communication, the computing device uses various communication

protocols according to their communication medium. Using the protocol, the

source node sends the data in the form of packets towards the destination

node [B2].

The Figure 1.1 shows the simple network of nodes connected. The

kind of communication medium may be wired or wireless.

Page 17: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

2

Figure 1.1 Simple network

In the case of wired medium, the used protocol will be Transmission

Control Protocol (TCP), whereas for the wireless connection Unified

Datagram Protocol (UDP) is used. There can be N number of nodes

present in the network and there is no limit to the number of nodes to be

present in any network. The connection and their placement of the

computing devices make different meanings. So based on their type of

placement and connection they can be classified into many cases.

1.2 Classification of Networks

The computer networks can be classified according to their topology

and connections [17,48,49]. Based on their topology they can be classified

as follows:

1.2.1 Bus Network

The bus network connects the computing devices in a serial manner.

The nodes are placed in a serial manner and each node in the network is

Source Destination

Wired Connection

Wireless Connection

Page 18: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

3

connected with its neighboring two nodes. They generate a view like a bus.

The data sent from one node have to traverse through a number of

intermediate nodestobe delivered to the destination node. If any one of the

computing devices failed then the entire network would fail.

Figure 1.2 Sample Bus Topology

The Figure 1.2 shows the sample bus topology and shows the way

how the nodes are connected to form the bus topology.

1.2.2 Ring Network

In ring topology the nodes are connected to form the network which

represents a close circuit or a ring. In this topology each node has a

connection with two neighbors on each side. The data sent from the source

node has to traverse through the intermediate nodes in between the source

and destination. The protocol chooses the shortest route based on the

number of nodes between the source and destination.

N1 N2 N3 N4

Page 19: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

4

Node

Node

Node

Node Node

Node

Figure 1.3 Ring Topology

1.2.3 Star Network

The star topology represents the look of a star which has leafs

connected to a center point. In this kind of topology all the nodes in the

network have connected to the central hub. Whatever the packets being

sent from the source node will pass through the central hub. The packets

received at the central hub will be delivered to the destination node.

The figure1.4 shows the network of nodes which are connected in a

star topology. Here the nodes are connected to the central hub and the

lifetime of the network is only up to the time of the central hub, if the central

hub fails then the whole network will get spoil and could not perform any

transformations.

Page 20: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

5

Figure 1.4 Star topology

1.2.4 Mesh Network

A mesh network is the form of nodes which are connected to each

other. Whereas in other networks, it is not necessary that other nodes

should be connected to that directly. In this kind of net all the nodes are

connected to form a network and a single node has N number of

connection and each node has more than one outgoing connection in the

network.

Figure 1.5 Mesh topology

Node

Node

Node

Node

Node

Node

Node

Node

Node

Node Node

Node

Page 21: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

6

Figure 1.5 shows the sample mesh topology, where each node in the

network has more than one connection to different neighbor nodes.

Further the network can be classified based on the topology and their

MAC address. We can classify the network according to communication

and topological behavior.

1. Wired network

2. Wireless network

3. Mobile network

4. Wireless ADHOC network (MANET)

5. Mobile ADHOC network.(MANET)

6. Vehicular ADHOC network(VANET)

1.3 Classification of Wireless Networks

Generally wireless network consists of few or more mobile nodes which

could communicate with other nodes either directly or through an access

point called base station [17, B2]. We can classify the wireless network as

follows:

Page 22: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

7

1.3.1 Wireless Local Area Network (LAN) and Personal Area Network

(PAN)

A Wireless Local Area Network has the scenario of mobile nodes and

immovable base station, where both of them communicate through a base

station.

Figure 1.6 Wireless LAN

The personal area network has no constraint in communication and

can use any protocol to communicate with them. A usual architecture for

such joint distributed sensors is a system with wireless links so as to can

be shaped among the sensors in an ad hoc way. Networking unattended

Page 23: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

8

sensor nodes are predictable to have an important impact on the

competence of a lot of militaries and social application such as battle field

observation, security and disaster organization. These system process data

gather from manifold sensors to watch events in an area of concentration.

For example, in a catastrophe administration setup, a large integer of

sensors can be drop by a helicopter. Networking these sensors can aid

rescue operation by locating survivors, identifying dangerous areas in

addition to manufacturing the set free crew more aware of the on the whole

location.

1.3.2 Wide Area Network and Mobile Area Network

The growth of the mobile technology and wireless communication

makes feasible for the user to access any network without the presence of

any fixed components or base stations. The MANET is running over cellular

structural design where large neighborhood to be enclosed into different

groups but shares the same base station. All the devices present in the

network communicate through the base station.

Figure 1.7 shows the collection of nodes connected in a Cellular

Network.

Page 24: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

9

Figure 1.7 A Cellular Network

The communication between nodes in dissimilar cells is approved on

through a modus operandi called handoffs which involve communication

between the pedestal stations in the two different cells. There is a regular

growth in the cellular networks as they grow from the first generation to

third generation 3G. The most wireless streams use 2g systems. The

growth of mobile technology has forced the wireless medium to shift from

2G to 3G , because peoples use the internet for everything to watch a

movie , play games, video conferencing and etc. The 3G network makes

Page 25: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

10

the transfer of data as faster one which is important in video conferencing

and other applications.

1.4 Introduction to Mobile Adhoc Network

The mobile ad-hoc network is a collection of wireless nodes which

has mobility behavior. The nodes of MANET are moving in a different

direction with different speed. The mobility of the nodes makes the topology

be changing in a dynamic manner. Each node in the network has a radio

with fixed transmission range. By using the radio available, the node can

communicate with the nodes within the transmission range. Similarly the

nodes come with fixed power and the node spends a certain amount of

energy to communicate with the neighboring nodes [18, B1].

Fig 1.8 A Mobile ad hoc network

Page 26: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

11

Each node in the MANET behaves like a router, which performs the

path finding the procedure to transfer the data packets where it is not

possible in another form of wireless networks. A set of wireless nodes

forms the sensor network which consists of quite a few sensors deploy

without any fixed communications. The dissimilarity between antenna

network and in normal MANET the non-mobile station also moves. Further,

the numeral of nodes is a large amount higher than in commonplace ad

hoc network. The nodes encompass more rigorous power necessities since

they work in harsh ecological conditions. A case of a sensor system is also

a group of wireless nodes which monitors the boiler temperature of a

thermal plant. Other claim domains include armed, homeland refuge and

medical mind.

1.5 Main advantage of MANET

Here using movable nodes on the network, the reason for the

popularity of these networks will be discussed.

(a)Lower deployment costs: These types of networks could be formed

at any time anywhere without any physical communication medium

like wires and cables.

Page 27: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

12

(b)Fast deployment: It compared to WLANs, are very measure and

easy to require less physical intrusion since here are no cables fixed

up on the network.

(c)Dynamic Configuration: Ad hoc set of connections arrangement

can change energetically with the occasion. For the lot of scenarios

such seeing that information distribution in classrooms, etc.

(d)Autonomous Terminal: In MANET, each mobile workstation is an

autonomous node, which might act as both a host and a router.

(e)Distributed operation: The nodes involved in a MANET must work

together amongst themselves, and each node acts as a depend on

as needed, to execute roles for example security and routing.

(f) Multi-hop Routing: Fundamental type of Ad-hoc direction finding

algorithms can be Single-hop and Multi- hop, based on different link

layer individuality and direction finding protocols. When distribution

data packets from a sender to its receiver out of the direct wireless

transmission range, the packets ought to be forward through one or

more intermediary nodes.

Page 28: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

13

1.6 Applications of MANET

These types of networks (ADHOC) have a different challenging and

interesting areas where it can be applied in different ranges like from class

rooms to war fields [72].

(a)Battlefield: In a war field the strength of the defense will be added in

the form of ADHOC network, where the nodes which are capable of

sense and transmit will be deployed easily without any time. The

sense and transmit behavior of ADHOC node help to pass messages

from one troop to another to get help and to pass control messages

or to pass information about the status of the force accordingly.

(b)Rescue Operation: Whenever there is a fire accident then there is a

necessary for the ambulance and fire service people which have to

be avail in a short time. At these situations the wireless network can

be deployed in a short time frame which enables the communication

between the rescue peoples.

(c) Event Coverage: This property helps the data sharing between

similar requirements, for example in a press conference the same

data can be shared between different reporters through wireless

devices like laptops.

Page 29: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

14

(d)Classroom: The instructor can make an ADHOC network to share

the data between students through laptops.

1.7 Issues in Mobile Adhoc Network

In a transportable ad hoc system, all the nodes help amongst each

additional two ahead the packets in the system and hence, every node is

efficiently a router. Therefore routing becomes the dominant issue which

arises in mobile ADHOC networks. These theses focus mainly on direction-

finding problems of ADHOC network [72]. We discuss other problems

which present in MANET here.

(a) Distributed network: A MANET could be gauged as a collection of

mobile nodes distributed without any fixed communication. The

distributed nature of network makes the absence of dedicated server

to co-ordinate other nodes and the information about them.

(b) Changing topology: The mobility nature of nodes makes the

topology of the network as changing one at all the time. This mobility

nature increases the necessary of adaptive routing protocol which

helps to deliver the packets on time with reduced packet loss and

increased efficiency.

Page 30: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

15

(c) Power Factor: The mobile nodes are running with bounded battery

charge and the scarcity of power is huge which moving from the far

location towards a destination. The lifetime of the mobile nodes

depends on the battery power and has to be utilized in an efficient

way. The mobile nodes are participating in forwarding data packets

to other nodes also, in such cases the routing protocol should be a

power efficient one.

(d) Addressing scheme: The system topology keeps varying

enthusiastically and hence the addressing scheme used is quite

noteworthy. A dynamic set of relations topology entails an ever-

present addressing system, which avoids any duplicate address.

Mobile IP is currently life form used in a cellular network where a

base station handles each and every one the node address.

However, such a system doesn’t relate to ADHOC network because

of their decentralized nature.

(e) Network size: The delay present in communication protocol which

depends on the network size spoils the usage of ADHOC network in

commercial applications like conferences.

Page 31: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

16

(f) Security: The security in mobile ADHOC network is a key issue for

the data transfer due to the un trusted nodes which are moving

around the network but participates in packet transfer and

forwarding.

1.8 Routing in Mobile Adhoc Network

As the nodes of mobile adhoc network moves across the network, the

topology changes in dynamic manner. To forward a data packet from

source node to the destination node, they use the source routing [5]. The

source node discovers the list of routes available in the network and from

discovered route, the node selects a single route based on certain

constraints. The packet has been forwarded through the selected route.

The intermediate nodes presents in the route also performs the same to

deliver the packet to the destination. Also the nodes involve in cooperative

transmission to deliver the packet to the destination. The routing process

has the following stages namely:

Neighbor Discovery

The neighbor discovery is the process of identifying the neighbors

around any node. Initially each node sends the neighbor discovery request.

The request will be received by the nodes which are located within the

Page 32: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

17

transmission range. Upon receiving the request, the neighbor nodes within

the range will reply to the request. Based on collected reply, the source

node adds the neighbor details. The neighbors are the first hop and one

among them will be selected to forward the data packet towards the

destination [59,60,65,69].

Route discovery

The route discovery is the process of identifying the list of routes

between the source and destination. The source node would generate a

route request and forward to its neighbors. The same packet will be

forwarded to all the nodes of the network. The nodes which have the route

will generate a reply otherwise that also forward the packet to its neighbors.

By collecting the route reply from the neighbors the source node will get

route information. From available routes, the source node will select a

single route to forward the data packet [72].

Packet Forwarding

Once an optimal route has been identified then the node forward the

data packet to its neighbor which will in turn performs the route selection to

forward the data packet to its destination. Similarly the data packet will be

forwarded to the intermediate nodes and reaches the destination.

Page 33: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

18

Figure 1.9 Sample Mobile Adhoc Network

The Figure 1.9 shows the sample mobile ad-hoc network considered

and each node has a connection to their neighbor nodes. The node has a

connection to its neighbor only if it is located within the transmission range.

1-4-7-11-14-17-19 1-4-7-11-15-17-19 1-2-6-10-13-17-19

1-5-7-11-14-17-19 1-5-7-11-15-17-19 1-2-3-9-12-16-19

1-4-7-11-14-18-19 1-4-7-11-15-18-19 1-4-6-10-13-17-19

1-5-7-11-14-18-19 1-5-7-11-15-18-19

1-5-8-11-14-17-19 1-5-8-11-15-17-19

1-5-8-11-14-18-19 1-5-8-11-15-18-19

Table 1.1 List of routes between node 1 and node 19

2

4

6

1

5

7

3

9

10

11

12

13

8

14

15

16

17

18

19

Page 34: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

19

Table 1.1 shows the list of nodes available in the topology, between

the nodes 1 and 19. Similarly, there may be a N+1 number of routes

present in between any two nodes of the network. From the routes

presented in Table 1.1, the routes between the node 1 and node 19 have a

number of hops.

According to the Table 1.1, the source node selects an optimal route

to reach the destination. The packet will be forwarded in the selected route

and the intermediate node performs the same operation to deliver the

packet to the destination.

1.8.1 Routing Factors in MANET

There are many routing protocols has been available to improve the

performance of mobile ad-hoc networks. However each protocol uses

different approaches and factors in selecting a route[48,72]

Node Energy

The energy is the most dominating parameter which affects the

lifetime of the network. The route selection has been performed by

considering the energy of nodes located in the transmission path. The

energy efficient routing protocols consider the node energy and their

depletion ratio to perform route selection.

Page 35: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

20

Location

The location of mobile node has more influence in the data

forwarding and routing. The location of the nodes are changing at each

fraction and in order to select a node for data forwarding, the node has to

perform the route selection based on node location.

Mobility Speed

The mobility speed of the node is the most important factor in MANET

routing. The route selection algorithm must consider the mobility speed of

the nodes before selecting the node.

1.9 Security Issues in MANET

There is very limited corporeal security in MANET. Two types of

attack can be an Active attack or Passive attacks [76]. The common

sanctuary issues are Passive attacks that include eavesdrop and in

sequence revelation. Active attacks include are refutation of service, Data

change by viruses, Trojans, and worms. There are other un-mistakable

problems with mobile ad hoc network such as the susceptibility of channel

and nodes, complex black hole, Byzantine, and Wormhole attack

occurrence [97].

Page 36: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

21

The safety issue also contains occurrences that may inject flawed

routing information and divert network traffic thus manufactures routing

inefficient. There are many methods to reduce the impact of these attacks,

which include a secure direction finding using public and private keys to get

a documentation authority and use of digital signature and prior trust

associations.

Secure informal network routing protocols are difficult to design, due

to these normally extremely dynamic nature of an ad hoc network and

opposite to the need to operate successfully with too little income, counting

network bandwidth and the CPU dispensation capacity, memory, and

battery power of each entity node in the network.Existing self-doubting ad-

hoc network routing protocol are frequently tremendously optimized to

extend new routing in sequence rapidly as situation change, requiring

quicker and repeatedly more common routing protocol boundary between

nodes than is thespokesperson in a traditional network.

Expensive and difficult security mechanism can delay or thwart such

associations of routing in sequence, foremost to shortened routing

efficiency, and may drink unnecessary complex or node resources, leading

to amuch new opportunity for feasible Denial of Service attacks from end to

end the routing protocols.

Page 37: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

22

Security Issues

Security in MANET is a most important issue as to provide secure

communication between the nodes in the infrastructure less setting [24,B1].

Availability

Accessibility means the assets are accessible to certified parties at

appropriate times. Accessibility applies both to data and to services.

Confidentiality

In sequence, access is possible only for the authorized node. (i.e.,)

discretion will be maintained in access messages by the way of provided

that privileges to authorized nodes.

Integrity

Veracity means that assets can be modified only by authorized

parties or only in the unauthorized way. The modification includes writing,

altering status, deleting and creating.

Authentication

Substantiation is essentially an assurance that participants in

communication are authentic and not impersonators. Authenticity is

Page 38: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

23

ensured because only the rightful sender can produce a message that will

decrypt properly with the shared key.

Non-repudiation

Non-repudiation ensures that sender and recipient of a message

cannot disown that they have ever sent or established such a

message.This is helpful when we need to distinguish if a node with some

undesired function is compromised or not.

Anonymity

Anonymity means all in a sequence that can be used to classify

owner or current user of the node should non-attendance be kept private

and not be disseminated by node itself or the system software.

Authorization

This property assigns dissimilar access civil rights to different types of

users. For example, thenetwork administrator can perform a complex

management only.

Security Attack

An accessible routing protocol is in ad hoc networks a lot of security

attacks [43]. The attacks can be classified in different ways. One way is to

Page 39: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

24

divide attacks into four categories according to where the attacker deploys

the attack in the flow of in sequence from a source to a target shown in

Figure 1.3.

Interruption

An advantage of the system is demolished or become unavailable or

not viable. This is an attack on availability. Examples include noiselessly

discarding manage or data packets.

Interception

An isnot permitted node gains access to an asset of the network. This

is an attack on confidentiality. Examples include eavesdrop control or data

packets in the networks.

Modification

Unconstitutional nodes not only gains access to but also tamper with

an asset. This is an attack on truthfulness. Examples include modifying

control or data packets.

Fabrication

Thisisnot permitted node inserts bogus objects into the organization.

