SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
30
Migrating Packet Dropping in Mobile Ad-hoc Network Based on
Modified ACK-Based Scheme
1
Shalini Sharma, 2
Proff. Mr. Hitesh Gupta,3
Proff. Mr. Pankaj Kawadkar
1
Shalini Sharma,M.tech(IV th Sem),PIT, Bhopal,shalu_vash@yahoo.co.in
2
Proff. Mr. Hitesh Gupta, Dept. Of Computer Science & Eng. PCST Bhopal,gupta_hitesh@sify.com
3
Proff. Mr. Pankaj Dept. of Computer Science & Eng. PIES Bhopal,kawadkarpankaj@gmail.com
Shalini Sharma
Patel Institute of Tech. Bhopal(m.p)
E-mail: shalu_vash@yahoo.co.in
Abstract
Dynamic topology and infrastructure less behavior provide a great facility for adhoc network. Such facility
generates easy connection of adhoc network and provides node mobility without loss of connection. In such
ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network
suffered some serious security threats such attacks are black hole attack, malicious attack and worm hole attack
that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet
dropping various authors built various method such method is node authentication, passive feedback scheme,
ack-based scheme, reputation based scheme and incentive based scheme, ack-based scheme suffered a problem
of massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the
requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme
using secure channel for overcoming the problem of decision ambiguity for requested node, improved node
authentication and minimize packet dropping in adhoc network.
Keywords mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach,
network security.
1. Introduction
Adhoc network is a group collection of mobile node. During the last few years we have all witnessed steadily
increasing growth in the deployment of wireless mobile communication networks. Mobile ad hoc networks
consist of
nodes that are able to communicate through the use of wireless mediums and form dynamic topologies. The
basic characteristic of these networks is the complete lack of any kind of infrastructure, and therefore the
absence of dedicated nodes that provide network management operations as do the traditional routers in fixed
networks. In order to maintain connectivity in a mobile ad hoc network all participating nodes have to perform
routing of network traffic. The cooperation of nodes cannot be enforced by a centralized administration authority
since one does not exist. Therefore, a network-layer protocol designed for such self-organized networks must
enforce connectivity and security requirements in order to guarantee the undisrupted operation of the higher
layer protocols. Unfortunately all of the widely used ad hoc routing protocols have no security considerations
and trust all the participants to correctly forward routing and data traffic.
Fig.1 Shows that scenario of ad-hoc network
The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons:
firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active
interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security
mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
31
which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy
algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being
compromised and then being used by adversary to launch attacks on networks.
MANET stands for Mobile Ad- hoc Network. It infrastructureless wireless network. A MANET can be formed
either by mobile nodes or by both fixed and mobile nodes. Nodes randomly associate with each other forming
arbitrary topologies. They act as both routers and hosts. The ability of mobile routers to self-configure makes this
technology suitable for provisioning communication to, for instance, disaster-hit areas where there is no
communication infrastructure, conferences, or in emergency search and rescue operations where a network
connection is urgently required. The need for mobility in wireless networks necessitated the formation of the
MANET working group within The Internet Engineering Task Force (IETF) for developing consistent IP routing
protocols for both static and dynamic topologies.
Figure : 2
Figure : 3
There are five main security services for MANETs: authentication, confidentiality, integrity, non-repudiation,
availability. Authentication means that correct identity is known to communicating partner; Confidentiality
means certain message information is kept secure from unauthorized party; integrity means message is unaltered
during the communication; no repudiation means the origin of a message cannot deny having sent the message
availability means the normal service provision in face of all kinds of attacks. Among all the security services,
authentication is probably the most complex and important issue in MANETs since it is the bootstrap of the
whole security system. Without knowing exactly who you are talking with, it is worthless to protect your data
from being read or altered. Once authentication is achieved in MANET, confidentiality is a matter of encrypting
the session using whatever key material the communicating parties agree on. Note that these security services
may be provided singly or in combination. In security concern node authentication scheme is better option for
secured communication in mobile adhoc network. The most efficient node authentication is ACK-Based scheme.
