SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Providing Authentication in Wireless Network to Prevent
Jamming Attacks
R.Akila1, T.J. Jeyaprapha1, Dr. G. Sumathi2
1

( Department of Electronics and Communication Engineering, R.Akila, M.E final year, Sri Venkateswara
College of Engineering, Sriperumbudur)
1

( Department of Electronics and Communication Engineering, T.J.Jeyaprabha, Assistant Professor, Sri
Venkateswara College of Engineering, Sriperumbudur)
2

( Department of Information and Technology, Dr.G.Sumathi, Head-IMS, Professor, Sri Venkateswara College
of Engineering, Sriperumbudur)

ABSTRACT
Wireless and mobile networks represent an increasingly important segment of networking research as a whole,
driven by the rapid growth of portable computing, communication and embedded devices connected to the
internet. Goal of the process is to bring privacy in any conversation between nodes in a network and to provide
security from the attackers. The need of bringing privacy is to defend ourselves from any of the attacks in
wireless network. AODV is a message of routing messages between mobile computers and it allows these
mobile computers or nodes to pass messages through their neighbors to nodes with which they cannot directly
communicate. Here, we propose RSA technique for providing authentication for data and control packets. By
using this technique we provide the authenticated data transmission and also to prevent the damage in the
network by the attackers.
Keywords – AODV (Ad hoc On-demand Distance Vector), RSA (Ron Rivest, Adi Shamir and Leonard
Adleman.
Wireless connections are by nature significantly less
stable than wired connections.
I. INTRODUCTION
When a malicious node D„intercepts the data
The most common wireless technologies
traffic from the source node S to the destination node
use radio. With radio waves distances can be short,
D, a black hole attack takes place. D‟ may misbehave
such as a few meters for television or as far as
by agreeing to forward packets but fail to do so,
thousands or even millions of kilometers for deepbecause it is overloaded, selfish, malicious, or
space radio communications. It encompasses various
broken. This kind of black hole attack can be
types of fixed, mobile, and portable applications,
detected by setting the promise mode of each node.
including two, cellular telephones, personal digital
In this system they proposed a novel approach,
assistants (PDAs), and wireless networking.
Topology
Graph-Based
Anomaly
Detection
Overall, it is clear that mobile, wireless and
(TOGBAD), for detecting routing attacks in tactical
sensor devices will certainly outnumber wired endMANETs [1].A selfish behaviour threatens the entire
user terminals on the Internet in the near future,
community. This paper proposes a selfishness
strongly motivating consideration of fundamentally
prevention protocol for open MANETs. The
new network architectures and services to meet.
drawback of this is it works only on early stages of
More than 90% of all oral cavity cancers are
development and lacks theoretical and experimental
Oral Squamous Cell Carcinoma (OSCC),
validation [2]. The watchdog method, detects
Changing needs. Over the next 10-15 years,
misbehaving nodes acting alone by maintaining a
it is anticipated that significant qualitative changes to
buffer that contains recently sent packets. When a
the Internet will be driven by the rapid proliferation
node forwards a packet, the node‟s watchdog ensures
of mobile and wireless devices, which may be
that the next node in the path also forwards the
expected to outnumber wired PC‟s as early as 2010.
packet; the watchdog does this by listening to the
The potential impact of the future wireless Internet is
next node promiscuously. If the next node does not
very significant because the network combines the
forward the packet then it is termed as misbehaving.
power of computation, search engines and databases
In this scheme, every packet that is overheard by the
in the background with the immediacy of information
watchdog is compared with the packet in the buffer to
from mobile users and sensors in the foreground.
see if there is a match. A match confirms that the
www.ijera.com