This is an attack on validity. Examples include inserting false direction

Page 40: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

25

finding messages into the network or impersonate another node. These

attacks can be classified into two major categories, namely passive attacks

and active attacks.Figure1.10 shows the list of security threats affected by

the network nodes.

Figure 1.10 Security Threats

1.9.1 Passive Attacks

An attack an assailant does not actively contribute to bringing the

network down. The attackers typically involved in not permitted listen to

routing packets. An aggressor just eavesdrops on the network traffic as to

determine which nodes are trying to establish routes to which other nodes,

InformationSource

Informationdestination

Normal Flow

Interruption

Interception

Modification Fabricationn

Page 41: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

26

which nodes are the center of the system and so on. A major advantage for

the aggressor is that passive attacks are usually impracticable to detect

and hence makes defensive against such attacks tremendously difficult.

Further, direction finding information can reveal dealings between nodes or

divulge their speeches. If a way to a particular node is appeal more often

than to other nodes, the attacker might expect that the node is important for

the functioning of the network, and disable it could bring the complete

network down. Such attacks can be prevented mostly by applying the

cryptoFigureic technique on messages, to protect the message contents

from being open to the elements to the attacker [24,43,B1]. Three types of

passive attacks are Free of message filling, Traffic analysis, and Message

dropping.

The release of message contents: The hateful node may leak hush-hush

in sequence to illegal users in the network, such as routing or location in

the sequence. We would like to prevent the enemy from learning the

contents of the sensitive data.

The traffic analysis: Suppose that we use encryption to mask the contents

of mail, the enemies might still be able to observe the outline of the mail

and determine the place and uniqueness of communication hosts.

Page 42: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

27

The message is dropping: To discard the message carried on by an

intermediate host.

It is hard to differentiate passive attacks in ad hoc networks since

passive attacks do not involve any modification of contents of the mail.

Message loss can occur because of a topology change or undependable

wireless media. However, it is practicable to prevent the success of these

attacks. Thus, the importance of dealing with passive attacks should be put

more on deterrence rather than detection.

1.9.2 Active Attacks

An active attack involves in sequence intermission, adjustment of the

message contents, or formation of the false message, there by trouble to

make the normal functionality of ad hoc networks. Further, active attacks

can be due to an outside attacker(s) and an interior attacker(s). Outside

attackers are illegal nodes without a shared cryptography key in the

network. Inner attackers are authorized but compromised nodes and are

more dangerous and hard to detect as they are in the system and own the

necessary cryptography keys [24,43,B1]. Active attacks can be classified

into Packet dropping, Modification, Production, and other Assorted attacks.

Page 43: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

28

1.9.3 Packet Dropping

Malevolent nodes may ensure that certain messages are not

transmitted by simply forwarding few packets and dipping the remaining

one. By dipping packets, an attacker succeeds in troublemaking the

network process. Such naughtiness can be hard to detect as valid nodes

may, from time to time, drop packets due to jamming/collision. Depending

on the strategy of plummeting packets, there are two types of attacks.

1.9.4 Black holes

The attacker injects threadbare steering packets to attract traffic [84].

The attacker intercepts or drops control as well as a data packet to deny

services to genuine nodes. This attack can be prohibited by establishing

routes free of such nodes or by removing them from existing routes.

1.9.5 Gray holes

The assailant drops data packet but not control packets. This attack

is not easy to detect. An immoral mode action within the routing etiquette is

required to detect such an attack [76].

Page 44: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

29

Modification

Most routing protocols guess that nodes do not alter fields of the

protocol messages. The protocol messages, or organizes packets, carry

significant routing information that governs the behavior of their

transmission. Since the level of trust in a conventional ad-hoc network

cannot be calculated or enforced, hateful nodes may partake directly in the

route discovery and may intercept and disrupt communiqué. They can

easily cause redirection of network traffic and rejection of service attack by

simply altering field in protocol messages.

Masquerade

A deception takes place when one node pretends to be a different

node. It is usually, joint with other lively attacks by the adversary to deploy

safety attacks. For example, a malicious node may take off another node

while transfer the control packets to create an unwelcome update in the

routing table.

Replay

It involves the passive detail of a valid message and retransmission

to create a not permitted effect.

Page 45: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

30

Modification of message

That is some part of an innovative communication has altered, or that

note has delayed, reordered to produce an illegal effect.

Modification route sequence number

A spiteful node uses the steering protocol to advertise itself as having

the shortest path to end whose packets it wants to catch. Typically, routing

protocol maintains routes using monotonically growing sequence numbers

for each end. A hateful node may divert traffic from end to end itself by

promotion a route to a node with a destination progression number greater

than the bona fide value.

Modification hop count

In some protocols such as AODV, the route length is representing in

the message by a hop count field. A malevolent node can succeed in

diverting all the traffic to a particular purpose through itself by publicity the

shortest route (with a very low hop count) to that destination.

1.9.6 Denial of Service (DoS)

Prevents the regular use of communication facilities. In ad hoc

system direction finding, DoS attacks can be classified into two categories

Page 46: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

31

(i) DoS attack on routing traffic and (ii) DoS attack on data traffic. An

attacker can launch DoS attacks against a network by disseminating false

direction finding information so that recognized routes for data traffic

transmission are invalid [26,77]. For example, an aggressor can create a

routing loop, causing packets to travel nodes in a cycle without

accomplishment their destination, or divide the network by injecting

malicious routing packets to stop one set of nodes from attainment others.

An attacker container also presentation DoS occurrences on data

transfer by ejecting an important amount of data traffic into the network to

clog the network. Both of these two types of attacks strength are used to

consume valuable network income such as bandwidth, or to consume node

resources such as memory or totaling power, manufacture of messages

means false direction finding messages. Such attacks are difficult to detect.

These types of attacks are listing below.

1.9.7 Falsifying route error messages

AODV and DSR have measures to switch broken routes when

element nodes move or fail. If the purpose node or an in-between node

along an active path moves or fail, the node, which precedes the broken

link, broadcast a route error communication to all active neighbors’ which

Page 47: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

32

precede the out of order link. The nodes then invalidate the route for this

destination in their routing tables. A malicious node can succeed in the

introduction a refutation of repair attack against a caring node by

distribution false route error correspondence alongside this benign node

[26,77].

1.9.8 Route cache poisoning

In DSR, a swelling can learn direction findingsequence by overhead

broadcast on routes of which it is not a part. The lumps then add this in

series to its hoard. An attacker can easily develop this technique of

teaching and fatal route caches. If a hateful node, M, needs to launch a

denial of service attack on node X, it can simply transmit a spoofed packet

with source route to X via itself. Any neighboring nodes that eaves-drop the

package show may add the route to their route store.

1.9.9 Routing table overflow attack

A malevolent node may attempt to overcome the protocol by initiate

route discovery to missing nodes. The logic behind this is to create so

many routes that no additional routes could be created as the direction

finding tables of nodes are already overflowing.

Page 48: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

33

1.9.10 Other Advanced Attacks

Wormhole attacks

In a wormhole attack [25,27], two attacker nodes collide jointly. One

attacker node receives packets at one point and “tunnels" them to another

attacker node via a confidential network association, and then replay them

into the system. The wormhole sets the enemy nodes popular a very

authoritative position compared to other nodes in the complex. For instance

in reactive (on-demand) routing protocols such as AODV or DSR, the

attackers can tunnel each route request RREQ packets to another

assailant that is near to destination node of the RREQ. When the

neighbors’ of the destination hear this RREQ, they will rebroadcast this

RREQ and then discard all other received RREQs in the same route

detection process.

This type of attack prevents other routes as an alternative of the

wormhole from being naked, and thus creates an enduring Denial-of-

Service attack by plummeting all the data, or selectively removal or

modifies certain packets as needed. The wormhole attack is very

hazardous against ad hoc networking routing protocol and is harder to

detect than other attacks since there is complicity between attackers. This

Page 49: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

34

kind of attack does not require the attacker to have any information on

cryptography keys. Using packet leashes can prevent these attacks.

Sybil attack

In the Sybil attack, an opponent presents manifold identity to other

nodes in the network. This attack disrupts routing protocol by causing

nodes to appear to be “in more than one place at once" [43]. This reduces

the diversity of routes available in the network. It also diminishes the

efficiency of fault tolerant schemes such as disseminated storage, disparity,

multi-path routing, and topology maintenance, etc.

Position spoofing attacks

Apart from the usual attacks on direction-finding protocols, position

based protocol faces a new attack, viz., the position spoofing attack. In the

position spoofing attack, a malicious node aims to disrupt the normal

functioning of greedy forwarding by fabricating its position in sequence in

favor of itself. A self-centered node may declare a selected position (e.g.,

away from the destinations’ position) to stay away from forwarding data

packets [43].

Page 50: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

35

Byzantine attack

A compromised in between node works alone, or a set of

compromise middle nodes works in collusion and carry out attacks such as

creating routing loops, forwarding packets from side to side non-optimal

paths, or selectively dropping packets, which results in commotion or

degradation of the direction-finding services [43].

Rushing attack

Two colluded attackers use the tunnel process to form a wormhole. If

a fast program path (e.g. a dedicated channel shared by attackers) exists

between the two ends of the wormhole, the tunnel packets can broadcast

faster than those through a normal multi-hop route can. This forms the

rushing attack. The stepping up attack can act as an effective denial of

service [43].

1.10 Introduction to False Location Attacks

Other than the attacks discussed earlier, the nodes of mobile ad-hoc

network involve in another kind of attack called false location attacks.

Whenever the routing protocol performs route selection based on the

location of mobile nodes, there is the higher feasibility of performing

location specific attacks. To perform route selection, the source node

Page 51: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

36

discovers the nodes and their locations. When a malicious node is there in

the network, the node tries to participate in routing. The source node sends

a neighbor request to discover the neighbors around it.

The malicious node may be located somewhere in the network and

has higher transmission range to receive the packets from all the nodes. By

receiving the request, it will generate the reply with the false location so

that the source node would come to the conclusion that the malicious node

is the best first hop. By identifying the malicious node as the best first hop

to transfer the data packet, the source node will transfer the packet to the

malicious node. By diverting the data towards the malicious node, it can

perform many attacks including modification, eaves dropping and so on.

Figure 1.11 Example scenario of false location

2

4

6

1

5

7

3

9

10

11

12

13

8

14

15

16

17

18

19

6

6

6

6

6

6

6

6

Page 52: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

37

The Figure 1.11 shows the example scenario of false location attack

where the Node 6, specifies the false location to the node 1 and to the rest

of the nodes also. In the Figure 1.11 the Node 6, replies to all the nodes

that it is the first neighbor and has a route to reach the destination. By

specifying the false location, the malicious node diverts the entire traffic

through the malicious node and involves in different attacks.

1.11 Approaches in Handling False Location Attacks

The false location attacks can be handled by various approaches.

The source node collects the location information of the neighbor nodes.

Neighbor Verification

The nodes location has been verified by communicating with the

other neighbors. The node identifies the location of particular node by

communicating with the other node for the presence in their neighbor list.

Each node maintains the list of neighbor nodes and a node comes in the

list only when it is located within the transmission range. The source node

gathers the list of neighbors from each neighbor and from the list the

source node verifies the trustworthy of the concerned node. In this case,

when a malicious node present in the neighbor list of a different node or all

Page 53: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

38

the nodes neighbor list, it can be concluded that it has given fake

information. By verifying this way the malformed location can be identified.

Base Station through Verification

Each base station maintains a list of nodes which enters into its

coverage range. Also the station may maintain the direction, speed. So that

the source node may send a single request to the base station to verify the

node detail and the base station performs an approximation based on the

location details. Based on the results the location of the node could be

verified.

Still there are a number of approaches can be used to verify the

location of the neighbor nodes in such a way to improve the security of

mobile ad-hoc networks. The thesis is focused on improving the mobile ad-

hoc network security by designing different location verification protocols.

1.12 Objective

1. To perform the rate controlling and scheduling in an effective manner to

improve the performance of the Mobile Adhoc Network.

2. To select the forwarding node based on geometric details of nodes and

spatial information including the location of the node.

Page 54: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

39

3. To perform location verification that minimizes the network overhead,

latency or time complexity of the network

4. To design an efficient location verification protocol that increases

throughput rate by removing the frequency of attacks.

5. To design the location verification protocol that has to reduce the

sinkhole attack.

.

Page 55: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

40

CHAPTER-2

LITERATURE SURVEY

This section presents the detailed review of the methods

discussed earlier for the problem of network threats and secure neighbor

discovery approaches. A number of methods has been discussed for the

problem of neighbor discovery and this section discusses the general

approaches for handling threats.

The aims of Ad hoc networks and particularly MANET have in recent

years not only seen widespread use in commercial and domestic

application areas but have also become the focus of intensive research.

Applications of MANET’s range from simple wireless home and office

networking to sensor networks and similarly constrained tactical network

environments. Security aspects play an important role in almost all of

these application scenarios gave the vulnerabilities inherent in wireless ad

hoc networking from the very fact that radio communication takes place

(e.g. in tactical applications) to routing, man-in-the-middle and elaborate

data injection attacks.

An ad hoc routing protocol is a convention, or standard, that controls

how nodes decide which way to route packets between computing devices

Page 56: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

41

in a mobile ad-hoc system. In ad hoc nets, nodes do not jump out

acquainted with the topology of their networks; in its place, they have to

determine it. The straightforward impression is that a novel node may

proclaim its occurrence and should listen for statements broadcast by its

neighbors.Each node acquires about nodes close and how to spread them,

and may broadcast that it, too, can spread them. Note that in a wider

sense, the ad-hoc protocol can also be used literally, that is, to mean an

improvised and often impromptu protocol established for a specific

purpose.

J. P. Anderson(1972) proposed Computer Security Technology Planning

Study. The author pointed out the computer Intrusion Detection (ID)

problem in 1972. Then he proposed the concept of IDS in 1980 [2] which

was one of the earliest works on ID.

D. E. Denning(1987) proposed an intrusion-detection model. The author

describes a model for a real-time intrusion-detection expert system that

aims to detect a wide range of security violations ranging from attempted

break-ins by outsiders to system penetrations and abuses by insiders. The

perfect is autonomous of any precise system, request situation, system

Page 57: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

42

susceptibility, or type of interruption, thereby as long as anoutline for a

general-purpose intrusion-detection skillful system.

L. T. Heberlein, et.al(1990) proposed a network security monitor. The

objective of the study was to formalize various possible network attacks.

The straightforward plan is to develop profiles of usage of network

possessions and then associate current usage patterns with the past profile

to determine possible security defilements. Thus, the work is comparable to

the host-based intrusion-detection systems. Different from such

organizations, however, is the use of a graded model to refine the

concentration of the intrusion-detection mechanism. The authors also

report on the expansion of an experimental LAN monitor currently under

implementation.

J. Kim, et.al(1999) proposed the artificial immune model for network

intrusion detection. This paper investigated the existing network-based

IDS’s. And also describes the novel artificial immune model. This model

combines the three evolutionary stages: gene library evolution, negative

selection and clonal selection into a single methodology. These three

Page 58: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

43

processes are co-ordinated across a network to satisfy the three goals for

designing effective IDS's: being distributed, self-organising and lightweight.

L. N. De Castro, et.al(2000) suggested the clonal selection algorithm with

engineering applications. The clonal selection mechanism is used by the

natural immune system to define the basic features of an immune response

to an antigenic stimulus. The algorithm was verified to be capable of

performing learning and maintenance of high-quality memory and, it was

also capable of solving complex problems, like multi-modal and

combinatorial optimization. The algorithm introduced constitutes a crude

version of the clonal selection principle.

J. Kim(2001) proposed towards an artificial immune system for network

intrusion detection: an investigation of clonal selection with a negative

selection operator. The aim of the paper was to describe research towards

the use of an artificial immune system (AIS) for network intrusion detection.

The author focused on one significant component of a complete AIS, static

clonal selection with a negative selection operator, describing this system

in detail. Kim and Bentley used a static CSA with NS operator as one

component of the AIS for Network ID (NID).

Page 59: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

44

Dipankar Dasgupta, et.al(2002) proposed an immunity-based technique

to characterize intrusions in computer networks. The author investigated

an immuno-computing technique to evolve novel pattern detectors in the

complement pattern space to identify any changes in the normal behavior

of monitored behavior patterns. This technique (NC) is used to characterize

and identify different intrusive activities by monitoring network traffic, and

compared with another approach.

D. Dasgupta, et.al(2002) proposed anomaly detection in multidimensional

data using negative selection algorithm. The objective of the study was to

improve the performance. By changing the encoding from binary to Gray

code, the performance can be improved. The aim is that systematizations

of two consecutive statistics have small Pretense distance. And this

method still goes to the binary encoding.

Mirkovic.J, et.al(2002) proposed attacking DDoS at the source. The

author proposed D-WARD, a DDoS protection scheme organized at

source-end networks that separately notices and stops occurrences

creating from these networks. Attacks are noticed by the continuous

intensive care of two-way traffic flows between the network and the rest of

Page 60: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

45

the Internet and episodic comparison with standard flow models.

Mismatching movements are rate-limited in anamount to their violence.

Dean. D, et.al(2002) proposed an algebraic approach to IP trace back.

They have presented a new algebraic approach to providing trace back

information in IP packets. This approach is based on mathematical

techniques that were first developed for problems related to error-correcting

codes and machine learning. The scheme has improved robustness over

previous combinatorial approaches, both for noise limitation and multiple-

path reconstruction. An- another key advantage of this schemes is that they

will automatically benefit from any improvement in the underlying

mathematical techniques.