The ACK-Based scheme provides a node authentication security in adhoc network. But this scheme generates a
Start
Nodes send signal to find the number of other nodes within range
Synchronizing between nodes
Sender node send messages to receiving node
receiving node ready
Communication begins
Termination Process
Stop
Receiving node
Send back
Ready signal
Is Wait for
sometime
NoYes
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
32
huge amount of packet load in network; the generated packet generates a packet dropping in network. The
generation of huge amount of wastes the bandwidth of network and performance of network decreases.
2 .Routing protocol in wireless ad hoc network
2.1 Routing Concept
Routing is the act of moving information from source to a destination in an internet work. During this process, at
least one intermediate node within the internetwork is encountered.
The routing concept basically involves two activities: firstly, determining optimal paths and secondly, transferring
the information groups (called packets) through an internetwork. The latter concept is called as packet switching,
which is straight forward, and path determination is very complex. Routing protocol uses several matrices to
calculate the best path for the routing the packet to its destination. These matrices are a standard measurement that
could be number of hops, which is used by the routing algorithm to determine the optimal path for the packet to its
destination. The process of path determination is that, routing algorithms initialize and maintain routing tables,
which contain the total route information for packet. This route information varies form one routing algorithm to
another. Routing tables are filled with a variety of information which is generated by routing algorithms. Most
common entries in the routing table are ip-address prefix and the next hop. Routing tables Destination/next hop
associations tell the router that a particular destination can be reached optimally by sending the packet to router
representing the "next hop" on its way to final destination and ip-address prefix specifies a set of destinations for
which the routing entry is valid for.
In mobile ad-hoc network every node is having routing capability. Nodes are within the radio range (transmission-
range) are called its Neighbors. When the destination node is neighbor of source node, packets are transferred with
single hop. When the destination node is neighbor of source node, packets are transferred with single hop. When
the destination node is out of radio-range (not a neighbors of source node) then packet are transferred in multiple
hops using intermediate nodes. These intermediate nodes (neighbors of source node) forward packets to their
neighbors and so on till destination is reached. This is shown below:
Figure 4(a) : Single hop transfer when S & D in a radio range
Figure 4 (b): Multiple hops when S & D are not in redio range
S
D
S
D
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
33
3.ACK-based schemes
ACK based scheme overcome the limitation of passive-feedback technique when power control transmission is
used. To implement this scheme, an authentication mechanism is used to prevent the next hop from sending a
forged ACK packet on behalf of the intended two hop neighbor. The main drawback of this scheme is the huge
overhead. In order to reduce the overhead, the authors have proposed that each node asks its two hop neighbor to
send back an ACK randomly rather than continuously. Likewise, this extension also fails when the two hop
neighbor refuses to send back an ACK. In such situation, the requester node is unable to distinguish who is the
malicious node, its next hop or the requested node. To overcome the previous ambiguity in determining the true
malicious node, focuses on detecting malicious links instead of malicious nodes .This scheme is based on 2ACK
packet that is assigned a fixed route of two hops in the opposite direction of the received data traffic’s route. In
this scheme, each packet’s sender maintains the following parameters; (i) list of identifiers of data packets that
have been sent out but have not been acknowledged yet, (ii) a counter of the forwarded data packets, (iii) and a
counter of the missed packets.
4 .Modified ACK-based scheme
In the existing ack-based scheme uses 2ack process for the node authentication process in attack scenario in ad-
hoc network. These 2ack based scheme generate a huge amount of ack packet in the network and also give
decision ambiguity for requested node and then effect quality of service .now we modified these scheme used
finite state automata. Finite state automate provide a state of route ack, due to this node ack packet maintain state
between node to request and respond node. In this process we used some extra buffered memory for maintain a
state of node .that memory area maintain a path state due to given request and response. For maintaining a
request packet acknowledgment we calculate the next hop with dsdv protocol concept. Path state maintains a
sequence of ack packet.