36 | P a g e
R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
packet has been successfully delivered and it is
removed from the buffer. If a packet has remained in
the buffer beyond the timeout period then a failure
tally for the node responsible for forwarding the
packet is incremented. If this tally exceeds a
predetermined threshold then the node is termed as
malicious and the network is informed accordingly
[3]. Two conceptual models for charging for the
packet forwarding service. In the first one, called
Packet Purse Model, the source of the packet is
charged, whereas in the second one, called Packet
Trade Model, the destination is charged. The two
models can also be combined to provide a hybrid
solution. We believe that introducing a kind of virtual
currency can serve several other purposes in mobile
ad hoc networks. First, it can be used to remunerate
not only communication services, as described in this
paper, but also information services. Second, it can
be used as a way to pay for the usage of backbones or
satellite links, when a node has to communicate with
a very distant party. In this case, the virtual currency
will have to be converted in some way into “hard"
currency [4].several algorithms are proposed to detect
the black hole attack like DSR, AODV, TORA,
DSDV, STAR etc. Proposed two solutions first,
isolate the misbehaving nodes from the actual routing
protocol for the network. But it adds complexity to
protocol. Second, it detects only if the receiver‟s
network interface is accepting packets, but they
otherwise assume that routing nodes do not
misbehave. Although trusting all nodes to be well
behaved increases the number of nodes available of
routing, it also admits misbehaving nodes to the
network [5]. In this paper, the former are intended to
enforce the cooperation by first detecting the selfish
nodes, avoiding routing through them, and then
punishing them via spreading their bad reputations
and thus isolating them. This paper proposed a
Secure Incentive Protocol (SIP) to motivate packet
forwarding in totally self organizing MANETs
without relying on any centralized infrastructure
[6].Malicious nodes can intentionally alter routing
messages and cause Denial-of-Service attacks, or can
cause packet flooding to power down the network by
successive broadcasting of Route Requests, or send
periodic wake up calls or false alarms to neighboring
nodes. This paper proposed a framework to eliminate
colluding black hole attacks in the Ad hoc Ondemand Distance Vector (AODV) routing protocol
[7].

II. PROPOSED SYSTEM
Ad hoc On-demand Distance Vector
(AODV) is a method of routing messages between
nodes. It allows these mobile computers, or nodes, to
pass messages through their neighbors to nodes with
which they cannot directly communicate. AODV
www.ijera.com

www.ijera.com

does this by discovering the routes along which
messages can be passed. AODV makes sure these
routes do not contain loops and tries to find the
shortest route possible. AODV is also able to handle
changes in routes and can create new routes if there is
an error. Here we used the distance based process and
it is for the non centralized process.
Here we propose RSA Technique for
providing authentication for data and control packets.
By using this technique we provide the authenticated
data transmission and to avoid the damage in the
network by the attackers. We use the Ad hoc Ondemand Distance Vector (AODV) protocol for
routing. High speed of encryption and Private Key is
used. The authentication is a key barrier in the
network information system security field. RSA is a
open network environment technology, using public
key cryptography system theory has implemented
and supplied a universal security infrastructure for
security services; it has two main applications,
include encryption and digital signature.

III. Ad hoc On-demand Distance Vector
(AODV)
The Ad hoc On-demand Distance Vector
(AODV) routing protocol is intended for use by
mobile nodes in an ad hoc network. It offers quick
adaptation to dynamic link conditions, low
processing and memory overhead, low network
utilization, and determines unicast routes to
destinations within the ad hoc network. It uses
destination sequence numbers to ensure loop freedom
at all times (even in the face of anomalous delivery of
routing control messages), avoiding problems (such
as "counting to infinity") associated with classical
distance vector protocols.

Fig.1. AODV Route discovery
One distinguishing feature of AODV is its
use of a destination sequence number for each route
entry. The destination sequence number is created
by the destination to be included along with any route
information it sends to requesting nodes. Using
destination sequence numbers ensures loop freedom
37 | P a g e
R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
and is simple to program. Given the choice between
two routes to a destination, a requesting node is
required to select the one with the greatest sequence
number.