U. Aickelin, et.al(2003) proposed the Danger theory: the link between AIS

and IDS. The aim was to solve the classical self- non self view point in

Artificial Immune Systems based Intrusion Detection System, and replace it

with ideas from the Danger Theory. This mechanism has the advantage of

detecting rapidly spreading viruses or canning intrusions at an early stage.

Page 61: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

46

Feinstein. L, et.al(2003) proposed Statistical approaches to DDoS attack

detection and response. The initial goal was to provide an effective defense

against existing DDoS tools. This prototype detector is able to determine

that the network is under attack and deploy accurate filtering rules. The

filtering effort is immediate and reduces the impact of the attack

downstream almost instantly. Because baseline measurements and

thresholds can be established automatically, and because detectors can

generate filtering rules automatically based on the traffic statistics they

gather, the system is adaptable to a wide range of network environments

with minimal manual tuning.

Weichao Wang, et.al(2004) proposed Visualization of wormholes in

sensor networks. The author proposed a mechanism, MDS-VOW, to detect

wormholes in a sensor network. MDS-VOW first reconstructs the layout of

the sensors using multidimensional climbing. To compensate the

misrepresentations caused by distance dimension errors, a surface

flattening scheme is adopted. MDS-VOW then detects the wormhole by

imagining the anomalies presented by the attack. The irregularities, which

are produced by the fake influences through the wormhole, bend the

recreated surface to pull the instruments that are faraway to each other.

Page 62: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

47

The charities of MDS-VOW are:(1) it does not necessitate the sensors to

be fortified with special hardware, (2) it adopts and syndicates the

techniques from communal science, processer graphics, and scientific

visualization to bout the problematic in network security.

Christos.D, et.al(2004) proposed DDoS attacks and defense mechanisms:

classification and state-of-the-art. This paper presents a structural

approach to the DDoS problem by developing a classification of DDoS

attacks and DDoS defense mechanisms. The important features of each

attack and defense system category are described and advantages and

disadvantages of each proposed scheme are outlined. The goal of the

paper is to place some order into the existing attack and defense

mechanisms, so that a better understanding of DDoS assaults can remain

achieved and then more effectual and effective procedures, methods and

events to battle these assaults may be advanced.

Z.Ji, et.al(2004) proposed real-valued negative selection algorithm with

variable-sized detectors. In this paper, the author investigated dissimilar

AIS philosophies and showed how to syndicate different ideas to resolve

Page 63: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

48

problems of network security area. An Intrusion Detection System (IDS)

that smear those ideas was built and verified in a real-time setting to test

the pros then cons of Artificial Immune System (AIS) and clarify its

applicability. Also particular investigation on the vaccination living process

is familiarized. A special component was built to perform this development

and check its procedure and how it possibly will be formulated in false life.

T. Li(2005) proposed an immune-based dynamic intrusion detection mode.

A new immune-based dynamic intrusion detection model (Idid) was

proposed. In Idid, the dynamic models and the corresponding recursive

equations of the lifecycle of mature lymphocytes, and the immune memory

are built. The difficult of the dynamic account of self and nonself in

processer immune systems is solved, and the flaw of the low competence

of established lymphocyte generating in outdated computer resistant

systems is overwhelmed.

1609.2-2006:IEEE Trial-Use Normal for Wireless Admission in Vehicular

Environments - Security Services for Applications and Management

Messages. It uses protected communication formats, and the dispensation

of those secure mails, within the DSRC/WAVE scheme are defined. The

Page 64: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

49

normal covers methods for securing WAVE organization messages and

submission messages, with the omission of vehicle-originating safety

communications. It also describes administrative occupations necessary to

provision the core safety functions.

A.Vora et.al(2006) proposed Secure Location Verification Using Radio

Broadcast. The author proposed a solution that leverages the broadcast

nature of the radio signal emitted by the prover and the distributed topology

of the network. The idea is to separate the functions of the sensors. Some

sensors are placed such that they receive the signal from the prover if it is

inside the protected area. The others are positioned so that they can only

receive the signal from the prover outside the area. Hence, the latter

sensors reject the prover if they hear its signal. This solution is versatile

and it deals with provers using either omnidirectional or directional

propagation of radio signals without requiring any special hardware besides

a radio transceiver. Also estimated the bounds on the number of sensors

required to protect the areas of various shapes and extend our solution to

handle complex radio signal propagation, optimize sensor placement, and

operate without precise topology information

Page 65: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

50

T. Lin muEller et.al (2006) proposed Improved Security in Geographic Ad

Hoc Routing through Autonomous Position Verification. The author

proposed an NPV protocol that consents nodes to authorize the position of

their nationals through local comments only. This is done by checking

whether following positions announced by one national draw a drive over

time that is bodily possible.

J. Kim(2007), Immune system approaches to intrusion detection—a

review. The objective of this review paper is to provide an overview of

intrusion detection system for Artificial Immune Systems researchers to

identify suitable intrusion detection research problems, and to provide

information for IDS researchers about current AIS solutions. The author

hassummarized six immune features that are desirable in an effective IDS:

distributed, multi-layered, self-organised, lightweight, diverse and

disposable. In addition, they have provided a comprehensive phylogeny of

artificial immune algorithms.

J. Hwang et.al(2007) proposed Detecting Phantom Nodes in Wireless

Sensor Networks. The author proposed a safe localization device that

detects the being of these nodes, termed as ghost nodes, without relying

Page 66: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

51

on some trusted entities, an approach meaningfully different from the

current ones. The future mechanism enjoys a set of nice topographies.

First, it prepares not have any dominant point of attack. All protuberances

play the character of theverifier, by producing alocal map, i.e. a view

created based on ranging material from its nationals. Second, this

distributed and limited construction consequences in quite durable results:

even when a number of phantom knobs is greater than that of honest

protuberances, they can strainer out greatest phantom nodes.

P. Papadimitratos, et.al(2008) proposed Secure Neighborhood Discovery

: A Fundamental Element for Mobile Ad Hoc Networks. They traveled the

numerous attacks conceivable in the corporeal and message medium of

the mobile ad-hoc networks. They confidential the neighbor unearthing as

physical and communication national discovery. Protocols are targeting at

announcement ND, which is founded on physical ND procedures, often

nosedive to achieve their objective. This is since these two types of

detection are not corresponding. At the same time, procedures for

message ND do not fully speech the problematic at hand. They are active

only under very specific operative conditions or they do not ensure

perfection in all cases.

Page 67: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

52

E. Ekici, et.al(2008) proposed Secure Probabilistic Location Verification in

Randomly Deployed Wireless Sensor Networks. The planned Probabilistic

Location Verification (PLV) procedure leverages the probabilistic

requirement of a number of hops a broadcast pack traverses to reach a

terminus and the Euclidean distance amid the foundation and the terminus.

A few verifier nodes is secondhand to regulate the trustworthiness of the

demanded location, which is signified by a real amount between zero and

one. Using the intended credibility metric, it is conceivable to create a

random number of faith levels in the location claimed. Simulation

educations verify that the proposed answer provides ahigh presentation in

theface of numerous categories of attacks.

M. Poturalski, et.al(2008) proposed Secure Neighbor Discovery in

Wireless Networks: Formal Investigation of Possibility. The goal of the

education was to donate such an analysis: Build a formal model capturing

salient characteristics of wireless systems, most notably obstacles and

interference, and provide a specification of a basic variant of the Neighbor

Discovery problem. Then, the author derived an impossibility result for a

general class of protocols, term time-based protocols, to which many of the

schemes in the literature belong. Also identify the conditions under which

Page 68: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

53

the impossibility result is lifted. Moreover, they explored the second class of

protocols, term time-based and location-based protocols and proved they

can secure Neighbor Discovery.

S. X. Wu et.al(2010) proposed the use of computational intelligence in

intrusion detection systems: a review. The objective was to provide an

overview of the research progress in applying CI methods to the problem of

intrusion detection. The scope of this review will encompass core methods

of CI, including artificial neural networks, fuzzy systems, evolutionary

computation, artificial immune systems, swarm intelligence, and soft

computing. The investigation donations in each field are methodically

potted and compared, allowing us to clearly define existing research

challenges, and to highlight promising new research directions. The

findings of this review should provide useful insights into the current IDS

literature and be a good source for anyone who is interested in the

application of CI approaches to IDSs or related fields.

Medina.A., et.al(2010) proposed a performance model of neighbor

discovery in proactive routing protocols This paper delivers a detailed

perfect of key performance metrics of neighbor detection algorithms, such

Page 69: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

54

as node gradation and the delivery of the coldness to symmetric nationals.

The model books for the dynamics of national discovery as glowing as

node density, suppleness, radio and interference. The paper validates a

method for smearing these models to the assessment of global system

metrics. In particular, it designates a model of network connectivity.

Validation of the models demonstrations that the degree approximation

agrees, within 5% error, through simulations for the measured scenarios.

The work accessible in this paper attends as a basis for the presentation

evaluation of outstanding performance metrics of routing protocols, vital for

great scale placement of ad-hoc networks.

G. Calandriello, et.al(2011) proposed on the Performance of Secure

Vehicular Communication Systems. The aim is to provide security,

safeguard users', and security architectures for VC systems. The author

investigated the joint effect of a set of system parameters and components.

The authors consider the state-of-the-art approach in secure VC, and

evaluate analytically and through simulations the interdependencies among

components and system characteristics. Overall, they identify key design

choices for the deployment of efficient, effective, and secure VC systems.

Page 70: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

55

T.S.Sobh et.al(2011) proposed a cooperative immunological approach for

detecting network anomaly. A cooperative immunological approach for

detecting network anomaly presented set of self as a binary vector for the

communication triple (source, destination IP and Port, and protocol).The

author investigated dissimilar AIS models and showed how to syndicate

different thoughts to solve glitches of network security area. An Intrusion

Detection System (IDS) that put on those ideas was constructed and

verified in a real-time situation to test the pros and cons of Artificial Immune

System (AIS) and illuminate its applicability. Also some examination on the

vaccination natural process is familiarized. A special module was

constructed to perform this procedure and check its practice and how it

could be expressed in artificial life.

M. Fiore, et.al(2011) proposed Secure Neighbor Position Discovery in

Vehicular Networks The aim was to address the essential by suggesting a

frivolous distributed etiquette that trusts lone on information conversation

among nationals, deprived of any need of a prior trustworthy nodes. They

present a detailed security analysis of this protocol in the presence of one

or multiple adversaries, and evaluate its performance in a realistic vehicular

environment. They proposed a lightweight, distributed scheme for securely

Page 71: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

56

discovering the position of communication neighbors in vehicular ad hoc

networks. Our solution does not require the use of apriori trustworthy

nodes, but it leverages the information exchange between neighbors.

Analysis showed the scheme to be very effective in identifying adversarial

nodes.

Xu Li, et.al(2011) proposed a novel mobility prediction based “hello”

protocol, named ARHP (Auto Regressive Hello protocol). The objective of

the study was to address the problem of neighborhood discovery in

MANET. Each node predicts its neighbors mobility and position by

autoregressive (AR) modeling, based on historical location reports; it also

predicts its own mobility and position using position samples. The node

updates its location among neighbors only when the predicted location is

too different from the true location. Each location update corresponds to a

‘hello’ message transmission. Simulation results indicate that ARH

achieves as high neighborhood discovery performance.

Haldar N.A(2012) proposed an activity pattern based wireless intrusion

detection system information technology, information technology: New

Generations (ITNG). The objective was to contemporary an intrusion

Page 72: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

57

detection system which exploits pattern gratitude techniques to classical

the usage decorations of authentic users and uses it to detect impositions

in wireless grids. The key idea behind the planned intrusion detection

organization is the documentation of discriminative topographies from

users movement data and use them to identify interruptions in wireless

networks. The uncovering module uses PCA technique to accumulate

attentive statistical variables and associates them with the brinks derived

from users happenings data. When the variables surpass the estimated

verges, an alarm is elevated to alert about a conceivable interruption in the

network. The novelty of the future scheme dishonesties in its light-weight

design which requires less meting out and memory resources and it can be

used in thereal-time environment.

Francois.J et.al(2012) proposed a collaborative protection network for the

detection of flooding DDoS attacks. They addressed the problem of DDoS

attacks and presented the theoretical foundation, architecture, and

algorithms of FireCol. The core of FireCol is composed of interruption

prevention systems (IPSs) positioned at the Internet service providers

(ISPs) equal. The IPSs form virtual defense rings everywhere the hosts to

defend and collaborate by exchanging selected traffic information. The

Page 73: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

58

evaluation of FireCol using extensive simulations and a real dataset is

presented, showing FireCol effectiveness and low overhead, as well as its

support for incremental deployment in real networks.

Radu Stoleru et.al(2012) proposed a Mobile Secure Neighbour Discovery

(MSND) protocol, which offers a measure of protection against wormholes

by allowing participating mobile nodes to securely determine if they are

neighbours, and a wormhole localization protocol, which allows nodes that

detected the presence of a wormhole to determine wormhole’s location.

The MSND protocol is based on the intuition that when nodes range while

moving, the length of the next range is related to the distance traveled

between consecutive ranges. Since the wormhole is unable to know the

distance traveled by each node, it is not able to influence ranging

operations in a way that causes a consistent set of ranges to be built.

Graph rigidity is key to this intuition. MSND influences graph inflexibility to

aid in the confirmation of system neighbors.

Seon Yeong Han(2013) proposed an Adaptive Hello Messaging Scheme

for Neighbor Discovery in On-Demand MANET Routing Protocols. The

objective of the research was to maintain link connectivity. The writers

Page 74: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

59

current an adaptive Hello messaging arrangement to overwhelm needless

Hello messages without reduced detectability of the fragmented relatives.

The result shows that the proposed scheme reduces energy consumption

and network overhead without any explicit difference in throughput. When

the node distribution is very sparse, packet delivery ratio and the average

end-to-end delay give some negative effect.

Priyadarshani.K(2013) proposed Dynamic Neighbor Positioning In

MANET with Protection against Adversarial Attacks. The objective of this

study was identifying neighbor positions without prior information. The

distributed neighbor position verification scheme eventually provides

security from malicious nodes. The protocol is robust to adversarial attacks.

This protocol will also update the position of the nodes in an active

environment.

Marco Fiore, et.al(2013) suggested Discovery and Verification of

Neighbour Positions in Mobile Ad Hoc Networks. The author proposed a

fully distributed cooperative solution that is robust against independent and

colluding adversaries, and can be impaired only by an overwhelming

presence of adversaries. Results show that the proposed protocol can

Page 75: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

60

thwart more than 99% of the attacks under possible conditions for the

adversaries, with minimal false positive rates. All process should proceed

by network nodes only.

Thilagavathy.S (2013) proposed Neighbor node discovery and Trust

prediction in MANET the proposed system, the author integrate the trust-

based security system to the neighbor discovery process, in order to

identify the hateful and selfishly acting nodes. The proposed scheme aims

to decrease the amount of period slots required to determine all the

neighbors cutting-edge the net and likewise it affords security machine to

improve the support between the neighbor nodes. The trust amongst the

neighbors is recognized to improve the cooperative work amongst the

neighbors. The planned system connections the trust material about the

knots only with their neighbors therefore it diminishes a number of

messages advanced into the system and the statistics traffic in the system.

The proposed system aims to consume the lesser resource to convey the

trust information among the neighbor.

Page 76: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

61

Munivara Prasad, et.al(2013) proposed discrimination of flash crowd

attacks from DDoS attacks on internet threat monitoring (ITM) using

entropy variations. The author defined an approach to detect the internal

and external security attacks on the internet at ITM Internet threat

Monitoring monitors initiated by an attacker using botnets. The author used

entropy variations to discriminate the flash crowd attacks from genuine

flash crowds to distinguish the patterns of flash crowd imitations or DDoS

attacks from attack traffic. The author theoretically proved the possibility of

the proposed detection method, and the effectiveness of the discrimination

method within the internet at ITMs. The author used the entropy variations

approach to identify the genuine flash crowd traffic but the threshold value

defined to identify the traffic depends on the size of the network traffic.

Elhadi.M, et.al(2013) proposed EAACK - A secure intrusion detection

system for MANETs. The author proposed EAACK Enhanced Adaptive

ACKnowledgement which was designed with the implementation of RSA

and SA numerical autographs using DSR routing procedure. Performance

assessment was done and results were got. But this EAACK has no

delivery for handling link smashing and hateful source node situation.

Page 77: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

62

L.Peng, et.al(2013) proposed Dynamically real-time anomaly detection

algorithm with the immune negative selection. The outstanding devices of

self-learning and adaptability in the hominid immune scheme are

mentioned besides a dynamic anomaly uncovering algorithm with protected

negative collection, named as DADAI, was projected. The thoughts and

formal accounts of antigen, antibody, and memory lockups in the network

safekeeping domain are given; the dynamic clonal principle of antibody is

combined; the instrument of immune vaccination is discussed, and the

active evolvement formulations of detection profiles are established

(including the detection profiles’ dynamic cohort and extinction, dynamic

knowledge, dynamic alteration, and dynamic self-organization), which will

accomplish that the discovery profiles animatedly synchronize through the

real network situation.