5. Simulation parameter & simulation result: simulation setup
Table I
Simulation used NS-2.34
Topology area 1200 X 1200
No. of Mobile Nodes 25
Max. No. of Connection 30
Simulation Time 200
Speed 10-20 m/sec
Communication Link Capacity 10 Mbps
Traffic Intensity 45,85,95,180
Routing Protocol AODV
In order to simulate the scenarios described above, the implementation was done in NS-2.34 Network Simulator.
The simulation scenario to simulate MANET, which uses AODV without packet drop and with packet drop are
given in table.
results:
This set contains result of comparisons of Graph b/w Throughput with secure channel and without secure
channel, Average E- E Delay, Packet Delivery Ratio and Avg. Jitter and Routing Load in Ad Hoc network.
Comparison b/w packet delivery ratio between with secure channel without secure channel
Figure 5: Effect on PDR using secure channel in mobile adhoc network
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
34
The result shows both the cases, with the secure channel and without the secure channel it is measured that the
packet delivery ratio is dramatically decreases when the network are not using secure channel. Hence, for better
delivery of packet a secure channel is must in the network.
Comparison b/w throughput with secure channel without secure channel
Figure 6: Effect on throughput using secure channel in mobile adhoc network
This result shows that throughput of the network with secure channel is greater as compared to the throughput of
the network without containing secure channel. Decease in throughput indicates that the resources are not
utilized in the most efficient manner, it also points out that the available resources can be utilized in a more
efficient manner. Clearly it shows that without using secure channel in a network has detrimental effect on
throughput.
Comparison b/w Routing load with secure channel without secure channel
Figure 7: Effect on Routing Load using secure channel in mobile adhoc network
This result also shows that, routing load increases without using secure channel as compared to the network
using secure channel. Due to this, if the network does not use secure channel then the overhead and traffic load
or congestion increases. So the network must use secure channel.
6. Conclusion & Recommendation
Without infrastructure and node mobility in adhoc network is a great challenge in security concern. For security
concern various method are proposed for node authentication in mobile adhoc network. The authentication
scheme of leader agent and member surveillance greatly reduces the relative calculating overheads and
communication costs. Generally speaking, when leader agent node and surveillance nodes are not destroyed, the
united nodes can ensure the reliability, the authentication result is reliable. The dissertation proposes a novel
scheme for migrating packet dropping in mobile adhoc network. Our proposed method uses secure channel to
overcome the decision ambiguity in requested node and node authentication. In this dissertation secure channel
maintain a state of request and reply such fashion minimize packet overhead in network.Our proposed method
also removes the node ambiguity in 2ACK hop for authentication process. And minimize a packet dropping in
mobile adhoc network Our proposed mechanism has overcome some of the limitations like it has the required
some extra buffer memory for maintain a state of request/reply automata. It also introduces little bit
computational overhead during route advertisement and path establishment.
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.4, No.11, 2013
35
References
[1]. (MANET)”, International Journal of Electrical and Electronics Engineering (IJEEE), ISSN (PRINT): 2231 – 5284 Vol-1
Iss-4, 2012.
[2]. Satyendra Tiwari, Anurag Jain and Gajendra Singh Chowhan: “Migrating Packet Dropping in Adhoc Network Based on
Modified ACKbased Scheme Using FSA” International Journal on Emerging Technologies 2(2): 102-105(2011).
[3]. Kejun Liu, Jing Deng: “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”,
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5, MAY 2007.
[4]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto: “A Dynamic Anomaly Detection Scheme
for AODV-Based Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58,
NO. 5, JUNE 2009.
[5]. Zonghua Zhang, Farid Na¨ıt-Abdesselam Pin-Han Ho, Xiaodong Lin:” RADAR: a ReputAtion-based Scheme for
Detecting Anomalous Nodes in WiReless Mesh Networks”, 1525-3511/08©2008 IEEE
[6]. Soufine Djahel Farid Na, ıt-Abdesselam and Ashfaq Khokhar:” An Acknowledgment-Based Scheme to Defend Against
Cooperative Black Hole Attacks in Optimized Link State Routing Protocol”, 978-1-4244-2075-9/08©2008 IEEE.