IV. RSA
RSA is a cryptosystem, which is known as
one of the first practicable public-key cryptosystems
and is widely used for secure data transmission. In
such a cryptosystem, the encryption key is public and
differs from the decryption key which is kept secret.
In RSA, this asymmetry is based on the practical
difficulty of factoring the product of two large prime
numbers, the factoring problem. RSA stands for Ron
Rivest, Adi Shamir and Leonard Adleman, who first
publicly described the algorithm. A user of RSA
creates and then publishes the product of two
large prime numbers, along with an auxiliary value,
as their public key. The prime factors must be kept
secret. Anyone can use the public key to encrypt a
message, but with currently published methods, if the
public key is large enough, only someone with
knowledge of the prime factors can feasibly decode
the message. Breaking RSA encryption is known as
the RSA problem. It is an open question whether it is
as hard as the factoring problem.
The
RSA
algorithm
involves
three
steps: key generation,
encryption
and
decryption.RSA involve public key and a private
key. The public key can be known by everyone and is
used for encrypting messages. Messages encrypted
with the public key can only be decrypted in a
reasonable amount of time using the private key. The
keys for the RSA algorithm are generated the
following way:
1. Choose two distinct prime numbers p and q.
 For
security
purposes,
the
integer‟s p and q should be chosen at random,
and should be of similar bit-length. Prime
integers can be efficiently found using
a primality test.
2. Compute n = pq.
 n is used as the modulus for both the public
and private keys. Its length, usually expressed
in bits, is the key length.
3. Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1), where
φ is Euler's totient function.
4. Choose
an
integer e such that 1
<e<
φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are co
prime.
 e is released as the public key exponent.
 e having a short bit-length and small Hamming
weight results in more efficient encryption –
most commonly 216 + 1 = 65,537. However,
much smaller values of e (such as 3) have been
shown to be less secure in some settings.

www.ijera.com

www.ijera.com

Determine d as d−1 ≡ e (mod φ(n)), i.e., d is
the multiplicative inverse of e (modulo φ(n)).
 This is more clearly stated as: solve
for d given d⋅e ≡ 1 (mod φ(n))
 This is often computed using the extended
Euclidean algorithm. Using the pseudo code in
the Modular
integers section,
inputs a and n correspond
to e and t,
respectively.
 d is kept as the private key exponent.
The public key consists of the modulus n and
the public (or encryption) exponent e. The private
key consists of the modulus n and the private (or
decryption) exponent d, which must be kept
secret. p, q, and φ(n) must also be kept secret because
they can be used to calculate d.
5.

ENCRYPTION
Alice transmits her public key (n, e) to Bob
and keeps the private key secret. Bob then wishes to
send message M to Alice. He first turns M into an
integer m, such that 0 ≤ m < n by using an agreedupon reversible protocol known as a padding scheme.
He then computes the cipher text c. This can be done
quickly using the method of exponentiation by
squaring. Bob then transmits c to Alice. Note that at
least nine values of m will yield a cipher text c equal
to m,[note 1] but this is very unlikely to occur in
practice.
DECRYPTION
Alice can recover m from c by using her
private key exponent d via computing
Given m, she can recover the original message M by
reversing the padding scheme.
SIGNING MESSAGES
Suppose Alice uses Bob's public key to send
him an encrypted message. In the message, she can
claim to be Alice but Bob has no way of verifying
that the message was actually from Alice since
anyone can use Bob's public key to send him
encrypted messages. In order to verify the origin of a
message, RSA can also be used to sign a message.
Suppose Alice wishes to send a signed
message to Bob. She can use her own private key to
do so. She produces a hash value of the message,
raises it to the power of d (modulo n) (as she does
when decrypting a message), and attaches it as a
"signature" to the message. When Bob receives the
signed message, he uses the same hash algorithm in
conjunction with Alice's public key. He raises the
signature to the power of e (modulo n) (as he does
when encrypting a message), and compares the
resulting hash value with the message's actual hash
value. If the two agree, he knows that the author of
38 | P a g e
R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40
the message was in possession of Alice's private key,
and that the message has not been tampered with
since.
In the basic communication scenario, there
are two parties, Alice and Bob, who want to
communicate with each other. A third party, Eve, is a
potential eavesdropper. RSA encryption, supplies
unique and stability technology advantages, presents
an authentication system.

www.ijera.com

transformation of information‟s is done here. 3.
Algorithm Implementation: the algorithm known as
AODV is implemented for the route discovery.