Kanchan.H, et.al(2014) proposed Secure network access by flow analysis

based detection against DDoS attack. The proposed method in this paper

tried to differentiate distributed denial of service attacks from genuine flash

crowds. Under the current conditions of botnet size and organization, it has

noted that DDoS attack flows have more similarity than genuine flash

Page 78: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

63

crowd flows. So the flow correlation coefficient is used here to measure

similarity among suspicious flows and to confirm DDoS attack.

FuiFui.W, et.al(2014) proposed a Survey of trends in massive DDoS

attacks and cloud-based mitigations. The objective was to provide an in-

depth study on the current largest DNS reflection attack with more than 300

Gbps on Spamhaus.org. They have reviewed and analyzed the current

most popular DDoS attack types that are launched by the hacktivists.

Lastly, effective cloud-based DDoS mitigation and protection techniques

proposed by both academic researchers and large commercial cloud-based

DDoS service providers are discussed.

Anil Kumar Gona, et.al(2014) proposed Discovery and Verification of

Neighbor Positions in Mobile AD HOC Networks. The proposed method

allows any node in a mobile ad-hoc network to verify the position of its

communication neighbors without relying on priori trustworthy nodes.

Analysis showed that this protocol is very robust to attacks by independent

as well as colluding adversaries, even when they have perfect knowledge

of the neighborhood of the verifier. The approach is effective in identifying

Page 79: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

64

nodes advertising false positions, while keeping the probability of false

positives low.

Andrew.C, et.al(2015) proposed defense for Distributed Denial of Service

Attacks in Cloud Computing. The author investigated the mistreatment of

compromised simulated machines to complete large-scale Circulated

Denial-of-Service (DDoS) attacks. A dangerous review of most current

intrusion detection and prevention organizations to mitigate possible DDoS

doses is presented.

Chaitanya. H et.al(2015) proposed anomaly based DDoS attack detection.

This paper presented a simple yet effective method to detect DDoS attack

for all possible attack scenarios. Also presented an overview of DDoS

attack, detection schemes and finally proposed a method to detect

various attack patterns. Most of the methods for DDoS anomaly

detection are either not too effective, not accurate or are complex in

nature and firm to implement. But the process projected in this

broadside is very simple in concept and easy to implement.

Page 80: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

65

CHAPTER – 3

IMPLEMENTATION OF LIGHT WEIGHT LOCATION VERIFICATIONPROTOCOL BASED ON BEHAVIOR LEARNING PROCESS FOR

MOBILE ADHOC NETWORKS

3.1 Introduction

The mobile ad-hoc network has numerous amounts of nodes which

have no restriction on their mobility and their direction of displacement. The

mobility nature introduces dynamic changing topology in MANET. So the

neighbor nodes of any node are always changing. Unlike peer to peer

network the neighbor nodes of any node is keep changing and the

trustworthy of the nodes cannot be obtained. Such loosely coupled nature

of the MANET has more prone to various network threats. The entry of

malicious node with higher transmission range introduces various threats to

the network performance.

Page 81: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

66

Figure 3.1 Sample MANET Topology

The Figure 3.1 shows the snapshot of sample network topology and

each node has fixed transmission range. But the node 20 has high power

ratio with transmission range higher than other nodes. So that the node 20

can directly communicate with number of nodes. From the figure 3.1, the

node 20 has direct communication with the nodes 1 to 11. So it can say

that it is the first neighbor and has direct communication with the

destination node.

20

2

4

6

1

5

7

3

9

10

11

12

13

8

14

15

16

17

18

19

Page 82: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

67

The growing internet technology makes the mobile user access all

major services irrespective of their location. Nowadays Location-based

services are attaining popularity. For specimen in a road traffic network the

moveable user can access few location based services to get know about

the restaurants, hotels, hospitals etc which are nearer to them. Whatever

the provision they need the consequence is providing founded on their

locations only so that the location based services developed more popular

and used by many users on necessity basis. Now the focus is on mobile

ad-hoc net where there are no standard topologies and neighbor nodes can

serve as an intermediate node and participate in the routing process.

Location based services (LBS) has the ability to locate the geometric

location of the user to deliver area exact information. LBS can deliver

useful information concerning public transport, route options, climate

forecasts, and location of infirmaries, eateries, police stations, traveler

attractions, landmarks, petrol drives, ATMs etc. In a VANET network the

location based service can be accessed in many ways. The routing in

VANET becomes more complicated due to the increase in mobile nodes. A

mobile node can access a service to know about the traffic and route to the

desiredterminus by retrieving the LBS. The LBS can send the information

about thetraffic and possible set of routes to t reach the destination. The

Page 83: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

68

mobile node could choose a path to reach the destination. Alternatively,

accessing the service need a request to be transferred, so that the

neighboring nodes becomes a participant in the broadcast. In practice most

of the periods the neighbor node becomes challenger and introduces

different kind of attacks, which in turn decreases the throu[put rate of the

network.

The location discovery of neighbor nodes and verification process

becomes more complicated one, due to the increase in protocols of mobile

ad-hoc networks. There are many NPV protocols, “Secure Probabilistic

Location Verification in Randomly Deployed Wireless Sensor Networks”

[65], “Secure and Precise Location Verification Using Distance Bounding

and Simultaneous Multialteration” [74] been spoken earlier for the

Verification of the portable nodes location. Most of them founded on the

precise evidence about the nodes or distance and time occupied for the

appeal and reply procedure. The adversaries may five untrue locations for

the appeal when it obtains from a source node and deteriorate the routing

procedure and reduces the network presentation.

Each network has dedicated routing protocol enforced and it can be

of any protocol from shortest path routing to energy efficient one. Whatever

the routing protocol used, the protocol will be efficient only where there is

Page 84: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

69

no malicious node. If the malicious node exists, then the malicious node

can involve in capturing the packet and can perform different attacks.

Once the intermediate node captures the network packets then it can

perform different attacks like eaves dropping which drops the packet

without any constraint. In another case the malicious node would modify

the data packet. On another case, the malicious node would perform

different other attacks also.

Suppose the network uses the shortest path routing, then if the

malicious node could capture the packet, then it can forward the data

packet through the longest route. Even if the other nodes perform the same

shortest path routing then the malicious node can identify a node which has

no other shortest route than a longer route then it can forward the data

packet through the longer route.

By performing such routing attack, the latency of data packets can be

increased. Also the TTL based routing gets affected and if the TTL value of

the packet increases then the packet will be dropped. Entirely this reduces

the network performance and even the packets will be dropped by the

destination. All these issues are due to the false selection of the forwarding

node. In general the source node selects a forwarding node based on the

Page 85: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

70

location of neighbors. Because of to transmit the data packet the node

spends some energy and to reduce the energy consumption, the node

selects a closure node. The malicious node takes advantage of this and by

providing fake location information to the source node it tries to get

selected as the forwarding node.

Figure 3.2 Adversaries Fake Positions

The Figure 3.2 shows that there are fake and adversary nodes and

their positions. Yellow colored nodes are trusted ones, Red-colored is the

adversary node and blue colored is the false position of the opponent node.

It is strong that the opponent node makes a fake position for each neighbor

node of it and sends false deceptive location info to its neighbors. This

untrue location information affects the process of routing in the mobile ad-

hoc network, because each each neighbor participates in the routing for

Page 86: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

71

mobile adhoc network. When an adversary sends fake position to its

neighbor, and the neighbor selects the fake node to transmit a message,

then the packet or information will not be transferred to the destination

exactly. The fake node could take all the messages from the source node

and may generate collinear or jamming attack to degrade the network

performance.

Protocols for Neighborhood Discovery(ND) serve as fundamental

building blocks in mobile wireless systems. Clearly, ND enables (multi-hop)

communication, as it is essential for route discovery and data forwarding.

ND can also support a wide range of system functionality: network access

control, topology control, transmission scheduling, energy-efficient

communication, as well as physical access control. Given the critical and

multifaceted role of ND, its security and robustness must be ensured: ND

protocols must identify the actual neighbors, even in hostile environments.

The problem of location verification can be performed in many ways.

Whenever a source node selects a route to transmit the packet towards the

destination, it transmits the packet information, destination information and

the route information to the base station. If the base station maintains the

location information and by maintaining the behavior information of the

nodes, location verification can be performed efficiently.

Page 87: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

72

3.2 Methods Explored

This section discusses different methods of location verification

related to the problem of MANET security.

Here we discuss various methods proposed for the verification of

nodes position and node discovery. Secure services for application

and management messages have proposed in [44], it uses secure

message formats, and the processing of those secure messages, within the

Dedicated Short-Range Communications (DSRC)/Wireless Access in

Vehicular Environment (WAVE) system are defined. The standard covers

methods for securing WAVE management messages and application

messages, with the exception of vehicle-originating safety messages. It

also describes administrative functions necessary to support the core

security functions.

For the discovery of mobile nodes [59], the author explored the

possible types of attacks in the physical and communication intermediate of

the mobile ad-hoc nets. Neighbor detection is confidential intocorporeal and

message neighbor detection. Protocols are pointing at communiqué ND,

which is founded on corporeal ND protocols, often nosedive to accomplish

their detached. This is since these two types of detection are not

Page 88: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

73

equivalent. At the identical time, protocols for message ND do not fully

speech the problematic at hand. They are effective only under actual

specific working situations or they do not safeguard precision in all cases.

For the verification of Neighbor position [45,61], there are methods

was dealt in the context of ad hoc and sensor networks; however, existing

Neighbor Position Verification schemes often rely on fixed or mobile

trustworthy nodes, which are assumed to be always available for the

verification of the positions announced by third parties. In ad hoc

environments, however, the pervasive presence of either infrastructure or

neighbor nodes that can be aprioristically trusted is quite unrealistic.

For Secure Positioning in Wireless Networks [46], NPV protocol is

proposed which calculate distances for all neighbors, and formerly praises

that all triplets of protuberances encircling a couple of other protuberances

act as verifiers of the pair’s locations. This scheme prepares not rely on

dependable nodes, but it is calculated for static device networks, and

necessitates lengthy multi-round multiplications involving several swellings

that seek agreement on a common national verification. Furthermore, the

pliability of the procedure into colluding assailants has not remained

demonstrated. Static sensor networks also require several nodes to

exchange information on the signal emitted by the node whose location has

Page 89: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

74

to be verified. Moreover, it aims at assessing only whether the nodes are

within a given region or not.

An Improved Security in Geometric Ad-Hoc Routing through

Autonomous Position Verification is discussed in [47]. The authors

proposed an NPV protocol that allows nodes to validate the position of their

neighbors through local observations only. This is performed by checking

whether subsequent positions announced by one neighbor could draw a

movement over a time in a realistic sense.

The approach [56] forces a node to collect several data on its

neighbor movements before a decision can be occupied, making the

answer unfit to situations anywhere the place information is to be gotten

and confirmed in a short time span. Moreover, a challenger can mislead the

procedure by simply announcing untrue positions that shadow a truthful

mobility design.

The scheme in Secure Location Verification for Vehicular Ad-Hoc

Networks [70 ] exploits Time-of-Flight (ToF) distance bounding and node

cooperation to mitigate the problems of the preceding solutions. The

collaboration is incomplete to twosomes of national nodes, which renders

the protocol ineffective against colluding attackers.

Page 90: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

75

To the problems identified, there must be a protocol which is fully

distributed and light weight to solve the verification of node position in

mobile adhoc networks. It should not depend on trusted nodes and should

be secure for numerous kinds of attacks

3.3 Light Weight Location Verification system

Fast varying and growing nature of mobile ad-hoc systems make the

accessibility of location aware services becoming difficult. With the

presence of adversaries and aggressive nodes, the location based service

discovery converts a challenging one. We suggest a light weight location

verification protocol for the verification of nodes which turns available to be

a healthy one and uses the behavior of nodes for the verification process.

Here distributed one step Location Verification Protocol is being used and

session based behavior learning process for the identification of adversary

nodes has been adopted.

The proposed system verifies the node location using one step

verification process utilizing session based behavior learning process. The

node in the network receives their geometric and spatial metrics at the time

of registration or entering in towards the coverage of the base station. The

Page 91: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

76

nodes specify the location information, haste and displacement particulars

at all time. At each time stamp the base stationsends the notification to

gather nodes performance details. Upon in receipt of this communication

for a certain time, if a node transmits a dispatch it sends node, packet and

promoting node details to the base station. The base station upholds node

details under its coverage and behavior matrix where it stores the

broadcast details of all nodes which could be used to identify the adversary

nodes.

The proposed system has the following three phases.

(i.)Registration,

(ii.)Behavior Collection and

(iii.)One step Location Verification.

3.3.1 Registration:

When a mobile enters to a new coverage area, it required to register

in the base station about its latitude and longitude. The login message has

the following parameters.

Message-Id Node Id LocationDetails

TimeStamp(entry

time)Speed

Table3.1Login Message set-up

Page 92: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

77

In the login communication it has Message-Id which is unique for the

message sent by the node, Node-Id specifies the identification number of

the node which sent the message, Location Details specifies the geometric

position material and Time Stamp stipulates that at what time the message

generated and Speed tells the displacement or at what fleetness the mobile

node is moving. Whenever the base station receives the message it

updates the mobile node particulars in the matrix what it is maintaining.

This communication is authenticated with the private key (pk) produced by

the node and at this time after all the communications sent by the node will

be genuine with that specific secluded key.

Figure 3.3 Registration process with the base station

Page 93: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

78

Figure 3.3 shows the registration process and each node

communicates with the base station and the base station returns the

private key to the user.

Figure 3.4 Flow chart of registration

Start

Generate Node ID

Generate Message ID

Compute location details

Generate entry time stamp

Compute displacement speed

Generate login message andsend

stop

Page 94: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

79

Figure 3.4 shows the steps of registration performed by the incoming

node and details the process involved in registration.

Pseudo Code of Registration

Start

Generate Node-ID nid.

Generate Message-ID mid.

Compute Geometric metrics location values Gx,

Gy.(Latitude/longitude?)

Generate entry time stamp mt.

Compute speed ns =Ø(((Gx-Gx-1)* (Gx-Gx-1))+( (Gy-Gy-1)* (Gy-Gy-1)))/sec.

Construct Login message Lm=nid+mid+(Gx,Gy)+mt+ns.

Stop.

The registration algorithm generates the message with the node id,

location details and its mobility speed to the base station. The base station

maintains the information about various mobile nodes which will be used to

verify the location later.

The base station maintains the following details in the node matrix.

Page 95: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

80

Message ID NodeIdLocationDetails

Time Stamp Speed

M1 N1 120,130 01.23.45.900 5m/sec

… … … … ….

… … … … …

… … … … …

Table 3.2 Base station node matrix,

The node details are stowed in the node matrix only if the node

records the base station at the time of handover process. So that the nodes

location can be calculated using those parameters in the login message by

the mobile base station at any point of time.

3.3.2 Behavior Collection

The base station initiates Behavior Collection procedure periodically

with a specific time interval. Upon in receipt of this message both node

either receives or transmits a communication,it generates additional control

message which has the packet id received or transmitted, and node id from

which it receives and also where to it transmits time stamp etc… The base

station collects this information and updates the behavior matrix

periodically. This procedure will be repeated periodically and the update

Page 96: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

81

time is set to depend on the nodes movement to analyze the system status

and for the Verification of the mobile nodes and if there are adversary

nodes.

The base station examines the behavior matrix for each packed id

and node id. If the package is not transferred or received by a node id

which is specified the message sent by earlier host then it can recognize

the attendance of adversary and it can recognize there is no link present in

between the nodes specified in the packet.

From the figure 3.5, it is very clear that if the node 6 communicates

the message to 4 and it selects the path through the adversary node and

fake path which is noticeable in blue, the base station will not receive a

message from the adversary node and likewise the node next to the

opponent node also will not receive or transmit the packet with the same id.

This assistances the base station to identify the adversary node even

though it is a registered one.

From the figure 3.5, it is very clear that if the source 6 selects the

path through 2 to reach 4, then the base station receives the behavior

message completely.

Page 97: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

82

Figure 3.5 Transmission of Behavior Message

The base station of every time slot studies the behavior matrix and

search for the conclusion of transmission with the packet id and source and

destination id quantified in the matrix. If the broadcast is incomplete then it

identifies the fake node with link and adversary node from the matrix and

packet details. It iupdates all identified adversary particulars and archives in

adversary matrix.

It is normally problematic to say a node as an opponent node with

one single broadcast. Sometimes the mobility of the node also can be the

motive for incomplete broadcast, since the node might consume moved to

certain other location which is calculated by the source node at the time of

route selection. Here the behaviour of challenger node helps us by

Page 98: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

83

charitable false locations to more than one neighbor, so that the opponent

node could be recognized by the base station by classifying the same node

id present in numerous broadcast which is incomplete from the behaviour

matrix kept in the base station.

Pseudo Code of Behavior Collection

Start

initialize behavior matrix Bm and adversary matrix Am, initialize time

stamp Bt.

for every node Mni from the Node set Ns.

Send Behavior message BM.

Receive reply BRM.

Extract packet id (Pid), source id (Sid), destination id (Did) ,NodeId(

Nid), Ts

Store in Bm.

End.

for every row in matrix Bm.

Identify unique packet id pid.

Search for the row for completion of transmission.

If( incomplete)

Page 99: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

84

Add Nid in adversary matrix Am.

End.

wait for next time stamp and repeat step 3, 4 .

end.

Stop

The behavior collection algorithm sends the behavior collection

message and collects the transmission completion details. Based on the

received results the location verification is performed.

The Figure 3.6 shows the flow chart of behavior collection algorithm

and shows step by step process in detail.