[7]. Zhengming Li and Chunxiao Chigan Danniel Wong: “AWF-NA: A Complete Solution for Tampered Packet Detection
in VANETs” 978-1-4244-2324-8/08©2008 IEEE.
[8]. Z. Wang, C. Chigan, “Countermeasure uncooperative behaviors with dynamic Trust-Token in VANETs”, in Proc. of
IEEE International Conference on Communications (ICC 2007), pp.3959 – 3964, June 2007.
[9]. S. Buchegger and J. Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in
dynamic adhoc networks),” in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing
(MoBiHOC). June 2002
[10]. [11].S. Marti, T. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. of
MOBICOM, 2000.
[11]. http://www.ietf.org/rfc/rfc2501.txt. date last viewed: 2008-12-31.
[12].T. S. Rappaport, “Wireless Comunication: Principles and Practice”, Parentice-Hall, 1996.
[13].Zhijiang Chang, Georgi Gayadadjiev, Stamatis Vassiliadis, “Routing Protocols for Mobile Ad-hoc Newtorks: Current
Development and Evaluation”.
[14].M.O. Rabin. Digitalized signatures and public key functions as intractable as factorization. Technical Report No. 212,
MIT Laboratory of Computer Science, MIT/LCS/TR-212, 1979.
[15]. G. Gaubatz, J.P. Kaps, and B. Sunar, “Public key cryptography in sensor networks-revisited”. In 1st European
Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004.
[16].R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, Theory of spread spectrum communications: a tutorial. IEEE
Transactions on Communications, 20(5):855.884, May 1982.
[17].Mr. Ankur Khetrapal, “ Routing techniques for Mobile Ad Hoc Newtorks Classification and Qualitative/Quantitative
Analysis”.
[18].Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa: “Ad Hoc Mobile Wireless Network: Principles, Protocols and
Applications”
[19].S. Murphy, J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks
and Applications Journal, pages 183-197, Nov.1996. http://citeseer.nj.nec.com/10238.html
[20].Rutvij H. Jhaveri Ashish D. Patel, Jatin D. Parmar,Bhavin I. Shah: “ MANET Routing Protocols and Wormhole Attack
against AODV” IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010.
[21].C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel" Proc. IEEE SICON'97,
Apr.1997, pp.197-211.
[22].C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks" IEEE
Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-79.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Was ist angesagt?

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 

Was ist angesagt? (18)

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 

Ähnlich wie Migrating packet dropping in mobile ad hoc network based on modified ack-based scheme

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANijtsrd
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 

Ähnlich wie Migrating packet dropping in mobile ad hoc network based on modified ack-based scheme (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Aodv
AodvAodv
Aodv
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Migrating packet dropping in mobile ad hoc network based on modified ack-based scheme

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 30 Migrating Packet Dropping in Mobile Ad-hoc Network Based on Modified ACK-Based Scheme 1 Shalini Sharma, 2 Proff. Mr. Hitesh Gupta,3 Proff. Mr. Pankaj Kawadkar 1 Shalini Sharma,M.tech(IV th Sem),PIT, Bhopal,shalu_vash@yahoo.co.in 2 Proff. Mr. Hitesh Gupta, Dept. Of Computer Science & Eng. PCST Bhopal,gupta_hitesh@sify.com 3 Proff. Mr. Pankaj Dept. of Computer Science & Eng. PIES Bhopal,kawadkarpankaj@gmail.com Shalini Sharma Patel Institute of Tech. Bhopal(m.p) E-mail: shalu_vash@yahoo.co.in Abstract Dynamic topology and infrastructure less behavior provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security threats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme, reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security. 1. Introduction Adhoc network is a group collection of mobile node. During the last few years we have all witnessed steadily increasing growth in the deployment of wireless mobile communication networks. Mobile ad hoc networks consist of nodes that are able to communicate through the use of wireless mediums and form dynamic topologies. The basic characteristic of these networks is the complete lack of any kind of infrastructure, and therefore the absence of dedicated nodes that provide network management operations as do the traditional routers in fixed networks. In order to maintain connectivity in a mobile ad hoc network all participating nodes have to perform routing of network traffic. The cooperation of nodes cannot be enforced by a centralized administration authority since one does not exist. Therefore, a network-layer protocol designed for such self-organized networks must enforce connectivity and security requirements in order to guarantee the undisrupted operation of the higher layer protocols. Unfortunately all of the widely used ad hoc routing protocols have no security considerations and trust all the participants to correctly forward routing and data traffic. Fig.1 Shows that scenario of ad-hoc network The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 31 which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and then being used by adversary to launch attacks on networks. MANET stands for Mobile Ad- hoc Network. It