FIG.4. BLOCK DIAGRAM

FIG. 2. RSA ENCRYPTION AND DECRYPTION
With a public key (PKA) or asymmetric key
algorithm, a pair of keys is used. One of the keys, the
private key, is kept secret and not shared with
anyone. The other key, the public key, is not secret
and can be shared with anyone. When data is
encrypted by one of the keys, it can only be
decrypted and recovered by using the other key.

Fig.3. Public key cryptosystem: Secrecy and
Authentication

4. Route Maintenance: RSA technique is introduced
for providing the security between the sender and
receiver for communication.
5. Analysis: Finally the performance like delay,
throughput and packet delivery ratio is analyzed.
Let us focus on the performance of this routing
protocol. We evaluated the performance of AODV as
a routing protocol and RSA as algorithm for
authentication using
NS2. By implementing the
another routing protocol and algorithm for
authentication, the performance comparison will be
done by comparing the end to end delay, overall
delay, throughput, packet delivery ratio.

FIG.6. Sender and receiver node in a network with
the attacker node

V. RESULTS
The simulation work has been done with the
Network Simulator ns-2, Version 2.29. In the
simulation 100 nodes are randomly distributed within
the network field of size 1000m * 1000m. Then vary
the node speed from 5m/s to 30m/s.
MODULES LIST
The block diagram of this project has built
by using five modules and they are 1.Network
formation: the wireless network is formed with the
multiple nodes. 2. Route Discovery: the identification
of path between the source and the destination for the
www.ijera.com

FIG.9. Packet size Vs communication cost

39 | P a g e
R.Akila et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40

www.ijera.com

REFERENCES
[1]

[2]

FIG.10. Fault Vs delay

[3]

[4]

[5]
FIG.11. Fault Vs recovery time

[6]

VI. CONCLUSION
In this paper, we proposed RSA Technique
for providing authentication for data and control
packets. By using this technique we provide the
authenticated data transmission and to avoid the
damage in the network by the attackers. We use the
Ad hoc On-demand Distance Vector (AODV)
protocol for routing. In future work thus with the
OLSR routing protocol based on the identification of
poor link stability we adjusting the route discovery
process for improving the route finding method. Also
EDH will be used as a cryptographic technique.
Finally the results like throughput, delay, packet loss
can be compared to find the best technique.

www.ijera.com

[7]

Elmar Gerhards-Padilla, Nils Aschenbruck,
Peter Martini, Marko Jahnke, Jens T¨olle ,“
Detecting Black Hole Attacks In Tactical
Manets Using Topology Graphs”, IEEE
conference on local computer Networks,1518 Oct.2007.
Hugo Miranda Lu´ıs Rodrigues ,
“Preventing Selfishness In Open Mobile Ad
Hoc Networks”, In the proceedings of
Distributed Computing systems, pages- 440
– 445, 19-22 May 2002.
Animesh Patcha and Amitabh Mishra ,
“Collaborative Security Architecture For
Black Hole Attack Prevention In Mobile Ad
Hoc Networks”, In the proceedings of Radio
and Wireless Conference, pages- 75 – 78,
10-13 Aug. 2003.
Levente Butty_an and Jean-Pierre Hubaux,
“Nuglets: A Virtual Currency To Stimulate
Cooperation In Self-Organized Mobile Ad
Hoc Networks”, 2001.
Sergio marti, T.J.Giuli, Kevin lai, and Mary
Baker, “Mitigating Routing Misbehavior In
Mobile Ad Hoc Network”, 2000.
Yanchao Zhang, Wenjing Lou, Yuguang
Fang,”
A
SECURE
INCENTIVE
PROTOCOL FOR MOBILE AD HOC
NETWORKS”, 2004.
Ramaswami, S.S, Upadhyaya, S,”SMART
HANDLING OF COLLUDING BLACK
HOLE ATTACKS IN MANETs AND
WIRELESS
SENSOR
NETWORKS
USING MULTIPATH ROUTING”, pages253 – 260,21-23 June 2006.