Page 100: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

85

Yes/no ?

Yes/no ?

Figure 3.6 Flow chart of Behavior Collection Process

Start

Initialize Bm, Am,

Bt

For each nod in Ns Send Bm

Receive BRMBm(i)={Pid,Sid,Did,Ni

d}

For each entry in Bm Identify unique pid

Trace for incompletetransmission

Incomplete

Add to adversary matrixAm

Wait for next time stamp

Stop

Page 101: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

86

3.3.3 One step Location Verification:

The mobile node initiates this verification procedure for each

transmission. At the time of transmission it selects the pathway and the

neighbors by broadcasting the message. On receiving a reply the source

node collects the set of neighbors and updates its neighbor matrix. For

every chosen path for the destination, the neighbors are verified using

procedure as given in the flow chart.

It sends the verification message Vm to the base station with the

location details and geometric metric which is directed by the neighbor .

The base station extracts the national details and its geometric metric and

computes the new location for the mobile node using the details in the node

matrix. The neighbor details are kept stored in the node matrix when it

enters within the coverage of the base station, it uses the location details of

the mobile node and speed to compute the displacement of the neighbor

node.

It compares the location details sent by the source node and

calculated location, if the difference between them is within a tolerance

then it identify the neighbor as genuine node and likewise checks the entry

of neighbor id in adversary matrix if the neighbor id is present in the

Page 102: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

87

adversary matrix,then it assumes that the neighbor as adversary one.

Based on the two comparison process it sends reply as anhonest node or

opponent one for the source node to transmit the communication to the

neighbor in order to communicate the message else it discards the

neighbor and selects another neighbor to transmit. It repeats the

verification process for all neighbors to transmit the message.

no

yes

Figure 3.7 Flow Chart of One Step Verification

Start

Collect node id, location

Generate location verificationrequest

Receive reply

Forward packet

Choose another one

Stop

Not Adversary

Page 103: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

88

The Figure 3.7 shows the flow chart of one step verification process

performed by each source node and explains the process in detail.

3.4 Conclusion:

The proposed methodology is a secure one for all kind of attacks

coming in mobile adhoc network. We used one step verification process,

which is less time consuming and we collect behavior of the nodes

periodically, so that even if there are many number of adversaries present

in the network we could identify easily with the help of one step verification

process. The behavior collection helps us to increase the performance and

throughput of the overall network, because the forwarding node selection

implies the performance of the overall system. Even though the behavior

collection introduces little network overhead for 6%, it reduces the

verification time and heaviness of computing signature and using multiple

keys for the identification and verification process, thus improves the

efficiency of the overall network.

Page 104: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

89

CHAPTER – 4

SECURE DISCOVERY SCHEME AND MINIMUM SPAN VERIFICATIONOF NEIGHBOR LOCATIONS IN MOBILE ADHOC NETWORKS

4.1 Introduction:

Mobile adhoc networks (MANET), popular technology the world

society speaks about due to the technology development. The modern

world uses internet technology for everything as a part of their life, and now

a day they use mobile technology in place of IT to get access to the

location based service. The kind of sophisticated service grows with the

risk rate in accessing the service. The service providers have more

challenges in providing services and maintaining the quality of service

parameters. As like in other networks like wired and wireless networks, the

MANET also prone to different type of network attacks.

Mobile adhoc network, another kind of wireless network where you

can find number of base stations which supports the communication of

mobile nodes. The mobile node supports the routing process of the

communication to improve the throughput of the network. The mobile

nodes are moving at some speed and towards a direction, which makes the

topology of the network gets changing at every fraction of time. Due to this

Page 105: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

90

reason there will be number of nodes comes into the coverage perimeter of

a base station and leaves, which cannot be trusted for service handling.

What the adversary does here is, it replies with the route discovery phase

using a fake location information with the intension to get participate in

routing process. After gets selected it simply discard the packet, or

manipulate the packet, or else it will never receive the packet because of

false location. This makes the transmission as a failure one and service

throughput degrades.

Figure 4.1 Shows the Example Scenario of the Fake Location

Location Based Services are one, which is provided and accessed

based on the location information. In a road traffic network the location

based service can be retrieved in many ways. The routing in road network

becomes more complicated due to the increase in mobile nodes. A mobile

Page 106: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

91

node can access a service to know about the traffic and route to reach a

destination by accessing the location based service. The Location Based

Services could reply the knowledge about the traffic and set of routes to

reach the destination. The mobile node can chose a path to reach

destination. In another way, accessing the service need a request to be

transferred, so that the neighboring nodes becomes participant in the

transmission. Most of the time, the neighbor node becomes adversary and

introduces different kind of attacks, which reduces the throughput of the

network.

Protocols for Neighborhood Discovery serve as fundamental building

blocks in mobile wireless systems. Clearly, ND enables (multi-hop)

communication, as it is essential for route discovery and data forwarding.

ND can also support a wide range of system functionality: network access

control, topology control, transmission scheduling, energy-efficient

communication, as well as physical access control. Given the critical and

multifaceted role of ND, its security and robustness must be ensured: ND

protocols must identify as neighbors only those devices that actually are

neighbors, even in hostile environments.

The location discovery of neighbor nodes and verification process

becomes more complicated one, due to the increase in protocols of mobile

Page 107: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

92

adhoc networks. There are many protocols been discussed earlier for the

verification of the mobile nodes location. Most of them based on the

distance and time taken for the request and reply process. The adversaries

are giving fake locations for the request when it receives from a source

node and dilutes the routing protocol and reduces the network

performance.

From Figure 4.1, we can see the adversary node with the green color

and the red color node shows the fake positions generated by the

adversary nodes and nodes colored with yellow are the neighbor nodes.

Support if the node 4, plans to transmit a packet to any node from the list

(2-3-1) then what the adversary does is it generates three different fake

locations around node-4 in order to get selected. From this scenario it is

clear that, whatever be the destination, the fake node will be selected in all

the case.

So that there must be a protocol which verifies the location of the

nodes gets selected in the routing phase of the transmission with little

overhead in time, space and power ratio.

Page 108: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

93

4.2 Methods Explored

There are different approach has been proposed for the problem

identified using different parameters like proactive and reactive details of

the nodes in the transmission range. Here we discuss few of them

according to the problem identified.

An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-

Demand MANET Routing Protocols [108], proposes an adaptive Hello

messaging scheme to suppress unnecessary Hello messages without

reduced detectability of broken links. Simulation results show that the

proposed scheme reduces energy consumption and network overhead

without any explicit difference in throughput.

Dynamic Neighbor Positioning in MANET with Protection against

Adversarial Attacks [109], propose techniques for finding neighbours

effectively in a non priori trusted environment are identified. These

techniques will eventually provide security from malicious nodes. The

protocol is robust to adversarial attacks. This protocol will also update the

position of the nodes in an active environment. The performance of the

proposed scheme will be effective one.

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc

Page 109: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

94

Networks [110], address the problem of a priori trusted nodes, the

discovery and verification of neighbor positions presents challenges that

have been scarcely investigated in the literature. This open issue is

addressed by proposing a fully distributed cooperative solution that is

robust against independent and colluding adversaries, and can be impaired

only by an overwhelming presence of adversaries. Results show that our

protocol can thwart more than 99 percent of the attacks under the best

possible conditions for the adversaries, with minimal false positive rates.

Neighbor node discovery and Trust prediction in MANETs [111], gate

this vulnerability and secure ND is crucial. This paper uses the directional

antenna algorithm called as scanning based direct discovery algorithm to

discover the neighbors. To enable cooperative working of the various

distributed protocols we use trust system to provide the trust level of

various nodes, thereby enhancing the cooperation among the nodes. This

paper uses distributed hybrid trust algorithm and also uses relationship

maturity concept to compute the trust of the nodes. This paper

demonstrates that Trust systems are better than already existing

cryptographic techniques.

For the discovery of mobile nodes in [60], they explored the various

attacks possible in the physical and communication medium of the mobile

Page 110: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

95

adhoc networks. They classified the neighbor discovery as physical and

communication neighbor discovery. Protocols aiming at communication

ND, which are based on physical ND protocols, often fail to achieve their

objective. This is because these two types of discovery are not equivalent.

At the same time, protocols for communication ND do not fully address the

problem at hand. They are effective only under very specific operational

conditions or they do not ensure correctness in all cases.

For the verification of Neighbor position [61,74], there are methods

was studied in the context of ad hoc and sensor networks; however,

existing Neighbor Position Verification schemes often rely on fixed or

mobile trustworthy nodes, which are assumed to be always available for

the verification of the positions announced by third parties. In ad hoc

environments, however, the pervasive presence of either infrastructure or

neighbor nodes that can be aprioristically trusted is quite unrealistic.

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc

Networks, proposing a fully distributed cooperative solution that is robust

against independent and colluding adversaries, and can be impaired only

by an overwhelming presence of adversaries. Results show that our

protocol can thwart more than 99 percent of the attacks under the best

possible conditions for the adversaries, with minimal false positive rates.

Page 111: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

96

To the problems identified, there must be a protocol which is fully

distributed and light weight to solve the verification of node position in

mobile adhoc networks. It should not depend on trusted nodes and should

be secure for various kinds of attacks.

4.3 Secure Discovery Scheme

The development of mobile technology brings service accessibility of

location aware service an important criteria in mobile adhoc networks

anywhere challenging metric is the dynamic changing topology of MANET.

This dynamic topology greeting the huge network threats in different forms

like Hyperbola and collinear attacks.

Generally the adversaries responds to the route discovery procedure

of any routing protocol with fake positions, so that to be get selected as a

forwarding node in the routing process , subsequently to affect the routing

process and degrade the throughput of the network by simply discarding

the message or by generating modification attacks.

The author proposed a secure neighbor discovery scheme, which

uses proactive and reactive details of the neighbor nodes to compute a

group G, where set of nodes get selected according to the location details.

Page 112: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

97

From the group of nodes G, a single node will be selected for the

forwarding phase whose location will be verified with the base station using

some simple verification protocol.

The verification protocol uses the proactive and reactive details to

verify the location of the mobile node. The proposed method has more

advantages that the neighbor discovery is done with little overhead by the

source node and only the verification process engage with the base station.

Figure 4.2 Architecture of One Step Verification Scheme

Packet

Secure Discovery Scheme and One Step Verification Scheme

Group Join Neighbor DiscoveryScheme

Location Verification

Routing

Page 113: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

98

The Figure 4.2 shows the architecture of proposed one step

verification scheme and shows the functional components.

The proposed method uses proactive details about the nodes which

have learned at the time of registration process when the node first comes

into the transmission range of the base station. With the proactive details, it

uses reactive information received from the verifying node, in order to verify

the location of the selected node. In the proposed method the Base station

Bs uses a different addressing scheme as follows:

Figure 4.3 Proposed Addressing Scheme

Page 114: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

99

Figure 4.3 shows the format of addressing scheme used to eliminate

the false addressing and location specification.

Figure 4.4 Address Allocation Scenario

Figure 4.4 shows the address allocation scenario and how addresses

are assigned to the nodes of network.

4.3.1 Group Join:

The group join mechanism is invoked by the mobile node when it

switches it location from the transmission range of a base station from

another. The group join message has the following details.

Req. ID Node-Address Location

Details

Time

Stamp

Speed Private Key

Table 4.1 shows the Group joins Message format.

Page 115: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

100

The group join message has the following fields namely: Req.ID–

Specifies the unique identification of the group join request, Node-Address–

specifies the unique address of the mobile node, Location Details– has the

geometric location details of the mobile node and the time stamp– specifies

the time at which the message sent by the node, and Speed tells the

displacement or at what speed the mobile node is moving, finally the

private key- mentions the private key to be used to communicate with the

node.

Whenever the base station collects the communication it updates the

node particulars in the medium what it is preserving. This message is

genuine with the private key pkproduced by the node in addition here after

whatsoever the communication sent by the node will be genuine with that

specific private key. Also the base station uses a different addressing

scheme which restricts the adversaries to generate fake locations. The

base station also sends the addressing scheme and range of addresses

allocated details and adversaries list with the acknowledgement to the

source node.

Pseudo Code of Group Join

Step1: start

Step2:initialize neighbor matrix Nb, addressing scheme As, Allocation range Al,

Page 116: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

101

Adversaries Adl.

Step3: Generate group join Request message GJR.

GJR(Req.ID)= Generate random number.

GJR(Node.Address) = Broadcast Address of the mobile node.

GJR(Location Details)= { Longitude, Latitude, Gx, Gy};

GJR(TimeStamp) = {Current Time};

GJR(Speed)= $((( Gx-Gx-1)* ( Gx-Gx-1))+( ( Gy-Gy-1)* ( Gy-Gy-1)))/sec.;

GJR(Pk) = {Private key }

Step4: Send to the base station Bs.

Step5: Receive reply GJRep.

Nb=extract Neighbor details from GJRep.

As= GJRep(Addressing Scheme).

Al = GJRep(Allocation Range).

Adl = GJRep(Adversaries List).

Step6: stop

The group join algorithm generate group join request and sends to

the base station. Also the algorithm receives the reply from the base station

which assigns the address for the newly joined node.

Page 117: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

102

Figure 4.5 Flow Chart of Group Join

The Figure 4.5 shows the flow chart of the group join request

generated by the newly arriving node and shows how the address has

been assigned to the new node.

Start

Initialize neighbor matrix

Initialize addressing scheme

Generate group join request

Send to base station

Receive group join reply

Extract address assigned

stop

Page 118: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

103

4.3.2 Neighbor Discovery Scheme:

The source node concepts a broadcast communication to determine

the neighbors around the node. On getting the broadcast communication

the nodes under the transmission range of the node replies with the

acknowledgement with the location information. The source node initialize

a timer to receive the acknowledgement, after the timer expires it stops

receiving the acknowledgment. With the set of nodes from which it obtains

the acknowledgment. After receiving the acknowledgment it checks with

the addressing of each node with the addressing scheme of the base

station and adversaries list. If any hateful address found on the list then it

eliminates the address of node after which it has to choice a route to the

terminus. After checking the speaking scheme it produces a group of node

id’s which are very adjacent to the foundation node and payments with the

previous update of the challenger notification. If the challenger notification

time expires then it onward the group created to the base station for

confirmation otherwise it simply selects a node from the group and starts

advancing. Unlike other confirmationinstruments, the proposed method

customs base station impartial to verify the location of the nodes and

recurrence a list of nodes. From the list refunded the source node can

choice closer node to forward the data packet. Here the overhead

Page 119: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

104

generated at the base station due to verification process is minimized by

broadcasting the identified adversary to the other nodes in the transmission

range of the base station.

Pseudo Code of Neighbor Discovery Algorithm

Step1: start

Step2: resetbroadcast group TG, broadcast timer Bt..

Step3: read Neighbor matrix Nb, Adversary list Adl, Addressing scheme As,

allocation range

Al, adversary statement time Ant.

Step4: compute Hello Broadcast message –Hello.

Step5: broadcast to all its neighbors Nb.

Step6: start broadcast timer Bt.

Receive acknowledgment until Bt expires.

TG(i) = ack{Node-Address}.

End.

Step7: for each entry in TG

Verify adversary list Adl.

If TG(i)@Adl then

TG=TG-TG(i).

Page 120: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

105

End

Verify is addressing scheme and range.

If TG(i)> addressing range then

TG=TG-TG(i).

End

If Addressing Scheme( TG(i)) != addressing scheme then

TG=TG-TG(i).

End

End.

Step8: check the adversary notification time Ant.

If Ant is active then

Forwarding node Fn =Select a node from the group TG.

Start transmitting through Fn.

Else

Send TG to Base station.

Approved TG = verified list from BS.

Select a node from the group TG.

Start transmitting through Fn.

End.

Step9: stop.

Page 121: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

106

The neighbor discovery algorithm identifies the list of neighbors by

verifying the location of the nodes to perform routing efficiently.

Figure 4.6 Flow Chart of Neighbor Discovery Scheme

Start

Read Neighbor Matrix,Adversary list

Send hello message

Verify addressing range

Check adversary notificationtime

Send TG to base station

stop

For each reply

Ant is active Select node from group

Page 122: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

107

The Figure 4.6 shows the flow chart of neighbor discovery scheme of

proposed one step verification approach and shows the stages in detail.

4.3.3 Location verification Process:

The location verification process uses the proactive details which is

available from the period of node group join process. Upon receiving

request from the source node it checks the set of addresses assigned from

the address list and if there is any address unfound then it removes the

address from the transmission group TG and add to the adversary list Al.

From the location details available with the request, it compares the

location of each node from the group TG. It computes the possible

displacement for each node according to its speed to verify with the new

location. Adversaries are identified and removed based on the computed

locations and the new transmission group will be sent to the source node. If

there is any new adversary found then it will be broadcasted to all the

nodes in the network which will be get updated at the adversaries list of the

nodes.

