SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 111
A Secure Message Exchange and Anti-Jamming Mechanism in MANET
S Sevvanthi1
G Arul Kumaran2
1,2
Department of Information Technology
1,2
Vivekanandha College of Engineering for Women
Abstract— Secure neighbor discovery is the fundamental
process in the MANET deployed in aggressive environment.
It refers to the process that nodes exchange messages to
discover and authenticate each other. It is defenseless to the
jamming attack in which the adversary intentionally
transmits signals to prevent neighboring nodes from
exchanging messages. Existing anti-jamming
communications depends on JR-SND. The JR-SND, a
jamming-resilient secure neighbor discovery scheme for
MANETs based on Random spread-code pre-distribution
and Direct Sequence Spread Spectrum (DSSS). In Existing,
they prevent the jamming and introduce the anti-jamming
mechanism using DSSS introduce the secure message
exchange mechanism and prevent the collisions during
packet transmission. But in this we lack of introducing to
detect the selfish and malicious nodes in the network. For
this, in the Future Work we will enhance the work by
detecting the selfish nodes using Watchdog and Neighbor
Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
Key words: MANET, NCPR
I. INTRODUCTION
Mobile ad hoc networks (MANETs) are auspicious area
based on the ability to self-conïŹguring mobile devices
connection into wireless network without using any
infrastructure. MANETs are mobile; they use wireless
connections to connect to various networks. In the occasion
where there is a group effort required, the MANETs plays a
major role in wireless communication and provides effective
communication.
SECURE neighbor discovery is a fundamental
functionality in mobile ad hoc networks (MANETs)
deployed in aggressive environments. It refers to the process
that nodes exchange messages to discover and authenticate
each other [2]. Therefore the basis of other network
functionalities such as medium access control and routing,
secure neighbor discovery need be often performed due to
node movability.
Direct Sequence Spread Spectrum (DSSS) is a
common forms of spread spectrum techniques [15]. In
classic spread spectrum techniques, senders and receivers
need to pre-distribute a secret key, with which they can
generate spread codes, for communication. If a jammer
knows the secret key, the adversary can easily jam the
communication by the spread codes, used by the sender.
There have been a few current attempts to remove the
circular dependency of jamming-resistant communications
on pre-shared keys like JR-SND [1]. Many existing
protocols in MANET work properly only against single
node attacks. They cannot provide protection against
multiple malicious nodes working in collusion with one
another. Since packet transmission in MANETs depends
heavily on mutual trust and cooperation among the nodes in
the network, therefore determining the trust of an individual
node before actually forwarding packet to it becomes
essential for successful packet transmission.
In this paper we propose, Watchdog timer and
NCPR can help in detecting malicious behavior of some
nodes in the network. The NCPR is used to decrease routing
overhead based on neighbor coverage knowledge and
rebroadcast probability (NCPR) [13]. The excess of route
request has been decreased using several methods like
neighbor coverage based probabilistic (NCPR) method
which guides to high end-to-end delay and packet delivery
ratio. The node which has sufficient power to send the
packet is recognized by using good neighbor node detection
method. Here, This NCPR provides optimal solution for
finding good nodes. Performance metrics in classification of
nodes are transmission range and power of node, signal
strength, high packet forwarding capacity and relative
location of node.
Our main contributions are summarized as follows.
1) We identify selfish node in MANETs as a related
problem that cannot be addressed by existing anti-
jamming techniques such as
2) We propose a NCPR and Watchdog scheme to
detect node behaviour.
The rest of this paper is structured as follows.
Section II discusses about the related work. Section III
introduces the proposed scheme. Section IV illustrates the
implementation of proposed system. Section V presents the
performance evaluation and Section VI concludes this
paper.
II. RELATED WORK
Several schemes have been proposed to enable two nodes to
establish a secret spread code (or key) under the jamming
attack. The schemes proposed in [1] are all based on DSSS
and a publicly known spread-code set and thus vulnerable to
the DoS attack. In [7], proposed a scheme, Mobile Secure