40 | P a g e

Contenu connexe

Tendances

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detectioniosrjce
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 

Tendances (16)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
50120140507012
5012014050701250120140507012
50120140507012
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Aj33201205
Aj33201205Aj33201205
Aj33201205
 

En vedette

Rol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatoraRol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatoraСНУЯЭиП
 
особенности работы зрительного анализатора инженера в счм
особенности работы зрительного анализатора инженера в счмособенности работы зрительного анализатора инженера в счм
особенности работы зрительного анализатора инженера в счмСНУЯЭиП
 
Stefan Popa - Popa's
Stefan Popa - Popa'sStefan Popa - Popa's
Stefan Popa - Popa'sOvidiu Slimac
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

En vedette (9)

Man in the mirror 2
Man in the mirror 2Man in the mirror 2
Man in the mirror 2
 
Rol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatoraRol i znachenie_pamyati_v_deyatelnosti_operatora
Rol i znachenie_pamyati_v_deyatelnosti_operatora
 
особенности работы зрительного анализатора инженера в счм
особенности работы зрительного анализатора инженера в счмособенности работы зрительного анализатора инженера в счм
особенности работы зрительного анализатора инженера в счм
 
Catch the moment !
Catch the moment !Catch the moment !
Catch the moment !
 
Stefan Popa - Popa's
Stefan Popa - Popa'sStefan Popa - Popa's
Stefan Popa - Popa's
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Similaire à E42043640

ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 

Similaire à E42043640 (20)

Aj33201205
Aj33201205Aj33201205
Aj33201205
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