Page 123: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

108

4.4 Conclusion

The proposed methodology is a secure one for all kind of attacks

coming in mobile adhoc network. We used secure node discovery

procedure and location verification process, which is less time consuming

and we use proactive and reactive node details, so that even if there are

many number of adversaries present in the network we could identify easily

with the help of verification process. The proactive details with the reactive

information about the nodes help us to increase the performance and

throughput of the overall network. Even though the discovery phase

introduces little network overhead, it reduces the frequency of verification

and overhead generated by earlier methods. The verification process will

be asked to the base station only if the adversary notification timer gets

expired, which reduces the communication with the base station. Ultimately

this discovery and verification scheme increases the throughput and

reduces the latency of the network

Page 124: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

109

CHAPTER – 5

Two Hop Neighbor Discovery Based Location Verification Protocol for

Mobile Adhoc Network Using Node Duplication Method

5.1 Introduction

The mobile adhoc network is the collection of mobile nodes where the

nodes has no restriction on their movement and speed or direction. This

makes the topology of the network to be changed at every time and difficult

to find a node at a fixed position for long time. The growth of internet

technology increases the number of service to be accessible through

mobile devices. This highly reduces the coupling feature of the

environment and increases the possibility of network threat. The packets

sent from the source to the service point or destination has to pass through

various nodes and if there are any malicious node then the packet received

may be dropped or the malicious node could learn the details of packet and

perform various other threats.

The node has fixed transmission range so that whatever the packets

to be send could not be done directly so that there is a necessary for co-

operative transmission. In mobile ad-hoc network the routing is performed

using the neighbor nodes to reach the destination. There are many routing

Page 125: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

110

approaches available for mobile ad-hoc network and each vary with various

constraints. For example in the case of shortest path routing, the protocol

chooses a least distanced or least hop path and in some other cases the

protocol considers the energy or traffic and so on. Whatever the procedure

used the only requirement is whether the packet is not faced any malicious

operation or the packet is delivered successfully.

Unlike general nodes of MANET there are few other nodes called

adversaries, which are more powerful and has more transmission range.

This higher transmission range of adversaries provides facility to hear the

packet being transmitted by any node and whenever a node performs a

neighbor discovery procedure the adversary also replies that it is the most

neighbor to the source by specifying the fake location. While performing

routing in mobile ad-hocnetwork using location information, the adversary

can specify a close location to the source node so that it can participate in

all transmission of packets and can perform any mode of network threat.

By assuming or selecting the adversary as the forwarding node if the

source sends the packet through the adversary, the packet sent by the

source will not be delivered to the destination which makes transmission

failure and reduces the network throughput. So that the location specified

by any neighbor has to be verified in more strategic manner. There are

Page 126: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

111

many approaches has been discussed to verify the location of the nodes

being selected for routing and each uses various metrics. If the location

could be verified then the wrong selection of forwarding node could be

avoided.

Two hop neighbor discovery is the process of identifying the neighbor

and their neighbors. The source node sends the neighbor discovery

message and the neighbor returns a set of neighbors it has. By using this,

the source node can obtain the neighbor of neighbors. The information

about the neighbors and their neighbor could be used to identify the original

location of the nodes.

Figure 5.1 Example of Two-Hop Neighbor Verification

20

2

4

6

1

5

7

3

9

10

11

12

13

8

14

15

16

17

18

19

Page 127: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

112

In two hop neighbor verification approach, the source node sends the

neighbor verification request to its neighbor and the same will be sent to

their neighbors also. If the selected forwarding node, present in their entire

neighbor list then it is identified as malicious and can be concluded as an

adversary.

5.2 Methods Explored

There are several methods has been deliberated for the location

verification protocol and we converse few of them here.

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc

Networks [110], speech this open issue by suggesting a fully distributed

cooperative answer that is robust against self-governing and colluding

adversaries, then can be impaired only by an irresistible presence of

adversaries. Results demonstration that our protocol can frustrate more

than 99 percent of the attacks under the best conceivable conditions for the

challengers, with minimal false optimistic rates.

Mobile Ad Hoc Networking: Imperatives and Challenges [79], efforts

to deliver a complete overview of this lively field. It first clarifies the

significant role that mobile ad hoc systems play in the development of

upcoming wireless machinery. Then, it reviews the latest investigation

Page 128: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

113

activities in these areas of MANETs characteristics, abilities and

applications.

Secure services for application and management messages have

proposed in [44], it uses secure message formats, and the processing of

those secure messages, within the Dedicated Short-Range

Communications (DSRC) /Wireless Access in Vehicular Environment

(WAVE) organization are definite. The standard covers approach for

securing WAVE organizationcommunications and request messages, with

the concession of vehicle-originating safety communications. It also labels

administrative functions necessary to provision the core safety functions.

For the discovery of mobile nodes [59], the author explored the

possible types of attacks in the physical and communication medium of the

mobile adhoc networks. Neighbor discovery is classified into physical and

communication neighbor discovery. Protocols aiming at communication

ND, which are based on physical ND protocols, often fail to achieve their

objective. This is because these two types of discovery are not equivalent.

At the same time, protocols for communication ND do not fully address the

problem at hand. They are actual only under very specific working

conditions or they do not guaranteeaccuracy in all gears.

Page 129: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

114

For the verification of Neighbor position [61,74], there are methods

was dealt in the setting of ad hoc and instrument networks; though, existing

Neighbor Position Verificationarrangements often rely on immovable or

mobile trustworthy nodes, which are presumed to be always obtainable for

the verification of the position publicized by third parties. In ad hoc

environments, however, the the pervasive presence of either infrastructure

or neighbor nodes that can be aprioristically important is quite impractical.

For Secure Positioning in Wireless Networks [45], NPV protocol is

proposed which calculate distances for all neighbors, and then commends

that all triplets of nodes encircling a pair of other nodes act as verifiers of

the pair’s positions. This scheme does not rely on trustworthy nodes, but it

is designed for static sensor networks, and requires lengthy multi round

computations involving several nodes that seek consensus on a common

neighbor verification. Furthermore, the resilience of the protocol in to

colluding attackers has not been demonstrated. Static sensor networks [61]

also require several nodes to exchange information on the signal emitted

by the node whose location has to be verified. Moreover, it aims at

assessing only whether the nodes are within a given region or not.

An Improved Security in Geometric Ad Hoc Routing through

Autonomous Position Verification is discussed in [47]. The authors

Page 130: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

115

proposed an NPV protocol that allows nodes to validate the position of their

neighbors through local observations only. This is performed by checking

whether subsequent positions announced by one neighbor could draw a

movement over a time in realistic sense. The approach [47] forces a node

to collect several data on its neighbor movements before a decision can be

taken, making the solution unfit to situations where the location information

is to be obtained and verified in a short time span. Moreover, an adversary

can mislead the protocol by simply announcing false positions that follow a

realistic mobility pattern.

The scheme in Secure Location Verification for Vehicular Ad-Hoc

Networks [46] exploits Time-of-Flight (ToF) distance bounding and node

cooperation to mitigate the problems of the preceding solution. The

collaborationis limited to a pair of neighbor nodes, which renders the

protocol ineffective against colluding attackers.

To the difficulties identified, here must be a protocol which is fully

distributed and light weight to solve the verification of node position in

mobile adhoc networks. It would not depend on trustedt nodes and would

be protected from many kinds of attacks.

Page 131: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

116

5.3 Two Hop Neighbor Verification Approach

The development of mobile-enabled services increases the access of

location based services where the selection of exact service location and

delivery of the packet to the right destination becomes essential. The

growth of location-based service access has great threat due to the

presence of malicious nodes which can perform various network attacks

like eaves dropping; modification or DDoS attacks and so on, so that the

performance of the network is highly degraded. There are many

approaches has been discussed to verify the location of the nodes, but

suffers from more overhead and poor accuracy. We propose a novel

approach using node duplication method and two hop neighbor discovery

method using which the location of the node can be verified. The source

node performs two hop neighbor discovery to collect the neighbor nodes

and perform node duplication method to verify the location of the node

being selected to route the packet. The proposed method reduces the

overhead introduced by verification procedure and increases the network

performance.

The proposed method has various stages of location verification to

perform routing in an efficient manner. The method has the following

stages namely Two Hop Neighbor Discovery, Node Duplication Method,

Page 132: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

117

Location Verification, Energy Efficient Routing. We will discuss each of

them popular detail in this section.

Figure 5.2 Architecture of Two-Hop Neighbor Discovery Approach

Figure 5.2 shows the architecture of two hop neighbor discovery

algorithm based location verification approach. Also Figure5.2 shows the

functional stages in detail.

Packet

Two Hop Neighbor Discovery Based Location Verification Approach

Two Hop NeighborDiscovery

Node DuplicationMethod

Location Verification

Routing

Page 133: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

118

5.3.1 Two Hop Neighbor Discovery

The source node generates a two-hop neighbor discovery message

(THND) and broadcast the message. The neighbors located within the

transmission range and the adversary if present. The neighbor genuine

node also performs single-hop neighbor discovery and reply to the set of

neighbors to the source node. What happens here is the neighbor node

collects the location details of their neighbors and replies to the source

node. The collected information is stored in its neighbor table and returned

to the source node. The neighbor node generated the Two hop neighbor

reply (THNR) message and sent to the source node.

Pseudo Code of Two-Hop Neighbor Discovery Algorithm:

Input: Neighbor Table Nt.

Output: Neighbor Table Nt.

Start

generate Two hop neighbor discovery message (THNR).

THNR = {Source ID}.

Broadcast into the network.

Receive THNR.

Page 134: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

119

Generate Hello message HM.

HM = {Source ID, Seq.No, TTL}.

Broadcast HM.

Receive HM.

Generate Hello Reply HP.

HP = {Seq.No, Node ID, Loc}.

Generate THNReply.

THNReply =

send Two hop neighbor reply to the source node.

Receive Neighbor Reply Np.

Extract Neighbor details from thereply.

Nt =

Stop.

The two hop neighbor discovery algorithm collects the neighbor and

their neighbor information and adds it to the neighbor matrix.

Page 135: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

120

Figure 5.3 Flow Chart of Two-Hop Neighbor Discovery Algorithm

The Figure 5.3 shows the flow chart of two hop neighbor discovery

algorithm and shows the stages in detail.

5.3.2 Node Duplication Approach

The node duplication approach performs the core part of the

proposed method. When the set of neighbors being discovered which has

Start

Generate neighbor discoverymessage

Broadcast request and replymessage

Send hello message

Receive hello reply

Extract neighbor details

Add to neighbor table

Stop

Page 136: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

121

location details and node id of a set of nodes we perform the node

duplication approach. Based on the location details of the node for each

node present in the reply, we generated a topology and based on that we

compute the distance between each of the node available in the reply. In

generic case each node in the network has fixed transmission range and

based on that the node which has more occurrences and has duplicate

locations are identified. The identified information is used for performing

location verification in the later stage.

Pseudo Code of Node Duplication Algorithm

Input: Neighbor Table Nt.

Output: Neighbor Table NT.

Start

for each neighbor Ni from Nt

Find common node Cn from Ni(Ni).

Cn =

End

for each common node CN

Compute distance of their first neighbor.

Ndist =

Page 137: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

122

End

Identify the node with more distanced.

DN =

Remove Dn from NT.

Return Dn.

Stop.

The node duplication algorithm computes the distance from their first

neighbor and identifies the node with more distance. Based on the

distance, the method removes concern neighbor from the list.

Page 138: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

123

Figure 5.4 Flow Chart of Node Duplication Method

The Figure 5.4 shows the flow chart of node duplication method and

shows the stages in detail.

Find Common Nodes

Broadcast request and replymessage

Start

Identify more distancednode

Remove from neighbor table

Stop

For each neighbor

For each commonnode

Page 139: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

124

5.3.3 Location Verification Protocol

The location verification is performed by the source node while

choosing a route to transfer the packet toward the destination. The node

first performs the two hop neighbor discovery approach to collect the set of

neighbors located around the source node at a current time. Then by

collecting the neighbor information and their location, we compute the node

duplication method which identifies the fake location details and the nodes

which are present in the entire nodes neighbor list which is not possible in

the mobile ad-hoc network where each node has fixed transmission range.

The node duplication approach performs the location verification in an

easier manner.

Algorithm:

Step1: start

Step2: start discovering neighbor details.

Step3: perform node duplication method.

Step4: returns the result.

5.3.4 Node Duplication Location Verified Routing (NDLVR)

In this approach, the source node first performs neighbor discovery

using two hop neighbor discovery approach. With the discovered neighbors

Page 140: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

125

the method invokes the location verification protocol which identifies the list

of fake positions and adversaries in the given neighbor list. With the result

the node generates a route request (ADRR-Adversary disable route

request) message and multicast to all its neighbors other than the

adversary identified. We cannot say surely that the identified adversary is

known to the neighbor so that it attaches the adversary name with the

request. On receiving the request the neighbor also comes to know that the

specific node id is an adversary and will avoid the node while performing

route discovery. The neighbor node verifies the same by sending a hello

message to the adversary which in turn returns a hello reply which confirms

the node is an adversary. If the neighbor has route it sends a reply through

the path followed and otherwise it will send the same to other neighbors.

Finally when a node has a route to reach the destination it sends the reply

to the source node.

Pseudo Code of Node duplication location verification Algorithm

Input: Neighbor Table Nt, packet P.Output: NullStart

Read Neighbor table NT.

Page 141: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

126

generate route request ADDR.

ADDR = {seq.no, ADNAM, Source, Dest,TTl}.

multicast ADDR to neighbors.

Receive ADDR by neighbors.

Lookup the Destination in Neighbor table Nt.

If found send a reply to the source.

Else

Forward the route request to other neighbors than the ADNAM.

Receive Reply.

Forward reply.

End.Stop

The node duplication based location verification algorithm collected

the two hop neighbor details and based on that the algorithm verifies the

location of the nodes to improve the performance of mobile ad-hoc security

protocols.

Page 142: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

127

Figure 5.5 Flow Chart of Node Duplication Location Verification

The Figure 5.5 shows the flow chart of node duplication location

verification and shows the stages of verification in detail.

Start

Read neighbor table

Generate route request andbroadcast

Receive address from neighbors

Lookup in neighbor tables

Send reply to source

Forward request to otherneighbor

Stop

Page 143: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

128

5.4 Conclusion

We proposed a two-hop neighbor discovery with node duplication

method to perform location verification. The proposed method collects the

set of neighbors and their neighbors which have the location information of

neighbor discovered. Using the location details of the two-hop neighbors,

we compute the duplication method to identify the presence of duplicate

nodes in the entire nodes neighbor list which shows the presence of

adversary around the source node. The method performs route discovery

with the identified adversary node and by receiving the request, the

neighbors performs route discovery and avoids sending the request to the

identified fake node or adversary node. The neighbors do not simply avoid

the adversary node and itself will perform one hop neighbor discovery

where the adversary will produce its location or reply. The proposed light

weight location verification protocol reduces the overhead introduced by

other methods. This also reduces the traffic introduced in the base station

in verification process as designed in our previous one step verification

approach. The proposed method improves the accuracy of location

verification and reduces the time complexity also.

Page 144: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

129

CHAPTER – 6

RESULTS AND DISCUSSION

To improve the security performance in mobile ad-hoc networks the

author has discussed different approaches in this thesis. Each approach

has been implemented and evaluated for its efficiency in different

simulation scenarios. Towardamount the presentation of the planned

methods the following simulation setups have been used. The details of

simulation parameter are given below:

Simulation Parameter Value

Simulator Used NS2

Number of Nodes 200

Transmission Range 100 Meters

Simulation Time 5 Minutes

Table 6.1 Details of Simulation Parameters

Table 6.1 shows the details of simulation being used to evaluate the

performance of different protocols designed. Each protocol has been

validated for its efficiency under different network conditions.

Page 145: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

130

6.1A Light Weight Location Verification Protocol based on behavior

learning process for Mobile Adhoc Networks (LLV)

The light weight location verification protocol has been implemented

and the method learns the behavior of the nodes. The proposed system

produces very good results and it has been tested with a large number of

nodes and a large number of adversary nodes.

0102030405060708090

100

Secure Location NPV LLV

Adv

ersa

ry D

etec

tion

Acc

urac

y %

Adversary Detection Accuracy

Figure 6.1 Adversary Detection Accuracy between Existing method

and LLV

The Figure 6.1 shows that the accuracy of adversary detection

produced by different existing methods. The result shows that the proposed

behavior learning process has produced higher adversary detection

accuracy than Secure Location and NodePositionVerification.

Page 146: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

131

80

85

90

95

100

Secure Location NPV LLV

Lat e

ncy

Ra

t io

in m

ill

i se

con

ds Latency Ratio

Figure 6.2 Latency Ratio Produced By Existing Method and LLV

Figure 6.2 shows the comparison of latency introduced by different

methods and it shows clearly that the proposed method has lower latency

ratio than other methods.

Figure 6.3 Displacement Allowed according to transmission range

Displacement Ratio

Page 147: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

132

Figure 6.3 shows the result produced by the proposed system and

the average displacement allowed with the proposed system according to

the transmission range.

Figure 6.4 Traffic introduced by Existing SL, NPV and LLV Methods

Figure 6.4 shows the traffic introduced by proposed LLV and existing

Secure Location and Node Position Verification algorithm for the

verification process. The consequencesdemonstrations that our practice

introduces only slight traffic compare to other schemes.

Page 148: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

133

Figure 6.5 Security Performance Produced by Existing SL, NPV and

LLV Methods

Figure 6.5 shows the comparison of security performance produced

by different methods and it shows clearly that the proposed method has

produced higher security performance than other methods.

Figure 6.6 Throughput Performance by Existing SL, NPV and

LLV Methods

Page 149: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

134

Figure 6.6 shows the comparative result on throughput produced by

various methods and it shows clearly that the proposed LLV method has

produced higher throughput than other methods.