infrastructureless wireless network. A MANET can be formed either by mobile nodes or by both fixed and mobile nodes. Nodes randomly associate with each other forming arbitrary topologies. They act as both routers and hosts. The ability of mobile routers to self-configure makes this technology suitable for provisioning communication to, for instance, disaster-hit areas where there is no communication infrastructure, conferences, or in emergency search and rescue operations where a network connection is urgently required. The need for mobility in wireless networks necessitated the formation of the MANET working group within The Internet Engineering Task Force (IETF) for developing consistent IP routing protocols for both static and dynamic topologies. Figure : 2 Figure : 3 There are five main security services for MANETs: authentication, confidentiality, integrity, non-repudiation, availability. Authentication means that correct identity is known to communicating partner; Confidentiality means certain message information is kept secure from unauthorized party; integrity means message is unaltered during the communication; no repudiation means the origin of a message cannot deny having sent the message availability means the normal service provision in face of all kinds of attacks. Among all the security services, authentication is probably the most complex and important issue in MANETs since it is the bootstrap of the whole security system. Without knowing exactly who you are talking with, it is worthless to protect your data from being read or altered. Once authentication is achieved in MANET, confidentiality is a matter of encrypting the session using whatever key material the communicating parties agree on. Note that these security services may be provided singly or in combination. In security concern node authentication scheme is better option for secured communication in mobile adhoc network. The most efficient node authentication is ACK-Based scheme. The ACK-Based scheme provides a node authentication security in adhoc network. But this scheme generates a Start Nodes send signal to find the number of other nodes within range Synchronizing between nodes Sender node send messages to receiving node receiving node ready Communication begins Termination Process Stop Receiving node Send back Ready signal Is Wait for sometime NoYes
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 32 huge amount of packet load in network; the generated packet generates a packet dropping in network. The generation of huge amount of wastes the bandwidth of network and performance of network decreases. 2 .Routing protocol in wireless ad hoc network 2.1 Routing Concept Routing is the act of moving information from source to a destination in an internet work. During this process, at least one intermediate node within the internetwork is encountered. The routing concept basically involves two activities: firstly, determining optimal paths and secondly, transferring the information groups (called packets) through an internetwork. The latter concept is called as packet switching, which is straight forward, and path determination is very complex. Routing protocol uses several matrices to calculate the best path for the routing the packet to its destination. These matrices are a standard measurement that could be number of hops, which is used by the routing algorithm to determine the optimal path for the packet to its destination. The process of path determination is that, routing algorithms initialize and maintain routing tables, which contain the total route information for packet. This route information varies form one routing algorithm to another. Routing tables are filled with a variety of information which is generated by routing algorithms. Most common entries in the routing table are ip-address prefix and the next hop. Routing tables Destination/next hop associations tell the router that a particular destination can be reached optimally by sending the packet to router representing the "next hop" on its way to final destination and ip-address prefix specifies a set of destinations for which the routing entry is valid for. In mobile ad-hoc network every node is having routing capability. Nodes are within the radio range (transmission- range) are called its Neighbors. When the destination node is neighbor of source node, packets are transferred with single hop. When the destination node is neighbor of source node, packets are transferred with single hop. When the destination node is out of radio-range (not a neighbors of source node) then packet are transferred in multiple hops using intermediate nodes. These intermediate nodes (neighbors of source node) forward packets to their neighbors and so on till destination is reached. This is shown below: Figure 4(a) : Single hop transfer when S & D in a radio range Figure 4 (b): Multiple hops when S & D are not in redio range S D S D