E42043640

  • 1. R.Akila et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Providing Authentication in Wireless Network to Prevent Jamming Attacks R.Akila1, T.J. Jeyaprapha1, Dr. G. Sumathi2 1 ( Department of Electronics and Communication Engineering, R.Akila, M.E final year, Sri Venkateswara College of Engineering, Sriperumbudur) 1 ( Department of Electronics and Communication Engineering, T.J.Jeyaprabha, Assistant Professor, Sri Venkateswara College of Engineering, Sriperumbudur) 2 ( Department of Information and Technology, Dr.G.Sumathi, Head-IMS, Professor, Sri Venkateswara College of Engineering, Sriperumbudur) ABSTRACT Wireless and mobile networks represent an increasingly important segment of networking research as a whole, driven by the rapid growth of portable computing, communication and embedded devices connected to the internet. Goal of the process is to bring privacy in any conversation between nodes in a network and to provide security from the attackers. The need of bringing privacy is to defend ourselves from any of the attacks in wireless network. AODV is a message of routing messages between mobile computers and it allows these mobile computers or nodes to pass messages through their neighbors to nodes with which they cannot directly communicate. Here, we propose RSA technique for providing authentication for data and control packets. By using this technique we provide the authenticated data transmission and also to prevent the damage in the network by the attackers. Keywords – AODV (Ad hoc On-demand Distance Vector), RSA (Ron Rivest, Adi Shamir and Leonard Adleman. Wireless connections are by nature significantly less stable than wired connections. I. INTRODUCTION When a malicious node D„intercepts the data The most common wireless technologies traffic from the source node S to the destination node use radio. With radio waves distances can be short, D, a black hole attack takes place. D‟ may misbehave such as a few meters for television or as far as by agreeing to forward packets but fail to do so, thousands or even millions of kilometers for deepbecause it is overloaded, selfish, malicious, or space radio communications. It encompasses various broken. This kind of black hole attack can be types of fixed, mobile, and portable applications, detected by setting the promise mode of each node. including two, cellular telephones, personal digital In this system they proposed a novel approach, assistants (PDAs), and wireless networking. Topology Graph-Based Anomaly Detection Overall, it is clear that mobile, wireless and (TOGBAD), for detecting routing attacks in tactical sensor devices will certainly outnumber wired endMANETs [1].A selfish behaviour threatens the entire user terminals on the Internet in the near future, community. This paper proposes a selfishness strongly motivating consideration of fundamentally prevention protocol for open MANETs. The new network architectures and services to meet. drawback of this is it works only on early stages of More than 90% of all oral cavity cancers are development and lacks theoretical and experimental Oral Squamous Cell Carcinoma (OSCC), validation [2]. The watchdog method, detects Changing needs. Over the next 10-15 years, misbehaving nodes acting alone by maintaining a it is anticipated that significant qualitative changes to buffer that contains recently sent packets. When a the Internet will be driven by the rapid proliferation node forwards a packet, the node‟s watchdog ensures of mobile and wireless devices, which may be that the next node in the path also forwards the expected to outnumber wired PC‟s as early as 2010. packet; the watchdog does this by listening to the The potential impact of the future wireless Internet is next node promiscuously. If the next node does not very significant because the network combines the forward the packet then it is termed as misbehaving. power of computation, search engines and databases In this scheme, every packet that is overheard by the in the background with the immediacy of information watchdog is compared with the packet in the buffer to from mobile users and sensors in the foreground. see if there is a match. A match confirms that the www.ijera.com 36 | P a g e
  • 2. R.Akila et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40 packet has been successfully delivered and it is removed from the buffer. If a packet has remained in the buffer beyond the timeout period then a failure tally for the node responsible for forwarding the packet is incremented. If this tally exceeds a predetermined threshold then the node is termed as malicious and the network is informed accordingly [3]. Two conceptual models for charging for the packet forwarding service. In the first one, called Packet Purse Model, the source of the packet is charged, whereas in the second one, called Packet Trade Model, the destination is charged. The two models can also be combined to provide a hybrid solution. We believe that introducing a kind of virtual currency can serve several other purposes in mobile ad hoc networks. First, it can be used to remunerate not only communication services, as described in this paper, but also information services. Second, it can be used as a way to pay for the usage of backbones or satellite links, when a node has to communicate with a very distant party. In this case, the virtual currency will have to be converted in some