Neighbor Discovery (MSND), which offers a measure of
security against wormholes by allowing participating mobile
nodes to securely determine if they are neighbors. In [3],
proposed an enhanced security scheme against jamming
attack with AOMDV routing protocol [4]. The jamming
attacker delivers huge amount of unauthorized packets in the
network and a result network gets attained. The proposed
scheme identifies the jamming attacker and blocks its
activities by identifying the unauthorized packets in
network. Multipath routing protocol AOMDV is used to
improve the network performance but there is a state that
jamming phase occurs naturally and is not achieved by
attacker intentionally [5]. In presence of attacker security
method always provides the secure path and through
multipath routing the possibility of secure routing is
enhanced. The schemes proposed in [1] and [6],[13] are all
based on DSSS. DSSS is a modulation technique widely
used in code division multiple access (CDMA) systems,
e.g., IS-95. In a DSSS system, the sender spreads the data
signal by increased it by an independent noise signal known
as a spread code, which is a pseudorandom sequence of 1
and -1 bit values at a frequency much higher than that of the
A Secure Message Exchange and Anti-Jamming Mechanism in MANET
(IJSRD/Vol. 3/Issue 10/2015/022)
All rights reserved by www.ijsrd.com 112
original signal. The energy of the original signal is thus
spread into a much broad band. The receiver can modulate
the original signal by multiplying the received signal by a
synchronized version of the same spread code, which is
known as a de-spreading process. To transmit a message, the
sender first transforms the message into a NRZ sequence by
replacing each bit 0 with -1 and then multiplies each bit of
the message by a spread code to get the spread message also
known as the chip sequence [1]. In [4], Proposed an method,
use passive ad hoc identity method and key distribution.
Detection can be done by a single node, or multiple trusted
nodes can join to improve the accuracy of detection. In [4]
Sybil attacks pose a great threat to decentralized systems
like peer-to-peer network and geographic routing protocols.
More recently, In [9] proposed an anti-jamming scheme that
explores interference cancellation and transmit precoding
capabilities of MIMO technology.
III. PROPOSED SCHEME
This System proposes a scheme is watchdog and rebroadcast
delay. The rebroadcast delay is to determine the forwarding
order. The node which has many common neighbors with
the previous node has the lower delay. If this node
rebroadcasts a packet, then many common neighbors will
know this fact. Therefore, this rebroadcast delay enables the
information that the nodes have transmitted the packet
spread to many neighbors. This is performed by using the
Neighbor Knowledge Probabilistic Rebroadcast Protocol
based on the neighbor knowledge method. And the
watchdog can be used to detect the selfishnode while the
packet transmission.
IV. IMPLEMENTATION
A. Watchdog
Watchdogs are well known mechanism to detect the attacks
from selfish nodes in the network. A way to decrease the
overall detection time of selfish nodes in a network is the
collaborative watchdog. Collaborative contact means both
nodes are coordinate then if one of them has one or more
positive. It can transmit information to other nodes. The
nodes can directly communicate with each other if a contact
occurs (that is, if they are within communication range).
Supporting this coordination is a cost intensive activity for
nodes [12]. Thus, in the real world, nodes could have a
selïŹsh behaviour, being unwilling to forward packets for
others. SelïŹshness means that nodes decline to forward
other node packets to save their own resources. Therefore,
detecting such nodes quickly and accurately for the overall
performance of the network. Previous works have showed
that watchdogs are appropriate mechanisms to detect
misbehaving and selïŹsh nodes.
B. NCPR (Neighbor Coverage-Based Probabilistic
Rebroadcast Protocol)
The proposed scheme is a Neighbor Coverage based
probabilistic Rebroadcast protocol that can be used to
decrease routing overhead based upon neighbor coverage
knowledge and rebroadcast probability. The overhead of
route request has been reduced using several methods like
(NCPR) neighbor coverage based probabilistic method
which guides to high end-to-end delay and packet delivery
ratio. The node which has sufficient power to transmit the
packet is identified by using good neighbor node detection
method. This method provides best solution for finding good
nodes. Performance metrics in categorization of nodes are
transmission range, power of node, high packet forwarding
capacity and relative position of node.
Selfishness of the node is categorized as two:
 Full selfishness and
 Partial selfishness.
1) Full Selfishness:
The node which cannot be able to transmit and also receive
the data packets in the network.
2) Partial Selfishness:
The node which has ability to receive the data packets and
cannot able to transmit the data packets.
C. Algorithm Description
The legal description of the Neighbour Coverage based
Probabilistic Rebroadcast (NCPR) for decreasing routing
overhead in route discovery is shown in algorithm
1) Definition:
RREQv: RREQ packet received from node v. Rv.id: The
unique identifier of RREQv. U(u, x): Uncovered neighbours
set of node u for RREQ whose id is x. N(u): Neighbour set
of node u. Timer(u, x): Timer of node u for RREQ packet
whose id is x. {Note that, in the actual implementation of
NCPR protocol, every different RREQ needs a UCN set and
a Timer.}
If ni receives a new RREQs from s then
{Compute initial uncovered neighbours set U(ni,Rs.id) for
RREQs:}
U(ni,Rs.id) = N(ni) − [N(ni) ∩ N(s)] − {s}
{Compute the rebroadcast delay Td(ni):}
Tp(ni) = 1 −[|N(s)∩N(ni)|/ |N(s)|]
Td(ni) = MaxDelay × Tp(ni)
Set a Timer(ni,Rs.id) according to Td(ni)
end if
while ni receives a duplicate RREQj from nj before
Timer(ni,Rs.id) expires do
{Adjust U(ni,Rs.id):}
U(ni,Rs.id)=(ni,Rs.id)−[U(ni,Rs.id)∩N(nj )]
discard(RREQj );
end while
if Timer(ni,Rs.id) expires then
{Compute the rebroadcast probability Pre(ni):}
Ra(ni) = |U(ni,Rs.id)|/ |N(ni)|
Fc(ni) = Nc/ |N(ni)|
Pre(ni) = Fc(ni) · Ra(ni)
if Random(0,1) ≀ Pre(ni) then
broadcast(RREQs)
else
discard(RREQs)
end if
The node ni receives an RREQ packet from its
previous node s, it can use the neighbor list in the RREQ
packet to calculate how much its neighbors have not been
covered by the RREQ packet from s [13]. If node ni has
more neighbors unveiled by the RREQ packet from s, which
means that if node ni rebroadcasts the RREQ packet, the
RREQ packet can reach more additional neighbor nodes. In
algorithm N(s) and N (ni) are the neighbors sets of node s
and ni, respectively. s is the node which sends an RREQ
A Secure Message Exchange and Anti-Jamming Mechanism in MANET
(IJSRD/Vol. 3/Issue 10/2015/022)
All rights reserved by www.ijsrd.com 113
packet to node ni. When a neighbor receives an RREQ
packet, it could calculate the rebroadcast delay Td (ni)
according to the neighbor list in the RREQ packet and its
own neighbor list. Where Tp (ni) is the delay ratio of node
ni, and MaxDelay is a little constant delay. | . | is the number
of elements in a set. The node s sends an RREQ packet, all
its neighbors ni, i = 1,2 . . . | N(s)| receive and process the
RREQ packet. If node ni receives a replicate RREQ packet
from its neighbor nj, it knows that how many its neighbors
have been covered by the RREQ packet from nj. UCN set
according to the neighbor list in the RREQ packet from nj .
After adjusting the U (ni), the RREQ packet received from
nj is disposed. When the timer of the rebroadcast delay of
node ni expires, the node obtains the final UCN set. Note
that, if a node does not sense any duplicate RREQ packets
from its neighborhood, its UCN set is not changed, which is
the initial UCN set [13]. We define the additional coverage
ratio (Ra (ni)) of node ni. Ra becomes bigger, more nodes
will be covered by this rebroadcast, and more nodes need to
receive and process the RREQ packet, and, thus, the
rebroadcast probability should be set to be higher. Then, we
can use 5.1774 log n as the connectivity metric of the
network. So we assume the ratio of the number of nodes that
need to receive the RREQ packet to the total number of
neighbors of node ni is Fc (ni). The arrangement of network
connectivity approaching 1, we have a heuristic formula: |N
(ni)| . Fc (ni) ≄ 5.1774 log n. Then Combining the additional
coverage ratio and connectivity factor, we obtain the
rebroadcast probability Pre (ni) of node ni. if the Pre (ni) is
greater than 1, we set the Pre (ni) to 1. Note that the
calculated rebroadcast probability Pre (ni) may be greater
than 1, but it does not collide the behavior of the protocol. It
just shows that the local density of the node is so low that
the node must forward the RREQ packet. Then, node ni
need to rebroadcast the RREQ packet received from s with
probability Pre (ni).
V. PERFORMANCE EVALUATION
We perform several tests using the ns-2 simulator. In order
to do this, we implemented a specific watchdog module for
this simulator available at (http://safewireless.
sourceforge.net/). Using this simulator allows us to test
networks with a large number of nodes, changing the
number of attackers and the mobility of them.
Fig. 1: Probability of an attack when varying the number of