6.2Secure Discovery Scheme and Minimum Span Verification ofNeighbor Locations in Mobile Adhoc Networks(SDS)

The proposed Secure Discovery Scheme (SDS) and Minimum Span

Verification of Neighbour Locations have also been implemented and

tested for its efficiency with various parameters of network performance.

The proposed SDS approach produces very good results and this has been

tested with a large number of nodes and a large number of adversary

nodes.

Figure 6.7Adversary Detection Accuracy produced by SL, NPV, LLV

and SDS

Page 150: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

135

Figure 6.7 shows the comparison of adversary detection accuracy

and it shows clear that the proposed method has produced higher accuracy

in detection of accuracy.

Figure 6.8 Network overhead introduced by SL, NPV, LLV and SDS

Figure 6.8 shows the network overhead introduced by different

methods in performing location verification. It shows that the proposed

methodology introduces little network overhead compared with other

methods.

Page 151: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

136

.Figure 6.9 Time Complexity introduced by SL, NPV, LLV and SDS

Figure 6.9 shows the comparison of time complexity introduced by

various methods in location verification and it shows clearly that the

proposed method has produced less time complexity than Secure Location

and NPV.

Figure 6.10 Comparison of Latency Ratio Produced by SL, NPV, LLVand SDS

Page 152: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

137

The Figure 6.10 shows the comparison of latency introduced by

different methods and the result shows that the proposed method has

produced less latency than other methods.

Figure 6.11 Displacement Allowed by SL, NPV,LLV and SDS according

to Range

The Figure 6.11 shows the result produced and the average

displacement allowed by the proposed system with respect to the

transmission range.

Page 153: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

138

Figure 6.12 Traffic introduced by SL, NPV,LLV and SDS

The Figure 6.12 shows the traffic introduced by

NodePositionVerification algorithm with our methodology. The results show

that our methodology introduces only a little trafficcompare to other

systems.

Figure 6.13 Comparison of Security Performance Produced by SL,NPV, LLV and SDS

Page 154: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

139

The Figure 6.13 shows the comparison of security performance

produced by different methods and it shows clearly that the proposed

method has produced higher security performance than other methods.

Figure 6.14 Comparison of Throughput Performance Produced by SL,NPV, LLV and SDS

The Figure 6.14 shows the comparative result on throughput

produced by various methods and it shows clearly that the proposed

method has produced higher throughput than other methods.

6.3 Two Hop Neighbor Discovery Based Location Verification Protocol

for Mobile Adhoc Network Using Node Duplication Method

The proposed two hop neighbor discovery with node duplication

approach has been implemented and tested for its efficiency. The

plannedtechnique has produced effectualconsequences in all the factors of

Page 155: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

140

MANET routing. The method has produced higher resistance in adversary

node identification and has produced a higher rate of detection.

Figure 6.15 Adversary Detection Accuracy produced by SL, NPV, LLV

and NDLVR

The Figure 6.15 shows the comparison of adversary detection

accuracy and it shows clear that the proposed method has produced higher

accuracy in detection of accuracy.

Page 156: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

141

0

5

10

15

20

25

30

35

10 20 30 40 50 100 200

Ne

t wo

r k o

ve

r he

ad

in

byt e

sOverhead of adversary detection

Secure Location

NPV

LLV

NDLVR

Number of Adversariesge

Figure 6.16 Network overhead introduced by SL, NPV, LLV and

NDLVR

The Figure 6.16 shows the network overhead introduced by different

methods in performing location verification. The results show that our

methodology introduces only little network overhead compared with other

systems.

0

100

Secure LocationNPV

LLVNDLVR

Tim

e C

om

pl e

xi t

y in

ms

ec

Time Complexity

Figure 6.17 Time complexity introduced by SL, NPV, LLV and NDLVR

Page 157: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

142

The Figure 6.17 shows the comparison of time complexity introduced

by various methods in location verification and it shows clearly that the

proposed method has produced less time complexity than others.

Figure 6.18 Comparison of Latency Ratio introduced by SL, NPV, LLV

and NDLVR

The Figure 6.18 shows the comparison of latency introduced by

different methods and the result shows that the proposed method has

produced less latency than other methods.

Page 158: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

143

Figure 6.19 Displacement Allowed by SL, NPV, LLV and NDLVR

according to Range

The Figure 6.19 shows the result produced by the proposed system

and the average displacement allowed with the proposed system according

to the transmission range.

0

2

4

6

8

10

12

14

Traf

fic

in b

yt e

s

Traffic Ratio

Secure Location

NPV

LLV

NDLVR

Transmission Rangege

Figure 6.20 Traffic introduced by SL,NPV, LLV and NDLVR

Displacement Ratio

Page 159: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

144

The Figure 6.20 shows the traffic introduced by existing SL, NPV

algorithm with our methodology. The results show that our methodology

introduces only a little trafficcompare to other systems.

0

10

20

30

40

50

60

70

80

90

100

Secure Location NPV LLV NDLVR

Secu

r ity

Pe

r fo

r ma

nce

%

Security Performance

Figure 6.21 Security Performance introduced by SL, NPV, LLV and

NDLVR

The Figure 6.21 shows the comparison of security performance

produced by different methods and it shows clearly that the proposed

method NDLVR has produced higher security performance than other

methods.

Page 160: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

145

0

50

100

SecureLocation

NPVLLV

NDLVR

Thr o

ug

hp

ut

Per f

or m

an

ce % Throughput Performance

Figure 6.22 Throughput Performance introduced by SL, NPV, LLV and

NDLVR

The Figure 6.22 shows the comparative result on throughput

produced by various methods and it shows clearly that the proposed

method has produced higher throughput than other methods.

6.4 Conclusion

The author has proposed three different methods to improve the

throughput rate and security performance in mobile ad-hoc networks. Each

method has been evaluated for its efficiency in various parameters. The

results produced by the method have been verified with the results

produced by other methods. The result shows clearly that the proposed

approach has improved the performance of security in mobile ad-hoc

networks.

Page 161: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

146

CHAPTER-7

CONCLUSION AND FUTUREWORK

The problem of security in mobile ad-hoc network has been

discussed in different research articles and the security in mobile ad-hoc

network has been affected by false location. The malicious nodes present

false locations to the source node to get participated in data transmission.

By participating in the data transmission the malicious node performs

various malicious activities. To overcome the issue of security the author

has proposed different approaches in this thesis.

First the author proposed a light weight verification protocol which

learns the behavior of nodes. At each cycle the source node sends the

information about the transmission and the route in which the data has

been transmitted. At the verification stage the base station looked for the

incomplete transmission and based on that the method identifies the

presence of malicious node. We recycled one step Verification process,

which is a smaller amount time in controllable and we collect conduct of the

nodes occasionally, so that smooth if there are many numbers of

opponents present in the system we could classify easily with the help of

one step verification process. The behavior collection helps us to increase

the performance and throughput of the overall network, because the

forwarding node selection implies the performance of the overall system.

Even though the behavior collection introduces little network overhead for

6%, it reduces the time of verification and heaviness of computing

signature and using multiple solutions for the identification and confirmation

process, thus recovers the efficiency of the general network.

Page 162: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

147

To reduce the overhead, the author proposed the second method

secure neighbor discovery scheme, which uses proactive and reactive

details of the neighbor nodes to compute a group G, where a set of nodes

get selected according to the location details. From the group of nodes G, a

single node will be selected for the forwarding phase whose location will be

verified with the base station using some simple verification protocol. The

verification protocol uses the proactive and reactive details to verify the

location of the mobile node. The proposed method has more advantages

that the neighbor discovery is done with little overhead by the source node

and only the verification process engage with the base station.

The Third approach is about using two-step verification process. The

method collects the set of neighbors and their neighbors which have the

location information of neighbor discovered. Using the location details of

the two-hop neighbors, we compute the duplication method to identify the

presence of duplicate nodes in the entire nodes neighbor list which shows

the presence of adversary around the source node. The method performs

route discovery with the identified adversary node and by receiving the

request, the neighbors performs route discovery and avoids sending the

request to the identified fake node or adversary node. The neighbors do not

simply avoid the adversary node and itself will perform one hop neighbor

discovery where the adversary will produce its location or reply. The

proposed two hop neighbor discovery protocol reduces the overhead

introduced by other methods. This also reduces the traffic introduced in the

base station in verification process as designed in our previous one step

verification approach. The proposed method improves the accuracy of

location verification and reduces the time complexity also.

Page 163: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

148

All the method has been produced efficient results in different

parameters of MANET security. Further the research can be carried out by

adapting various other protocols which consider the neighbor conditions

and traces.

Page 164: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

149

REFERENCES

JOURNALS

1. D.E.Denning, “An Intrusion-Detection Model,” IEEE Transactions on

Software Engineering, 1987, vol.13 (2), pp. 222–232.

2. L.T.Heberlein, et.al., “A Network Security Monitor,” Proceedings of the

IEEE Computer Society Symposium on Research in Security and

Privacy, 1990, pp. 296–304, Oakland, Calif, USA, .

3. S.Deering, “ICMP Router Discovery Messages”, Internet Request for

Comments (RFC 1256), 1991.

4. Z.Grossman, et.al., “Tuning of Activation Thresholds Explains

Flexibility in the Selection and Development of T Cells in the Thymus,”

Proceedings of the National Academy of Sciences of the United States

of America, 1996, vol. 93 (25), pp. 14747–14752.

5. S. Das,et.al., “Comparative performance evaluation of routing

protocols for mobile ad hoc networks”, IEEE Proceedings Seventh

International Conference Computer Communications and Networks,

1998.

6. J.Kim, et.al., “The Artificial Immune Model for Network Intrusion

Detection,” Proceedings of the 7th European Conference on Intelligent

Techniques and Soft Computing (EUFIT '99), 1999.

Page 165: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

150

7. L.N.De Castro, et.al., “The Clonal Selection Algorithm with Engineering

Applications,” in Proceedings of Genetic and Evolutionary Computation

Conference (GECCO '00), 2000, pp.36–39.

8. Gil.T.M, et.al., “Multops: A Data Structure for Bandwidth Attack

Detection,” Proceedings of the 10th USENIX security symposium,

washington, 2001, pp.23-38.

9. J.Kim, et.al., “Towards an Artificial Immune System for Network

Intrusion Detection: An Investigation of Clonal Selection with a

Negative Selection Operator,” Proceedings of the Congress on

Evolutionary Computation(CEC '01), 2001, pp. 1244–1252.

10. NICHOLS, R. K., et.al., “ Wireless Security Models, Threats, and

Solutions”. McGraw–Hill, ISBN: 0-07-138038-8, 2002

11. Dipankar Dasgupta,et.al., “An Immunity-Based Technique to

Characterize Intrusions in Computer Networks,” IEEE Transactions on

Evolutionary Computation, 2002, vol. 6 (3), pp. 281–291.

12. Dipankar Dasgupta,et.al., “Anomaly Detection in Multidimensional Data

Using Negative Selection Algorithm,” Proceedings of the Congress on

Evolutionary Computation (CEC '02), 2002, vol. 2, pp. 1039–1044.

13. J. Kim, et.al., “A Model of Gene Library Evolution in the Dynamic

Clonal Selection Algorithm,” Proceedings of the 1st International

Page 166: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

151

Conference on Artificial Immune Systems (ICARIS '02), Canterbury,

UK, 2002.

14. Mirkovic.J, et.al., “Attacking DDoS at the Source,” 10th IEEE

International conference on network protocols, 2002, pp. 312-321.

15. Chang.D, ”Defending Against Flooding Based DDoS attacks” A

Tutorial, 2002.

16. Dean.D, et.al., “An Algebraic Approach to IP Traceback,” ACM

transactions on information and system security, 2002, vol.5 (2),

pp.119-137.

17. Edward Cheung, “LAN / WAN Technologies”, The Hong Kong

Polytechnic University Industrial Centre, LAN WAN.ppt, 2003.

18. Humayun Bakht, “The history of mobile Ad hoc networks”, Computing

unplugged magazine, 2003.

19. U.Aickelin, et.al., “Danger theory: the Link between AIS and IDS?”

Artificial Immune Systems, Springer, 2003, vol. 2787, pp.147–155.

20. Belenky.A et.al.,, “IP Traceback with Deterministic Packet Marking,”

IEEE communication,2003, vol. 7 (4), pp. 162-164.

21. Feinstein.L, et.al., “Statistical approaches to DDoS attack detection

and response,” Proceedings of DARPA Information survivability

conference and exposition, Washington DC, 2003, pp. 303-314.

Page 167: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

152

22. Mirkovic.P, et.al., “Coordinated suppression of simultaneous attacks”,

Proceeding of third DARPA information survivability conference,

pp.2-3, 2003.

23. Papadopoulos.C, et.al., “Coordinated suppression of simultaneous

attacks,” Proceedings of the DARPA information survivability

conference and exposition, Vol. 2, Washington, pp. 2-13, 2003.

24. I. STAMOULI. “Real-time intrusion detection for ad hoc networks”,

Master's thesis, University of Dublin, 2003.

25. Weichao Wang, et.al., "Visualization of wormholes in sensor networks”,

WiSe ’04: Proceedings of the 2004 ACM workshop on Wireless

security, pp. 51–60, 2004.

26. Christos.D,et.al., “DDoS attacks and defense mechanisms, A

classification and state of art”, Science Direct, vol.44 (5), pp: 643-656,

2004.

27. Lingxuan Hu, et.al., “Using directional antennas to prevent wormhole

attacks”, Symposium on Network and Distributed Systems Security

(NDSS), 2004.

28. Peng.T, et.al., “Detecting distributed denial of service attacks using

source IP address monitoring”, Proceedings of the 3rd International

networking conference, Athens , pp 771-782, 2004 .

Page 168: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

153

29. Mirkovic.J, et.al., “A taxonomy of DDoS attack and DDoS defense

mechanisms,” ACM SIGCOMM computer communications review,

2004, vol. 34 (2), pp. 39-53.

30. Z.Ji, et.al., “Real-valued negative selection algorithm with variable-

sized detectors,” Genetic and Evolutionary Computation-GECCO

Springer, 2004, pp. 287–298.

31. Lingxuan Hu, et.al., “Using directional antennas to prevent wormhole

attacks”, Symposium on Network and Distributed Systems Security

(NDSS), 2004.

32. Weichao Wang., et.al., “Visualization of wormholes in sensor

networks”, WiSe 04: Proceedings of the 2004 ACM workshop on

Wireless security, 2004, pp. 51–60, New York, NY, USA.

33. F.Liu, et.al.,, “Intrusion detection based on immune clonal selection

algorithms,” AI 2004: Advances in Artificial Intelligence, Springer, 2004

vol. 3339, pp. 1226–1232.

34. S.Cayzer, et.al., “What have gene libraries done for AIS?”Artificial

Immune Systems, Springer, 2005, vol. 3627 pp. 86–99.

35. T.Li, “An immune based dynamic intrusion detection model,” Chinese

Science Bulletin, 2005, vol. 50(22), pp. 2650–2657.

Page 169: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

154

36. Alessandro Armando, et.al., “The AVISPA tool for the automated

validation of internet security protocols and applications”, Proceedings

of CAV’ 2005, Springer-Verlag, 2005, pp. 281–285.

37. LeventeButtyan, et.al., “Statistical wormhole detection in sensor

networks”, Springer, 2005, vol. 3813, pp. 128–141.

38. J.Greensmith, et.al., “Introducing dendritic cells as a novel immune-

inspired algorithm for anomaly detection,” in Artificial Immune Systems,

Springer, 2005, vol.3627, pp:153–167.

39. J.Kim, et.al., “Danger is ubiquitous: detecting malicious activities in

sensor networks using the dendritic cell algorithm,” in Artificial Immune

Systems, Springer, 2005 vol. 3627, pp: 153–167.

40. Alessandro Armando, et.al., “The AVISPA tool for the automated

validation of internet security protocols and applications”, Springer,

2005, vol. 3813, pp: 128–141.

41. Lakhina.A, et.al., “Mining anomalies using traffic feature distributions,”

ACM SIGCOMM Computer communication review, 2005, vol. 35(4),

pp. 217-228.

42. Freiling.F, “Botnet tracking exploring a root cause methodology to

prevent DDoS attacks,” Computer security 2005, Milan, 2005, pp. 319-

335.

Page 170: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

155

43. Bing Wu,et.al.,” A Survey on Attacks and Countermeasures in Mobile

Ad Hoc Networks”, Springer, 2006

44. 1609.2-2006: IEEE Trial-Use Standard for Wireless Access in

Vehicular Environments - Security Services for Applications and

Management Messages, IEEE, 2006.

45. S.Capkunet.al., “Secure Positioning in Wireless Networks,” IEEE

J.Selected Areas in Communication, 2006, vol. 24(2), pp. 221-232.

46. A.Vora et.al., “Secure Location Verification Using Radio Broadcast,”

IEEE Trans. Dependable and Secure Computing, 2006, vol. 3(4), pp.

377-385.

47. T.Leinmu ller, et.al., “Improved Security in Geographic Ad Hoc Routing

through Autonomous Position Verification,” Proceedings ACM Third

International Workshop Vehicular Ad Hoc Networks (VANET), 2006.

48. www.baam.boun.edu.tr/news&events/seminar%20ppt/Evren_NETLAB

_2006.ppt, 2006

49. Larry L. Peterson, et.al, “Computer Networks: A Systems Approach”,

Elsevier, 2007

50. J.Kim, et.al., “Immune system approaches to intrusion detection—a

review,” Natural Computing, 2007, vol. 6(4), pp. 413–466.

Page 171: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

156

51. J.Hwang, et.al., “Detecting Phantom Nodes in Wireless Sensor

Networks,” Proceedings IEEE INFOCOM, 2007

52. J.Zeng, et.al., “A feedback negative selection algorithm to anomaly

detection,” in Proceedings of the 3rd International Conference on

Natural Computation (ICNC '07), 2007, pp. 604–608.

53. Kasper Bonne Rasmussen et.al., “Implications of radio fingerprinting

on the security of sensor networks”. International Conference on

Security and Privacy for Emerging Areas in Communications Networks

(SecureComm), 2007.

54. Gelenbe.E et.al., “A self-aware approach to denial of service defence”

Computer networks, 2007, pp 1299-1314.

55. Ritesh Maheshwari, et.al., “Detecting wormhole attacks in wireless

networks using connectivity information”, IEEE Conference on

Computer Communications INFOCOM, 2007.

56. Radha Poovendran, et.al.,“A graph theoretic framework for preventing

the wormhole attack in wireless ad hoc networks” 2007, vol 13, pp. 27–

59, Hingham, MA, USA.

57. Chen.Y, et.al., “Collaborative detection of DDoS attacks over multiple

network domains,” IEEE transaction on parallel and distributed

systems, 2007, vol. 18, No. 12, pp. 1649-1662..

Page 172: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

157

58. Chen.Z, et.al., “An inline detection and prevention framework for DDoS

attacks.” Computer Journal, 2007, pp 27- 40.

59. P.Papadimitratos, et.al., “Secure Neighborhood Discovery:A

Fundamental Element for Mobile Ad Hoc Networks,” IEEE Comm.

Magazine, 2008, vol. 46(2), pp. 132-139.

60. M.Poturalski, et.al., “Secure Neighbor Discovery in Wireless Networks:

Formal Investigation of Possibility,” Proceedings ACM Symposium.

Information, Computer and Communication Security (ASIACCS), 2008.

61. S.Capkun, et.al., “Secure Location Verification with Hidden and Mobile

Base Stations,” IEEE Trans. Mobile Computing, 2008, vol. 7(4), pp.

470-483.

62. Joshi.R.C, et.al., “An ISP level solution to combat DDoS attacks using

combined statistical based approach,” International journal of

information assurance and security, 2008 vol. 3, No. 2, pp. 102-110.

63. S.T.Powers, et.al., “A hybrid artificial immune system and Self

Organising Map for network intrusion detection,” Information Sciences,

2008, vol. 178(15), pp. 3024–3042.

64. Asha Nagesh, “Distributed network forensics using jade mobile agent

framework, 2008.

Page 173: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

158

65. E.Ekici, et.al., “Secure Probabilistic Location Verification in Randomly

Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks,

2008, vol. 6, no. 2, pp. 195-209.

66. T.Anantvalee et.al., “A Survey on Intrusion Detection in Mobile Ad Hoc

Networks,” in Wireless/Mobile Security. New York: Springer- Verlag,

2008.

67. M.T.Thai, et.al., “On Detection of malicious Users Using Group Testing

Techniques,” Proceedings International Conference Distributed

Computing Systems (ICDCS), 2008.

68. S.Khattab, et.al., “Live Baiting for Service-Level DoS Attackers,”

Proceedings IEEE INFOCOM, 2008

69. M.Poturalksi, et.al., “Towards Provable Secure Neighbor Discovery in

Wireless Networks,” Proceedings Workshop Formal Methods in

Security Engineering, 2008.

70. J.H.Song, et.al., “Secure Location Verification for Vehicular Ad-Hoc

Networks,” Proceedings IEEE Globecom, 2008.

71. V.C.Gungoret.al., “Industrial wireless sensor networks: Challenges,

design principles, and technical approach,” IEEE Transaction. Ind.

Electron., 2009, vol. 56(10), pp. 4258–4265.

Page 174: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

159

72. R. R. Mudholkar, et.al.,”On-Demand Routing In Multi-Hop Wireless

Mobile Ad Hoc Networks”, Thesis, Department of Electronics, Shivaji

University, Kolhapur, 2009

73. J.Yang, et.al., “Distributed agents model for intrusion detection based

on AIS,” Knowledge-Based Systems, 2009, vol. 22(2) pp. 115–119,

2009.

74. J.Chiang, et.al., “Secure and Precise Location Verification Using

Distance Bounding and Simultaneous Multilateration,” Proceedings

Second ACM Conf. Wireless Network Security (WiSec), 2009.

75. Min.A.W, “Attack tolerant distributed sensing for dynamic spectrum

access networks, IEEE conference on network protocols, 2009.

76. Liu.J, et.al., “Botnet classification, attacks, detection, tracing, and

preventive measures,” EURASIP Journal, Wireless communications

and networking, 2009, vol. 2009, pp.11.

77. Gupta.B.B, et.al., “Defending against DDoS attacks: Issues and

challenges,” Information security journal: A global perspective, 2009,

vol. 18, No. 5, pp. 224-247.

78. Chen C.L, “A new detection method for distributed denial of service

attack traffic based on statistical test”, Journal of universal computer

science 15, 2009, pp 488-504.

Page 175: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

160

79. Pravin Ghoasekar, “Mobile Ad Hoc Networking: Imperatives and

Challenges”, IJCA Special Issue on Mobile Ad-hoc Networks MANETs,

2010.

80. S.X.Wu, et.al.,, “The use of computational intelligence in intrusion

detection systems: a review,” Applied Soft Computing Journal, 2010,

vol. 10, no. 1, pp. 1–35.

81. V.D.Kotovet.al., “Immune model based approach for network intrusion

detection,” Proceedings of the 3rd International Conference on

Security of Information and Networks (SIN '10), 2010, pp. 233–237.

82. P.S.Andrews et.al., “Tunable detectors for artificial immune systems:

from model to algorithm,” Bioinformatics for Immunomics, Springer,

New York, NY, USA, 2010 vol. 3, pp. 103–127.

83. Vokorokos.L, “ Host Based Intrusion Detection System”, Intelligent

Engineering Systems (INES), 2010, pp. 43 – 47.

84. W. Tang, et.al., “Avidity-model based clonal selection algorithm for

network intrusion detection,” in Proceedings of the IEEE 18th

International Workshop on Quality of Service (IWQoS '10), 2010, pp.

1–5.

85. Nguyen.H et.al,“ Proactive detection of DDoS attacks utilizing k-NN

classifier in an anti-DDoS framework.”, International journal of

Page 176: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

161

electrical, computer, and systems engineering, 2010, vol. 4, pp. 247–

252,.

86. Liu.Y, et.al., “DDoS attack detection based on neural network,”

Proceedings of IEEE 2nd international symposium on aware

computing, pp.196-199, 2010.

87. Chi Chun.L "A cooperative intrusion detection system framework for

cloud computing networks,", in parallel processing workshops, 39th

International conference, 2010, pp 280-284.

88. Medina.A., et.al., ”A performance model of neighbor discovery in

proactive routing protocols”, Prof. ACM PE-WASUN, 2010, pp. 66–70.

89. R. R. Mudholkar, et.al.,”On-Demand Routing In Multi-Hop Wireless

Mobile Ad Hoc Networks”, Thesis, Department of Electronics, Shivaji

University, Kolhapur, 2009

90. T.S.Sobh, et.al., “A cooperative immunological approach for detecting

network anomaly,” Applied Soft Computing Journal, 2011, vol. 11, pp.

1275–1283.

91. Agarwa, et.al., “Estimating strength of a DDoS attack in real time using

ANN based scheme,” Communications in computer and information

science, Springer, 2011, pp 301-310.

Page 177: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

162

92. J. Zeng, et.al “A novel intrusion detection approach learned from the

change of antibody concentration in biological immune response,”

Applied Intelligence, 2011, vol. 35(1), pp. 41–62,.

93. G.Calandriello, et.al., “On the Performance of Secure Vehicular

Communication Systems,” IEEE Transaction Dependable and Secure

Computing, 2011, vol. 8(6), pp. 898-912.

94. M. Fiore, et.al., “Secure Neighbor Position Discovery in Vehicular

Networks,” Proc. IEEE/IFIP 10th Ann. Mediterranean Ad Hoc

Networking Workshop (Med-Hoc-Net), 2011.

95. Xu Li, et.al., “Mobility Prediction Based Neighborhood Discovery in

Mobile Ad Hoc Networks”, Springer, Networking, 2011, vol. 6640,

pp:241-253.

96. Qi.C, “A packet filtering method for DDoS attack defense in cloud

environment", dependable, autonomic and secure computing, IEEE 9th

international conference, 2011, pp. 427- 434.

97. Akbani, et.al., “Mobile ad-hoc network security,” Journal of electrical

engineering, Springer, 2012, vol. 127, pp. 659-666.

98. Katkamwar. et.al., “Securing cloud servers against flooding based

DDoS attacks”, International journal of application or innovation in

engineering & management, 2012, vol 1(3).

Page 178: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

163

99. Joshi.B, “Securing cloud computing environment against DDoS

attacks," Computer communication and informatics (ICCCI),

International conference, 2012, pp. 1-5.

100. Haldar.N.A, “An activity pattern based wireless intrusion detection

system information technology, information technology”: New

Generations (ITNG), 2012, pp 846- 847.

101. Gilad.V, et.al., ‘‘LOT: A defense against IP spoofing and flooding

attacks,’’ ACM transaction on information systems, 2012.

102. Gupta B.B, et.al. “ANN based scheme to predict number of zombies

in DDoS attack.” International journal of network security, 2012, vol.

14, pp 36-45.

103. Francois.J, et.al.,“A collaborative protection network for the detection

of flooding DDoS attacks.” IEEE/ACM transaction on networking,

2012 vol. 20, pp.1828-1841.

104. Radu Stoleru, et.al., “Secure Neighbor Discovery and Wormhole

Localization In Mobile Adhoc Networks”, ACM, Adhoc networks,

2012, vol.10(7), pp:1179-1190.

105. Alomari.E, et.al., “Botnet based DDoS attacks on web Servers:

Classification and art,” International journal of computer applications,

2012, vol. 49(7), pp. 24-32.

Page 179: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

164

106. L.Peng, et.al., “Dynamically real-time anomaly detection algorithm

with immune negative selection,” Applied mathematics & Information

Sciences, 2013, vol. 7(3), pp. 1157–1163.

107. Elhadi.M, et.al, “EAACK—A Secure Intrusion-Detection System for

MANETs”, IEEE TRANSACTIONS ON INDUSTRIAL

ELECTRONICS, 2013, vol. 60(3).

108. Seon Yeong Han, “An Adaptive Hello Messaging Scheme for

Neighbor Discovery in On-Demand MANET Routing Protocols”, IEEE

Transactions on communication, 2013, vol 17(5), pp-1040-1043.

109. Priyadarshani.K, “Dynamic Neighbor Positioning In Manet with

Protection against Adversarial Attacks”, IJCER, 2013, vol 3(4).

110. M. Fiore, “Discovery and Verification of Neighbor Positions in Mobile

Ad Hoc Networks”, IEEE Transactions on Mobile Computing, 2013,

vol. 12 (2),pp. 289-303.

111. Thilagavathy.S, ”Neighbor node discovery and Trust prediction in

MANETs”, International Journal of Science, Engineering and

Technology Research (IJSETR) , 2013, vol. 2(1).

112. Munivara Prasad et.al., “Discrimination of flash crowd attacks from

DDoS attacks on internet threat monitoring (ITM) using entropy

Page 180: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

165

variations”, IEEE African journal of computing, 2013, vol. 6(2), pp. 53-

62.

113. Negi.P, et.al., “ Enhanced CBF packet filtering method to detect

DDoS attack in cloud computing environment,” International journal of

computer science issues, 2013, vol. 10(1), pp 142-146.

114. Lonea.A.M, et.al.,,“DDoS attacks in cloud computing environment,”

International journal of computing and communication, 2013, vol

8(1), pp 70-78.

115. Huang V.S, "A DDoS mitigation system with multi stage detection and

text based turing testing in cloud computing," In advanced information

networking and applications workshops, International conference

2013, pp.655-662.

116. Ismail.M.N, “Detecting flooding based dos attack in cloud computing

environment using covariance matrix approach," Presented at the

proceedings of the 7th international conference on ubiquitous

information management and communication, Kota, Malaysia, 2013.

117. Madhav.K et.al., “DDoS attack detection based on an ensemble of

neural classifier”, International journal of computer science and

network security, 2014, vol.14(7).

Page 181: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

166

118. Khandelwal.S "SNMP reflection DDoS attacks on the rise”, The

Hackers News, 2014.

119. Junho.C, et.al., “A method of DDoS attack detection using HTTP

packet pattern and rule engine in cloud computing environment”,

springer, soft computing, 2014, vol. 18(9), pp. 1697-1703.

120. Kanchan.H, et.al., ”Secure network access by flow analysis based

detection against DDoS attack”, International journal of advanced

research in computer science and software engineering, 2014, vol.

4(9).

121. Deepesh.N, et.al., “Detection approach for DoS attack in dynamic

wireless networks,” Journal of electronics and communication

engineering research, 2014, vol. 2, pp: 01-06.

122. Dhruv.A, et.al., “Detection and mitigation of DDoS attack against web

server”, IJEDR, 2014, vol 2(2).

123. FuiFui.W et.al., “A Survey of trends in massive DDoS attacks and

cloud-based mitigations,” International journal of network security &

its applications, 2014, vol.6(3).

124. Anil Kumar Gona, et.al, “Discovery and Verification of Neighbor

Positions in MobileAD HOC Networks”, International Journal of

Page 182: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

167

Research Studies in Science, Engineering and Technology, 2014, vol

1(8), PP 1-8.

125. Jeena.J, et.al., “Analysis detection and prevention of users from click

jacking attack using DDoS”, IJEDR, 2015.

126. Khundrakpam Johnson.S, et.al., “A Novel Approach of detection and

mitigation of DDoS attack”,International conference on computer

science, data mining & mechanical engineering ,2015.

127. Khalid.S, et.al., “ A novel botnet detection system to identify resilient

p2p-botnet”, International journal of engineering sciences & research

technology, 2015.

128. Junho.H, et.al., ”Implementation of graphic based network intrusion

detection system for server operation”, International journal of

security and its applications, 2015, vol.9(2), pp 37-48.

129. Galante.J, “Sony network breach shows amazon clouds appeal for

hackers”, 2015.

130. Geerthidevi.K.G, et.al., “Social network based security schema for

botnet detection and prevention”, International journal of engineering

and computer science, 2015, vol. 4(6).

Page 183: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

168

131. Ahmed.R et.al., “A defense framework against DDoS in a multipath

network environment”, Scientific research publishing,

Communications and network, 2015, pp 106-116.

132. Andrew.C, et.al.,”Defence for DDoS attacks in cloud computing”

International conference on advanced wireless, information, and

communication technologies, 2015, vol.73, pp. 490-497.

133. Chaitanya.H et.al., “Anomaly based DDoS attack detection”,

International journal of computer applications, 2015, vol. 123, pp.17.

BOOKS

1. C. Siva Ram Murthy et.al., “Ad Hoc Wireless Networks: Architectures

and Protocols”, Prentice Hall communications engineering and emerging

technologies series Upper Saddle River, 2004.

2. Tanenbaum, et.al., “COMPUTER NETWORKS”, Pearson Education,

Inc., publishing as Prentice Hall, 2011

Page 184: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

169

LIST OF PUBLICATIONS

International Journals

1. “Two Hop Neighbor Discovery Based Location Verification Protocol for

Mobile Adhoc Network Using Node Duplication Method” in International

Journal of Innovative Research in Engineering & Science, ISSN 2319-

5665, Volume 1, Issue 4, January 2015, pp:25-33

2. “Secure Discovery Scheme and Minimum Span Verification of Neighbor

Locations in Mobile Ad-hoc Networks” in Australian Journal of Basic and

Applied Sciences, AENSI Journals, ISSN:1991-8178 8(2), February

2014, pp: 30-36.[ANNEXURE-II]

3. “A Light Weight Location Verification Protocol Based on Behavior

Learning Process for Mobile Adhoc Networks” in International Journal of

Scientific & Engineering Research, ISSN 2229-5518, Volume 4, Issue

11, November -2013,pp:214-218.

Page 185: RATE CONTROLLING AND SCHEDULING IN WIRELESS ADHOC … · Dr.DEKSON.D.E Professor, CSE & IT, Chennai. Aarupadai Veedu Institute of Technology, 10.03.2016 Paiyanoor, Chennai CERTIFICATE

170

Conference

1. Presented a paper titled “An Approach for avoiding Wormhole attacks in

MANET routing using Digital Signature” at a National Conference held at

Maharaja Engineering College for Women, Perundurai, Salem on 2nd

Feb 2013

2. Presented a paper titled “Throughput Rate Controlling in Wireless Adhoc

Network” at an International Conference held at VIT University, Vellore

on Nov 8-9, 2012.

3. Presented a paper titled “End-to-End Packet Delay Minimization with

Energy Efficient in Wireless Adhoc Networks” at an International

Conference held at Mahendra Engineering College, Salem on 29th – 31st

Mar 2012.

4. Presented a paper titled “Improvisation of Throughput for Multichannel

WMNS” in the National level conference conducted by V.M.K.V.

Engineering College, Salem on 11th Mar 2011.