  • 4. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 33 3.ACK-based schemes ACK based scheme overcome the limitation of passive-feedback technique when power control transmission is used. To implement this scheme, an authentication mechanism is used to prevent the next hop from sending a forged ACK packet on behalf of the intended two hop neighbor. The main drawback of this scheme is the huge overhead. In order to reduce the overhead, the authors have proposed that each node asks its two hop neighbor to send back an ACK randomly rather than continuously. Likewise, this extension also fails when the two hop neighbor refuses to send back an ACK. In such situation, the requester node is unable to distinguish who is the malicious node, its next hop or the requested node. To overcome the previous ambiguity in determining the true malicious node, focuses on detecting malicious links instead of malicious nodes .This scheme is based on 2ACK packet that is assigned a fixed route of two hops in the opposite direction of the received data traffic’s route. In this scheme, each packet’s sender maintains the following parameters; (i) list of identifiers of data packets that have been sent out but have not been acknowledged yet, (ii) a counter of the forwarded data packets, (iii) and a counter of the missed packets. 4 .Modified ACK-based scheme In the existing ack-based scheme uses 2ack process for the node authentication process in attack scenario in ad- hoc network. These 2ack based scheme generate a huge amount of ack packet in the network and also give decision ambiguity for requested node and then effect quality of service .now we modified these scheme used finite state automata. Finite state automate provide a state of route ack, due to this node ack packet maintain state between node to request and respond node. In this process we used some extra buffered memory for maintain a state of node .that memory area maintain a path state due to given request and response. For maintaining a request packet acknowledgment we calculate the next hop with dsdv protocol concept. Path state maintains a sequence of ack packet. 5. Simulation parameter & simulation result: simulation setup Table I Simulation used NS-2.34 Topology area 1200 X 1200 No. of Mobile Nodes 25 Max. No. of Connection 30 Simulation Time 200 Speed 10-20 m/sec Communication Link Capacity 10 Mbps Traffic Intensity 45,85,95,180 Routing Protocol AODV In order to simulate the scenarios described above, the implementation was done in NS-2.34 Network Simulator. The simulation scenario to simulate MANET, which uses AODV without packet drop and with packet drop are given in table. results: This set contains result of comparisons of Graph b/w Throughput with secure channel and without secure channel, Average E- E Delay, Packet Delivery Ratio and Avg. Jitter and Routing Load in Ad Hoc network. Comparison b/w packet delivery ratio between with secure channel without secure channel Figure 5: Effect on PDR using secure channel in mobile adhoc network
  • 5. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 34 The result shows both the cases, with the secure channel and without the secure channel it is measured that the packet delivery ratio is dramatically decreases when the network are not using secure channel. Hence, for better delivery of packet a secure channel is must in the network. Comparison b/w throughput with secure channel without secure channel Figure 6: Effect on throughput using secure channel in mobile adhoc network This result shows that throughput of the network with secure channel is greater as compared to the throughput of the network without containing secure channel. Decease in throughput indicates that the resources are not utilized in the most efficient manner, it also points out that the available resources can be utilized in a more efficient manner. Clearly it shows that without using secure channel in a network has detrimental effect on throughput. Comparison b/w Routing load with secure channel without secure channel Figure 7: Effect on Routing Load using secure channel in mobile adhoc network This result also shows that, routing load increases without using secure channel as compared to the network using secure channel. Due to this, if the network does not use secure channel then the overhead and traffic load or congestion increases. So the network must use secure channel. 6. Conclusion & Recommendation Without infrastructure and node mobility in adhoc network is a great challenge in security concern. For security concern various method are proposed for node authentication in mobile adhoc network. The authentication scheme of leader agent and member surveillance greatly reduces the relative calculating overheads and communication costs. Generally speaking, when leader agent node and surveillance nodes are not destroyed, the united nodes can ensure the reliability, the authentication result is reliable. The dissertation proposes a novel scheme for migrating packet dropping in mobile adhoc network. Our proposed method uses secure channel to overcome the decision ambiguity in requested node and node authentication. In this dissertation secure channel maintain a state of request and reply such fashion minimize packet overhead in network.Our proposed method also removes the node ambiguity in 2ACK hop for authentication process. And minimize a packet dropping in mobile adhoc network Our proposed mechanism has overcome some of the limitations like it has the required some extra buffer memory for maintain a state of request/reply automata. It also introduces little bit computational overhead during route advertisement and path establishment.