way into “hard" currency [4].several algorithms are proposed to detect the black hole attack like DSR, AODV, TORA, DSDV, STAR etc. Proposed two solutions first, isolate the misbehaving nodes from the actual routing protocol for the network. But it adds complexity to protocol. Second, it detects only if the receiver‟s network interface is accepting packets, but they otherwise assume that routing nodes do not misbehave. Although trusting all nodes to be well behaved increases the number of nodes available of routing, it also admits misbehaving nodes to the network [5]. In this paper, the former are intended to enforce the cooperation by first detecting the selfish nodes, avoiding routing through them, and then punishing them via spreading their bad reputations and thus isolating them. This paper proposed a Secure Incentive Protocol (SIP) to motivate packet forwarding in totally self organizing MANETs without relying on any centralized infrastructure [6].Malicious nodes can intentionally alter routing messages and cause Denial-of-Service attacks, or can cause packet flooding to power down the network by successive broadcasting of Route Requests, or send periodic wake up calls or false alarms to neighboring nodes. This paper proposed a framework to eliminate colluding black hole attacks in the Ad hoc Ondemand Distance Vector (AODV) routing protocol [7]. II. PROPOSED SYSTEM Ad hoc On-demand Distance Vector (AODV) is a method of routing messages between nodes. It allows these mobile computers, or nodes, to pass messages through their neighbors to nodes with which they cannot directly communicate. AODV www.ijera.com www.ijera.com does this by discovering the routes along which messages can be passed. AODV makes sure these routes do not contain loops and tries to find the shortest route possible. AODV is also able to handle changes in routes and can create new routes if there is an error. Here we used the distance based process and it is for the non centralized process. Here we propose RSA Technique for providing authentication for data and control packets. By using this technique we provide the authenticated data transmission and to avoid the damage in the network by the attackers. We use the Ad hoc Ondemand Distance Vector (AODV) protocol for routing. High speed of encryption and Private Key is used. The authentication is a key barrier in the network information system security field. RSA is a open network environment technology, using public key cryptography system theory has implemented and supplied a universal security infrastructure for security services; it has two main applications, include encryption and digital signature. III. Ad hoc On-demand Distance Vector (AODV) The Ad hoc On-demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols. Fig.1. AODV Route discovery One distinguishing feature of AODV is its use of a destination sequence number for each route entry. The destination sequence number is created by the destination to be included along with any route information it sends to requesting nodes. Using destination sequence numbers ensures loop freedom 37 | P a g e
  • 3. R.Akila et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40 and is simple to program. Given the choice between two routes to a destination, a requesting node is required to select the one with the greatest sequence number. IV. RSA RSA is a cryptosystem, which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem. The RSA algorithm involves three steps: key generation, encryption and decryption.RSA involve public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. The keys for the RSA algorithm are generated the following way: 1. Choose two distinct prime numbers p and q.  For security purposes, the integer‟s p and q should be chosen at random, and should be of similar bit-length. Prime integers can be efficiently found using a primality test. 2. Compute n = pq.  n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. 3. Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1), where φ is Euler's totient function. 4. Choose an integer e such that 1 <e< φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are co prime.  e is released as the public key exponent.  e having a short bit-length and small Hamming weight results in more efficient encryption – most commonly 216 + 1 = 65,537. However, much smaller values of e (such as 3) have been shown to be less secure in some settings. www.ijera.com www.ijera.com Determine d as d−1 ≡ e (mod φ(n)), i.e., d is the multiplicative inverse of e (modulo φ(n)).  This is more clearly stated as: solve for d given d⋅e ≡ 1 (mod φ(n))  This is often computed using the extended Euclidean algorithm. Using the pseudo code in the Modular integers section, inputs a and n correspond to e and t, respectively.  d is kept as the private key exponent. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculate d. 5. ENCRYPTION Alice transmits her public key (n, e) to Bob and keeps the private key secret. Bob then wishes to send message M to Alice. He first turns M into an integer m, such that 0 ≤ m < n by using an agreedupon reversible protocol known as a padding scheme. He then computes the cipher text c. This can be done quickly using the method of exponentiation by squaring. Bob then transmits c to Alice. Note that at least nine values of m will yield a cipher text c equal to m,[note 1] but this is very unlikely to occur in practice. DECRYPTION Alice can recover m from c by using her private key exponent d via computing Given m, she can recover the original message M by reversing the padding scheme. SIGNING MESSAGES Suppose Alice uses Bob's public key to send him an encrypted message. In the message, she can claim to be Alice but Bob has no way of verifying that the message was actually from Alice since anyone can use Bob's public key to send him encrypted messages. In order to verify the origin of a message, RSA can also be used to sign a message. Suppose Alice wishes to send a signed message to Bob. She can use her own private key to do so. She produces a hash value of the message, raises it to the power of d (modulo n) (as she does when decrypting a message), and attaches it as a "signature" to the message. When Bob receives the signed message, he uses the same hash algorithm in conjunction with Alice's public key. He raises the signature to the power of e (modulo n) (as he does when encrypting a message), and compares the resulting hash value with the message's actual hash value. If the two agree, he knows that the author of 38 | P a g e
  • 4. R.Akila et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40 the message was in possession of Alice's private key, and that the message has not been tampered with since. In the basic communication scenario, there are two parties, Alice and Bob, who want to communicate with each other. A third party, Eve, is a potential eavesdropper. RSA encryption, supplies unique and stability technology advantages, presents an authentication system. www.ijera.com transformation of information‟s is done here. 3. Algorithm Implementation: the algorithm known as AODV is implemented for the route discovery. FIG.4. BLOCK DIAGRAM FIG. 2. RSA ENCRYPTION AND DECRYPTION With a public key (PKA) or asymmetric key algorithm, a pair of keys is used. One of the keys, the private key, is kept secret and not shared with anyone. The other key, the public key, is not secret and can be shared with anyone. When data is encrypted by one of the keys, it can only be decrypted and recovered by using the other key. Fig.3. Public key cryptosystem: Secrecy and Authentication 4. Route Maintenance: RSA technique is introduced for providing the security between the sender and receiver for communication. 5. Analysis: Finally the performance like delay, throughput and packet delivery ratio is analyzed. Let us focus on the performance of this routing protocol. We evaluated the performance of AODV as a routing protocol and RSA as algorithm for authentication using NS2. By implementing the another routing protocol and algorithm for authentication, the performance comparison will be done by comparing the end to end delay, overall delay, throughput, packet delivery ratio. FIG.6. Sender and receiver node in a network with the attacker node V. RESULTS The simulation work has been done with the Network Simulator ns-2, Version 2.29. In the simulation 100 nodes are randomly distributed within the network field of size 1000m * 1000m. Then vary the node speed from 5m/s to 30m/s. MODULES LIST The block diagram of this project has built by using five modules and they are 1.Network formation: the wireless network is formed with the multiple nodes. 2. Route Discovery: the identification of path between the source and the destination for the www.ijera.com FIG.9. Packet size Vs communication cost 39 | P a g e
  • 5. R.Akila et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 4), February 2014, pp.36-40 www.ijera.com REFERENCES [1] [2] FIG.10. Fault Vs delay [3] [4] [5] FIG.11. Fault Vs recovery time [6] VI. CONCLUSION In this paper, we proposed RSA Technique for providing authentication for data and control packets. By using this technique we provide the authenticated data transmission and to avoid the damage in the network by the attackers. We use the Ad hoc On-demand Distance Vector (AODV) protocol for routing. In future work thus with the OLSR routing protocol based on the identification of poor link stability we adjusting the route discovery process for improving the route finding method. Also EDH will be used as a cryptographic technique. Finally the results like throughput, delay, packet loss can be compared to find the best technique. www.ijera.com [7] Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens T¨olle ,“ Detecting Black Hole Attacks In Tactical Manets Using Topology Graphs”, IEEE conference on local computer Networks,1518 Oct.2007. Hugo Miranda Lu´ıs Rodrigues , “Preventing Selfishness In Open Mobile Ad Hoc Networks”, In the proceedings of Distributed Computing systems, pages- 440 – 445, 19-22 May 2002. Animesh Patcha and Amitabh Mishra , “Collaborative Security Architecture For Black Hole Attack Prevention In Mobile Ad Hoc Networks”, In the proceedings of Radio and Wireless Conference, pages- 75 – 78, 10-13 Aug. 2003. Levente Butty_an and Jean-Pierre Hubaux, “Nuglets: A Virtual Currency To Stimulate Cooperation In Self-Organized Mobile Ad Hoc Networks”, 2001. Sergio marti, T.J.Giuli, Kevin lai, and Mary Baker, “Mitigating Routing Misbehavior In Mobile Ad Hoc Network”, 2000. Yanchao Zhang, Wenjing Lou, Yuguang Fang,” A SECURE INCENTIVE PROTOCOL FOR MOBILE AD HOC NETWORKS”, 2004. Ramaswami, S.S, Upadhyaya, S,”SMART HANDLING OF COLLUDING BLACK HOLE ATTACKS IN MANETs AND WIRELESS SENSOR NETWORKS USING MULTIPATH ROUTING”, pages253 – 260,21-23 June 2006. 40 | P a g e