nodes and the percentage of attackers.
Figure 1 shows a preliminary study of how the
percentage of malicious nodes and the total number of nodes
of the scenario affects the probability that an attack is
performed in a traffic flow. As we can see, not only the
percentage of attackers affects the probability of found an
attack in one test, also the number of total nodes of the
scenario affects it. Afterwards we implemented the
watchdog mechanism for this simulator and performed
several tests varying the mobility of the nodes and the
number of attacks to assess the effectiveness of the
watchdog.
Fig. 2: Attacks detected by the watchdog
Figure 2 shows the results obtained with different
parameters. We can see that mobility clearly affects the
number of attacks detected. It decreases when mobility is
increased. With a mobility of 1 m/s, near by 100% of the
attacks are detected.
VI. CONCLUSION
In this paper, we propose watchdog mechanism to detect the
selfish node based on NCPR. It refers to the process that
nodes exchange messages to discover and authenticate each
other. The results show that a collaborative watchdog can
reduce the overall detection time of the selfish node. Thus
improves the performance of the networks by avoiding these
selfish nodes from the routing path. By using this technique,
the local watchdog can generate a positive (or negative)
detection in case the node is acting selïŹshly.
REFERENCES
[1] R. Zhang, Y. Zhang, and X. Huang, “JR-SND:
jamming-resilient secure neighbor discovery in mobile
ad-hoc networks,” in IEEE ICDCS’11, Minneapolis,
Minnesota, June 2015.
[2] P. Papadimitratos, M. Poturalski, P. Schaller, P.
Lafourcade, D. Basin, S. Capkun, and J.-P. Hubaux,
“Secure neighborhood discovery: a fundamental
element for mobile ad hoc networking,” IEEE
Commun. Mag,vol. 46, no. 2, pp. 132–139, February
2008.
[3] Priyanka Sharma, Anil Suryawanshi, “Enhanced
Security Scheme against Jamming attack in Mobile Ad
hoc Network,” IEEE International Conference on
Advances in Engineering & Technology Research
(ICAETR - 2014), August 2014.
[4] P.Kavitha, C.Keerthana, V.Niroja, V.Vivekanandhan,
“Mobile-id Based Sybil Attack detection on the Mobile
ADHOC Network, ”International Journal of
Communication and Computer Technologies Volume
02 – No.02 Issue: 02, Maech 2014.
[5] Vme-Rani Syed, Dr.ArifIqbal Vmar, Fahad Khurshid,
“Avoidance of BlackHole Affected Routes in AODV
BasedMANET,” international Conference on Open
Source Systems and Technologies (iCOSST), 2014.
A Secure Message Exchange and Anti-Jamming Mechanism in MANET
(IJSRD/Vol. 3/Issue 10/2015/022)
All rights reserved by www.ijsrd.com 114
[6] Q. Wang, P. Xu, K. Ren, and X.-Y. Li, “Towards
optimal adaptive UFH-based anti-jamming wireless
communication,” IEEE J. Select. Areas Commun., vol.
30, no. 1, pp. 16–30, 2012.
[7] R. Stoleru, H. Wu, H. Chenji, “Secure Neighbor
Discovery in Mobile Ad Hoc Networks,” IEEE
International Conference on Mobile Ad-Hoc and Sensor
Systems, 2011.
[8] Marcin Poturalski, Panos Papadimitratos, Jean-Pierre
Hubaux,” Formal Analysis of Secure Neighbor
Discovery in Wireless Networks,” IEEE
TRANSACTIONS ON DEPEDABLE AND SECURE
COMPUTING, 2013.
[9] Qiben Yan, Huacheng Zeng, Tingting Jiang , Ming Li,
Wenjing Lou, Y. Thomas Hou, “MIMO-based Jamming
Resilient Communication in Wireless Networks,” IEEE
Conference on Computer Communications,2014.
[10]Liang Xiao, HuaiyuDai, Peng Ning, “Jamming-
Resistant Collaborative Broadcast Using Uncoordinated
Frequency Hopping,” IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, Vol.
7, No. 1, February 2012.
[11]Chengzhi Li, HuaiyuDai, LiangXiao, Peng Ning, “
Communication Efficiency of Anti-Jamming Broadcast
in Large-Scale Multi-Channel Wireless Networks,”
IEEE TRANSACTIONS ON SIGNAL PROCESSING,
Vol. 60, No. 10, October 2012.
[12]Reshma Lill Mathew, P. Petchimuthu, “Detecting
Selfish Nodes in MANETs Using Collaborative
Watchdogs,” International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 3, Issue 3, March 2013.
[13]Lahari.P, Pradeep.S, “A Neighbor Coverage-Based
Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks,”International
Journal of Computer Science and Information
Technologies, Vol. 5 (2), 2014.
[14]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu
Wang, and Peter Mason, “Security Enhancements for
Mobile Ad Hoc Networks With Trust Management
Using Uncertain Reasoning,” IEEE TRANSACTIONS
ON VEHICULAR TECHNOLOGY, Vol. 63, No. 9,
November 2014.
[15]Shengli Zhou, Georgios B. Giannakis, Ananthram
Swami, “Digital Multi-Carrier Spread Spectrum Versus
Direct Sequence Spread Spectrum for Resistance to
Jamming and Multipath,” IEEE TRANSACTIONS ON
COMMUNICATIONS, Vol. 50, No. 4, April 2002.

Weitere Àhnliche Inhalte

Was ist angesagt?

Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyIJERD Editor
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...IJNSA Journal
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIJERA Editor
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioralIJNSA Journal
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETijsptm
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 

Was ist angesagt? (18)

Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative Study
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
K1803036872
K1803036872K1803036872
K1803036872
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
A43030104
A43030104A43030104
A43030104
 
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
I1086066
I1086066I1086066
I1086066
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioral
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 

Andere mochten auch

Saintmarcquoi 36 octobre 2016 ttp
Saintmarcquoi 36 octobre 2016 ttpSaintmarcquoi 36 octobre 2016 ttp
Saintmarcquoi 36 octobre 2016 ttplesaintmarcquoi
 
Prueba 1
Prueba 1Prueba 1
Prueba 1Megoma84
 
Experiment
ExperimentExperiment
ExperimentCan He
 
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...Irekia - EJGV
 
A diferenca-amizade
A diferenca-amizadeA diferenca-amizade
A diferenca-amizadeIzaque Santos
 
Game Industry. First approach to the departments of a video games studio
Game Industry. First approach to the departments of a video games studioGame Industry. First approach to the departments of a video games studio
Game Industry. First approach to the departments of a video games studioJuan Gabriel Gomila Salas
 
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:CHAHBOUN Adil
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulationAllanki Rao
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communicationsFarzad Nuseeb
 
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...IJSRD
 
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...Ilya Kukharev
 

Andere mochten auch (20)

Saintmarcquoi 36 octobre 2016 ttp
Saintmarcquoi 36 octobre 2016 ttpSaintmarcquoi 36 octobre 2016 ttp
Saintmarcquoi 36 octobre 2016 ttp
 
Prueba 1
Prueba 1Prueba 1
Prueba 1
 
BibliografĂ­a
BibliografĂ­aBibliografĂ­a
BibliografĂ­a
 
Trabajo de ĂĄfrica (los responsables)
Trabajo de ĂĄfrica (los responsables)Trabajo de ĂĄfrica (los responsables)
Trabajo de ĂĄfrica (los responsables)
 
Experiment
ExperimentExperiment
Experiment
 
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...
2017ko urtea bidezaintzako eta kontroleko egutegia. Segurtasun saila. Eusko J...
 
El wifi
El wifiEl wifi
El wifi
 
A diferenca-amizade
A diferenca-amizadeA diferenca-amizade
A diferenca-amizade
 
the banshee
the bansheethe banshee
the banshee
 
ecLED_EN
ecLED_ENecLED_EN
ecLED_EN
 
8
88
8
 
Game Industry. First approach to the departments of a video games studio
Game Industry. First approach to the departments of a video games studioGame Industry. First approach to the departments of a video games studio
Game Industry. First approach to the departments of a video games studio
 
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:
Amendements apportés par la loi 78-12 sur la loi 17-95 relative à la SA:
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
Tarea 4
Tarea 4Tarea 4
Tarea 4
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...
 
Wcdma
WcdmaWcdma
Wcdma
 
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...
App Store Optimization (ASO-ĐŸĐżŃ‚ĐžĐŒĐžĐ·Đ°Ń†ĐžŃ) Đž Đ»ĐŸĐșĐ°Đ»ĐžĐ·Đ°Ń†ĐžŃ ĐŒĐŸĐ±ĐžĐ»ŃŒĐœŃ‹Ń… ĐżŃ€ĐžĐ»ĐŸĐ¶Đ”ĐœĐžĐč ĐČ...
 

Ähnlich wie A Secure message exchange and anti-jamming mechanism in manet

Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 

Ähnlich wie A Secure message exchange and anti-jamming mechanism in manet (20)

Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
I1802046780
I1802046780I1802046780
I1802046780
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
B010110514
B010110514B010110514
B010110514
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 

Mehr von IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

Mehr von IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

KĂŒrzlich hochgeladen

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

KĂŒrzlich hochgeladen (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

A Secure message exchange and anti-jamming mechanism in manet

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 111 A Secure Message Exchange and Anti-Jamming Mechanism in MANET S Sevvanthi1 G Arul Kumaran2 1,2 Department of Information Technology 1,2 Vivekanandha College of Engineering for Women Abstract— Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR). Key words: MANET, NCPR I. INTRODUCTION Mobile ad hoc networks (MANETs) are auspicious area based on the ability to self-conïŹguring mobile devices connection into wireless network without using any infrastructure. MANETs are mobile; they use wireless connections to connect to various networks. In the occasion where there is a group effort required, the MANETs plays a major role in wireless communication and provides effective communication. SECURE neighbor discovery is a fundamental functionality in mobile ad hoc networks (MANETs) deployed in aggressive environments. It refers to the process that nodes exchange messages to discover and authenticate each other [2]. Therefore the basis of other network functionalities such as medium access control and routing, secure neighbor discovery need be often performed due to node movability. Direct Sequence Spread Spectrum (DSSS) is a common forms of spread spectrum techniques [15]. In classic spread spectrum techniques, senders and receivers need to pre-distribute a secret key, with which they can generate spread codes, for communication. If a jammer knows the secret key, the adversary can easily jam the communication by the spread codes, used by the sender. There have been a few current attempts to remove the circular dependency of jamming-resistant communications on pre-shared keys like JR-SND [1]. Many existing protocols in MANET work properly only against single node attacks. They cannot provide protection against multiple malicious nodes working in collusion with one another. Since packet transmission in MANETs depends heavily on mutual trust and cooperation among the nodes in the network, therefore determining the trust of an individual node before actually forwarding packet to it becomes essential for successful packet transmission. In this paper we propose, Watchdog timer and NCPR can help in detecting malicious behavior of some nodes in the network. The NCPR is used to decrease routing overhead based on neighbor coverage knowledge and rebroadcast probability (NCPR) [13]. The excess of route request has been decreased using several methods like neighbor coverage based probabilistic (NCPR) method which guides to high end-to-end delay and packet delivery ratio. The node which has sufficient power to send the packet is recognized by using good neighbor node detection method. Here, This NCPR provides optimal solution for finding good nodes. Performance metrics in classification of nodes are transmission range and power of node, signal strength, high packet forwarding capacity and relative location of node. Our main contributions are summarized as follows. 1) We identify selfish node in MANETs as a related problem that cannot be addressed by existing anti- jamming techniques such as 2) We propose a NCPR and Watchdog scheme to detect node behaviour. The rest of this paper is structured as follows. Section II discusses about the related work. Section III introduces the proposed scheme. Section IV illustrates the implementation of proposed system. Section V presents the performance evaluation and Section VI concludes this paper. II. RELATED WORK Several schemes have been proposed to enable two nodes to establish a secret spread code (or key) under the jamming attack. The schemes proposed in [1] are all based on DSSS and a publicly known spread-code set and thus vulnerable to the DoS attack. In [7], proposed a scheme, Mobile Secure Neighbor Discovery (MSND), which offers a measure of security against wormholes by allowing participating mobile nodes to securely determine if they are neighbors. In [3], proposed an enhanced security scheme against jamming attack with AOMDV routing protocol [4]. The jamming attacker delivers huge amount of unauthorized packets in the network and a result network gets attained. The proposed scheme identifies the jamming attacker and blocks its activities by identifying the unauthorized packets in network. Multipath routing protocol AOMDV is used to improve the network performance but there is a state that jamming phase occurs naturally and is not achieved by attacker intentionally [5]. In presence of attacker security method always provides the secure path and through multipath routing the possibility of secure routing is enhanced. The schemes proposed in [1] and [6],[13] are all based on DSSS. DSSS is a modulation technique widely used in code division multiple access (CDMA) systems, e.g., IS-95. In a DSSS system, the sender spreads the data signal by increased it by an independent noise signal known as a spread code, which is a pseudorandom sequence of 1 and -1 bit values at a frequency much higher than that of the
  • 2. A Secure Message Exchange and Anti-Jamming Mechanism in MANET (IJSRD/Vol. 3/Issue 10/2015/022) All rights reserved by www.ijsrd.com 112 original signal. The energy of the original signal is thus spread into a much broad band. The receiver can modulate the original signal by multiplying the received signal by a synchronized version of the same spread code, which is known as a de-spreading process. To transmit a message, the sender first transforms the message into a NRZ sequence by replacing each bit 0 with -1 and then multiplies each bit of the message by a spread code to get the spread message also known as the chip sequence [1]. In [4], Proposed an method, use passive ad hoc identity method and key distribution. Detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. In [4] Sybil attacks pose a great threat to decentralized systems like peer-to-peer network and geographic routing protocols. More recently, In [9] proposed an anti-jamming scheme that explores interference cancellation and transmit precoding capabilities of MIMO technology. III. PROPOSED SCHEME This System proposes a scheme is watchdog and rebroadcast delay. The rebroadcast delay is to determine the forwarding order. The node which has many common neighbors with the previous node has the lower delay. If this node rebroadcasts a packet, then many common neighbors will know this fact. Therefore, this rebroadcast delay enables the information that the nodes have transmitted the packet spread to many neighbors. This is performed by using the Neighbor Knowledge Probabilistic Rebroadcast Protocol based on the neighbor knowledge method. And the watchdog can be used to detect the selfishnode while the packet transmission. IV. IMPLEMENTATION A. Watchdog Watchdogs are well known mechanism to detect the attacks from selfish nodes in the network. A way to decrease the overall detection time of selfish nodes in a network is the collaborative watchdog. Collaborative contact means both nodes are coordinate then if one of them has one or more positive. It can transmit information to other nodes. The nodes can directly communicate with each other if a contact occurs (that is, if they are within communication range). Supporting this coordination is a cost intensive activity for nodes [12]. Thus, in the real world, nodes could have a selïŹsh behaviour, being unwilling to forward packets for others. SelïŹshness means that nodes decline to forward other node packets to save their own resources. Therefore, detecting such nodes quickly and accurately for the overall performance of the network. Previous works have showed that watchdogs are appropriate mechanisms to detect misbehaving and selïŹsh nodes. B. NCPR (Neighbor Coverage-Based Probabilistic Rebroadcast Protocol) The proposed scheme is a Neighbor Coverage based probabilistic Rebroadcast protocol that can be used to decrease routing overhead based upon neighbor coverage knowledge and rebroadcast probability. The overhead of route request has been reduced using several methods like (NCPR) neighbor coverage based probabilistic method which guides to high end-to-end delay and packet delivery ratio. The node which has sufficient power to transmit the packet is identified by using good neighbor node detection method. This method provides best solution for finding good nodes. Performance metrics in categorization of nodes are transmission range, power of node, high packet forwarding capacity and relative position of node. Selfishness of the node is categorized as two:  Full selfishness and  Partial selfishness. 1) Full Selfishness: The node which cannot be able to transmit and also receive the data packets in the network. 2) Partial Selfishness: The node which has ability to receive the data packets and cannot able to transmit the data packets. C. Algorithm Description The legal description of the Neighbour Coverage based Probabilistic Rebroadcast (NCPR) for decreasing routing overhead in route discovery is shown in algorithm 1) Definition: RREQv: RREQ packet received from node v. Rv.id: The unique identifier of RREQv. U(u, x): Uncovered neighbours set of node u for RREQ whose id is x. N(u): Neighbour set of node u. Timer(u, x): Timer of node u for RREQ packet whose id is x. {Note that, in the actual implementation of NCPR protocol, every different RREQ needs a UCN set and a Timer.} If ni receives a new RREQs from s then {Compute initial uncovered neighbours set U(ni,Rs.id) for RREQs:} U(ni,Rs.id) = N(ni) − [N(ni) ∩ N(s)] − {s} {Compute the rebroadcast delay Td(ni):} Tp(ni) = 1 −[|N(s)∩N(ni)|/ |N(s)|] Td(ni) = MaxDelay × Tp(ni) Set a Timer(ni,Rs.id) according to Td(ni) end if while ni receives a duplicate RREQj from nj before Timer(ni,Rs.id) expires do {Adjust U(ni,Rs.id):} U(ni,Rs.id)=(ni,Rs.id)−[U(ni,Rs.id)∩N(nj )] discard(RREQj ); end while if Timer(ni,Rs.id) expires then {Compute the rebroadcast probability Pre(ni):} Ra(ni) = |U(ni,Rs.id)|/ |N(ni)| Fc(ni) = Nc/ |N(ni)| Pre(ni) = Fc(ni) · Ra(ni) if Random(0,1) ≀ Pre(ni) then broadcast(RREQs) else discard(RREQs) end if The node ni receives an RREQ packet from its previous node s, it can use the neighbor list in the RREQ packet to calculate how much its neighbors have not been covered by the RREQ packet from s [13]. If node ni has more neighbors unveiled by the RREQ packet from s, which means that if node ni rebroadcasts the RREQ packet, the RREQ packet can reach more additional neighbor nodes. In algorithm N(s) and N (ni) are the neighbors sets of node s and ni, respectively. s is the node which sends an RREQ
  • 3. A Secure Message Exchange and Anti-Jamming Mechanism in MANET (IJSRD/Vol. 3/Issue 10/2015/022) All rights reserved by www.ijsrd.com 113 packet to node ni. When a neighbor receives an RREQ packet, it could calculate the rebroadcast delay Td (ni) according to the neighbor list in the RREQ packet and its own neighbor list. Where Tp (ni) is the delay ratio of node ni, and MaxDelay is a little constant delay. | . | is the number of elements in a set. The node s sends an RREQ packet, all its neighbors ni, i = 1,2 . . . | N(s)| receive and process the RREQ packet. If node ni receives a replicate RREQ packet from its neighbor nj, it knows that how many its neighbors have been covered by the RREQ packet from nj. UCN set according to the neighbor list in the RREQ packet from nj . After adjusting the U (ni), the RREQ packet received from nj is disposed. When the timer of the rebroadcast delay of node ni expires, the node obtains the final UCN set. Note that, if a node does not sense any duplicate RREQ packets from its neighborhood, its UCN set is not changed, which is the initial UCN set [13]. We define the additional coverage ratio (Ra (ni)) of node ni. Ra becomes bigger, more nodes will be covered by this rebroadcast, and more nodes need to receive and process the RREQ packet, and, thus, the rebroadcast probability should be set to be higher. Then, we can use 5.1774 log n as the connectivity metric of the network. So we assume the ratio of the number of nodes that need to receive the RREQ packet to the total number of neighbors of node ni is Fc (ni). The arrangement of network connectivity approaching 1, we have a heuristic formula: |N (ni)| . Fc (ni) ≄ 5.1774 log n. Then Combining the additional coverage ratio and connectivity factor, we obtain the rebroadcast probability Pre (ni) of node ni. if the Pre (ni) is greater than 1, we set the Pre (ni) to 1. Note that the calculated rebroadcast probability Pre (ni) may be greater than 1, but it does not collide the behavior of the protocol. It just shows that the local density of the node is so low that the node must forward the RREQ packet. Then, node ni need to rebroadcast the RREQ packet received from s with probability Pre (ni). V. PERFORMANCE EVALUATION We perform several tests using the ns-2 simulator. In order to do this, we implemented a specific watchdog module for this simulator available at (http://safewireless. sourceforge.net/). Using this simulator allows us to test networks with a large number of nodes, changing the number of attackers and the mobility of them. Fig. 1: Probability of an attack when varying the number of nodes and the percentage of attackers. Figure 1 shows a preliminary study of how the percentage of malicious nodes and the total number of nodes of the scenario affects the probability that an attack is performed in a traffic flow. As we can see, not only the percentage of attackers affects the probability of found an attack in one test, also the number of total nodes of the scenario affects it. Afterwards we implemented the watchdog mechanism for this simulator and performed several tests varying the mobility of the nodes and the number of attacks to assess the effectiveness of the watchdog. Fig. 2: Attacks detected by the watchdog Figure 2 shows the results obtained with different parameters. We can see that mobility clearly affects the number of attacks detected. It decreases when mobility is increased. With a mobility of 1 m/s, near by 100% of the attacks are detected. VI. CONCLUSION In this paper, we propose watchdog mechanism to detect the selfish node based on NCPR. It refers to the process that nodes exchange messages to discover and authenticate each other. The results show that a collaborative watchdog can reduce the overall detection time of the selfish node. Thus improves the performance of the networks by avoiding these selfish nodes from the routing path. By using this technique, the local watchdog can generate a positive (or negative) detection in case the node is acting selïŹshly. REFERENCES [1] R. Zhang, Y. Zhang, and X. Huang, “JR-SND: jamming-resilient secure neighbor discovery in mobile ad-hoc networks,” in IEEE ICDCS’11, Minneapolis, Minnesota, June 2015. [2] P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J.-P. Hubaux, “Secure neighborhood discovery: a fundamental element for mobile ad hoc networking,” IEEE Commun. Mag,vol. 46, no. 2, pp. 132–139, February 2008. [3] Priyanka Sharma, Anil Suryawanshi, “Enhanced Security Scheme against Jamming attack in Mobile Ad hoc Network,” IEEE International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), August 2014. [4] P.Kavitha, C.Keerthana, V.Niroja, V.Vivekanandhan, “Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network, ”International Journal of Communication and Computer Technologies Volume 02 – No.02 Issue: 02, Maech 2014. [5] Vme-Rani Syed, Dr.ArifIqbal Vmar, Fahad Khurshid, “Avoidance of BlackHole Affected Routes in AODV BasedMANET,” international Conference on Open Source Systems and Technologies (iCOSST), 2014.
  • 4. A Secure Message Exchange and Anti-Jamming Mechanism in MANET (IJSRD/Vol. 3/Issue 10/2015/022) All rights reserved by www.ijsrd.com 114 [6] Q. Wang, P. Xu, K. Ren, and X.-Y. Li, “Towards optimal adaptive UFH-based anti-jamming wireless communication,” IEEE J. Select. Areas Commun., vol. 30, no. 1, pp. 16–30, 2012. [7] R. Stoleru, H. Wu, H. Chenji, “Secure Neighbor Discovery in Mobile Ad Hoc Networks,” IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2011. [8] Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux,” Formal Analysis of Secure Neighbor Discovery in Wireless Networks,” IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2013. [9] Qiben Yan, Huacheng Zeng, Tingting Jiang , Ming Li, Wenjing Lou, Y. Thomas Hou, “MIMO-based Jamming Resilient Communication in Wireless Networks,” IEEE Conference on Computer Communications,2014. [10]Liang Xiao, HuaiyuDai, Peng Ning, “Jamming- Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol. 7, No. 1, February 2012. [11]Chengzhi Li, HuaiyuDai, LiangXiao, Peng Ning, “ Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks,” IEEE TRANSACTIONS ON SIGNAL PROCESSING, Vol. 60, No. 10, October 2012. [12]Reshma Lill Mathew, P. Petchimuthu, “Detecting Selfish Nodes in MANETs Using Collaborative Watchdogs,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013. [13]Lahari.P, Pradeep.S, “A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks,”International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014. [14]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, and Peter Mason, “Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning,” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Vol. 63, No. 9, November 2014. [15]Shengli Zhou, Georgios B. Giannakis, Ananthram Swami, “Digital Multi-Carrier Spread Spectrum Versus Direct Sequence Spread Spectrum for Resistance to Jamming and Multipath,” IEEE TRANSACTIONS ON COMMUNICATIONS, Vol. 50, No. 4, April 2002.