  • 6. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.11, 2013 35 References [1]. (MANET)”, International Journal of Electrical and Electronics Engineering (IJEEE), ISSN (PRINT): 2231 – 5284 Vol-1 Iss-4, 2012. [2]. Satyendra Tiwari, Anurag Jain and Gajendra Singh Chowhan: “Migrating Packet Dropping in Adhoc Network Based on Modified ACKbased Scheme Using FSA” International Journal on Emerging Technologies 2(2): 102-105(2011). [3]. Kejun Liu, Jing Deng: “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5, MAY 2007. [4]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto: “A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 5, JUNE 2009. [5]. Zonghua Zhang, Farid Na¨ıt-Abdesselam Pin-Han Ho, Xiaodong Lin:” RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks”, 1525-3511/08©2008 IEEE [6]. Soufine Djahel Farid Na, ıt-Abdesselam and Ashfaq Khokhar:” An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol”, 978-1-4244-2075-9/08©2008 IEEE. [7]. Zhengming Li and Chunxiao Chigan Danniel Wong: “AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs” 978-1-4244-2324-8/08©2008 IEEE. [8]. Z. Wang, C. Chigan, “Countermeasure uncooperative behaviors with dynamic Trust-Token in VANETs”, in Proc. of IEEE International Conference on Communications (ICC 2007), pp.3959 – 3964, June 2007. [9]. S. Buchegger and J. Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic adhoc networks),” in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MoBiHOC). June 2002 [10]. [11].S. Marti, T. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. of MOBICOM, 2000. [11]. http://www.ietf.org/rfc/rfc2501.txt. date last viewed: 2008-12-31. [12].T. S. Rappaport, “Wireless Comunication: Principles and Practice”, Parentice-Hall, 1996. [13].Zhijiang Chang, Georgi Gayadadjiev, Stamatis Vassiliadis, “Routing Protocols for Mobile Ad-hoc Newtorks: Current Development and Evaluation”. [14].M.O. Rabin. Digitalized signatures and public key functions as intractable as factorization. Technical Report No. 212, MIT Laboratory of Computer Science, MIT/LCS/TR-212, 1979. [15]. G. Gaubatz, J.P. Kaps, and B. Sunar, “Public key cryptography in sensor networks-revisited”. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004. [16].R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, Theory of spread spectrum communications: a tutorial. IEEE Transactions on Communications, 20(5):855.884, May 1982. [17].Mr. Ankur Khetrapal, “ Routing techniques for Mobile Ad Hoc Newtorks Classification and Qualitative/Quantitative Analysis”. [18].Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa: “Ad Hoc Mobile Wireless Network: Principles, Protocols and Applications” [19].S. Murphy, J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks and Applications Journal, pages 183-197, Nov.1996. http://citeseer.nj.nec.com/10238.html [20].Rutvij H. Jhaveri Ashish D. Patel, Jatin D. Parmar,Bhavin I. Shah: “ MANET Routing Protocols and Wormhole Attack against AODV” IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010. [21].C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel" Proc. IEEE SICON'97, Apr.1997, pp.197-211. [22].C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-79.
  • 7. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar