SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 494
PERFORMANCE INVESTIGATION OF RE-SHUFFLING PACKET
ATTACK ON TRANSPORT LAYER PROTOCOL IN MANET
Sonia Choudhary1
, Vandna Verma2
1, 2
Department of Computer Science and Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan,
India, sonia.choudhary.14@gmail.com, vermamtech@gmail.com
Abstract
Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio
frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants
(PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks
than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we
present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the
packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their
destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to
retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always
participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets
in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will
also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end
throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated
using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data
flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study
on UDP and TCP.
Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
MANET routing protocols in general lack security
mechanisms. For proper operation of routing protocol, it is
assumed that intermediate nodes included in routing paths are
trustworthy and follow protocol rules. It is required that each
node in the network generate and forward routing control
traffic according to protocol specifications. Absolute trust on
intermediate nodes is a significant issue in networks that are
characterized by dynamic topology. It is comparatively easy to
eavesdrop wireless communication and to physically capture
and compromise legal nodes. Without appropriate network
level or link-layer security provisions, routing protocols are
susceptible to many form of malicious activity that can freeze
the whole network. In this chapter we study various attacks
that can be launched on MANETs by exploiting the
vulnerabilities inherent in routing protocols. We study how
basic routing protocol functions like packet or message
forwarding and routing can easily jeopardize the whole
network.
This paper is organized in the following manner. In Section II,
we present the related work done in our area which includes
the papers that are proposed the effective routing methods.
This is followed by the proposed work for efficient routing for
delay-sensitive applications in Section III. We also
summarize the key features, basic operation, as well as major
pros and cons of our proposed approach. In Section IV, We
will conclude the paper with present state of the art and future
work.
2. RELATED WORK
In this section, we discuss the past works done in MANET
that includes the evolution of many new attacks. It is
imperative to secure networks - wired or wireless for its
proper functioning. Wireless ad hoc network is more
vulnerable to security threats than wired network due to
inherent characteristics and system constraints. The nodes are
free to join, move and leave the network making it susceptible
to attacks - both from inside or outside the network. The
attacks can be launched by nodes within radio range or
through compromised nodes. The compromised nodes exploit
the flaws and inconsistencies present in routing protocol to
destroy normal routing operation of the network. A
compromised node may advertise nonexistent or fake links or
flood honest nodes with routing traffic causing Denial of
Service (DoS) attacks that may severely degrade network
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 495
performance. Thus we see that routing protocols are one of the
main areas of vulnerability. There is a need to study the
vulnerabilities in routing protocols that may be exploited by
malicious nodes to launch attacks.
In [1] and [2], the attack is one of the most serious attacks on
MANETs. In wormhole attack at least two attackers are
required to perform the attack very effectively. These two
attackers resides on different areas of the network makes a
tunnel through the network to communicate with each other.
The attackers broadcast the wrong information to the other
nodes in the network that the destination is only one hop away
from them. Sometimes they also broadcast the wrong
information that they are true neighbors of each other due to
this the attacker one which is near to source node is easily
selected on the route between the source destination pair when
the route is discovered on the basis of lowest number of hops
on the route.
In [3], the attacker when received a route request (RREQ)
message it modifies the sequence number in the RREQ
message to perform the attack. The attacker increases the
sequence number more than the usual number and reply back
to the source to make it believe that it has the better and
fresher route to the destination node. Once the source node got
this reply it start the transmission of data packet on the route
which consists of the attacker i.e., one of the intermediate
node of the established route is the attacker. Till now half of
the attack is performed by the attacker by spreading the false
information and making himself the part of the route. Now
when the data communication is started using the route the
attacker will drop all the data packets that reaches to it that is
when the attacker got the data packet for forwarding it drops
the packet without forwarding any of the data packets.
In [4], Flooding attack is the simplest attack to implement but
it is one of the most dangerous attacks. In this attack, the
attacker broadcast the false control or data packets in the
network due to which the network bandwidth is wasted largely
and the non-false packets are not able to reach their
destinations.
In [5]: As the communication in MANETs is multi hop
therefore the intermediate nodes plays an important role in
data communication over MANETs. The intermediate nodes
can become selfish by either using the wireless channel
unnecessary due to which the other nearby channels has to
contend more time to access the channel.
In [6] has analyzed the impact of packet re-ordering attack
over various TCP-variants using the MANET routing
protocols named AODV and DSR. Although authors claim
that they have investigated various versions of TCP but the
simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
3. PROPOSED METHODOLOGY
In proposed Re-shuffling data packet attack (RSA) an attacker
node re-ordered a specified number of packets using a re-
ordering buffer whose size is either selected randomly every
time the buffer is empty or its size can be fixed at the start of
the data communication and kept constant throughout the
whole communication duration. To perform this attack the
attacker node should be one of the intermediate nodes on the
route between the source destination pair. The attacker can
perform the proposed Re-shuffling data packet attack (RSA)
using any one of the following two approaches:
a) In this method, the attacker node uses a fixed size of
buffer and wait till the number of packets are equal to
the size of the buffer once the number of data packets
are equal to the used re-order buffer size the attacker
shuffles all the packets and forward them one-by-one.
For example, if the re-order buffer size is set to 3
then as soon as the re-order buffer has 3 data packets
stored in it the attacker shuffles them in any random
or predefined order and forward the data packets.
b) In the second method, the attacker node may vary the
size of the reorder buffer during the communication
duration and uses a random re-order buffer size for
some duration while uses some other size for the rest
or some other period. In this way, the attacker makes
itself more secure from the detection mechanisms if
applied by the source node to detect the attackers. To
perform any attack method either first or second the
attacker should be one of the intermediate nodes on
the active TCP or UDP based route using for data
communication process.
Pseudo Code for proposed Delay-Aware Routing Protocol
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 496
Processing of Data Packet Received by an Attacker
Node
Shorthand used in the Algorithm:
////////////////////////////////////
S = Source node
D = Destination node
A = Attacker node
I = Intermediate node
IP_OQ(N) = IP output queue of node N
RO_buffer_size = x; where x is between 1 to 5
//////////////////////////////////
IF1 (I got a data packet)
I check its AODV routing table
IF2 (Route is present in the routing table)
IF3 (I != A)
I forward the data packets from its IP output queue using FIFO
approach towards D
ELSE //this node is an attacker node
A checks whether the IP output queue has number of data
packets that are greater than or equals to its RO_buffer_size
IF4 (RO_buffer_size (A) >= number of packets in IP_OQ(A))
A either send the data packet or it pauses the data packet till
the re-shuffle buffer of its IP output queue is filled with the
required packets
ELSE //attackers re-shuffle buffer is full
A re-shuffle the data packets either using a fixed re-order
pattern or randomly
After re-shuffling send the packets from the re-order buffer
using FIFO approach
ENDIF4
ENDIF3
ENDIF2
ENDIF1
4. SIMULATION RESULTS AND
PERFORMANCE EVALUATION
In this section, we present the detailed performance analysis
and impact analysis of the proposed Re-shuffling data packet
attack (RSA) on different variants of TCP protocol over
mobile ad-hoc networks. The network scenarios used in the
simulation process are designed in such a way so that the
effects of the wireless channel and environment can be
mitigated. This is done to discover the exact impact of Re-
shuffling data packet attack on the TCP-based MANETs.
Therefore, we ignore the congestion and mobility induced
situation from the network scenarios used for simulation
process. As already mentioned above that the network
simulator used for the simulation process is the trail version of
the well knows network simulator called EXata.
Table1. Simulation Parameter Table
Parameters Values
Simulator EXata
Network Size 900 x 900 meter square
Simulation time 750 Seconds
Application Layer
Process
File transfer protocol
(FTP)
Transport Layer
Protocols
TCP (Tahoe, Reno,
NewReno) and UDP
Routing protocol AODV, DSR, OLSR
Number of Nodes 30
Mobility model None
MAC specification IEEE 802.11
Network Bandwidth 15 Mbps
Performance Metrics Network Throughput,
Packet Delivery Ratio
end-to-end delay and
Number of
Retransmissions
PHY Specification 802.11a/g
Parameters Values
A .Simulation Setup
Furthermore, the performance measurement metrics used are
as follows and the graphs will show that the attack is
independent from the effect of routing protocol on both TCP
as well as UDP:
a) Network throughput: The network throughput is
defined as the ratio of the total number of data bytes
received to the total duration of the communication
process.
b) Packet delivery ratio (PDR): The ratio of the
application data packets that are received without any
error at destination nodes to the total data packets
generated by the CBR sources are called Packet
delivery ratio (PDR) of the network.
c) Average end-to-end delay of data packets: This
metric is calculated by the destination node whenever
it receives a data packet. The destination node will
calculate the delay of each received data packet by
using its send timestamp and its received timestamp
at the destination.
d) Number of retransmission (NOR): This is the
important evaluation metric as we are using TCP-
based MANETs. In TCP a data packet is re-
transmitted when its retransmission timer expires or
the TCP receives the three acknowledgment packets
for the same data packet. These retransmissions
waste network bandwidth and lead to lower network
throughput.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 497
B. Performance Evaluation
1. Effects of Increase in Re-Shuffle Buffer Size
In this section, the effects of increase in the size of the re-
shuffle buffer of an attacker node are analyzed using the two
metrics (i.e., network throughput and number of
retransmissions).
Fig.1 Network throughputs with increase in shuffle size when
using all three routing protocols (TCP-based MANETs)
Fig.2 Number of Retransmissions with increase in shuffle size
when using all three routing protocols (TCP-based MANETs)
2. Effects of Increase Number of Attackers in TCP-
Based Manets
In this section, we analyze the performance of three TCP
protocol variants with the increase in the number of attackers
in an active route between any source-destination pair. The
metrics used for the analysis are network throughput and
number of re-transmissions caused during the whole duration
of data communication of a data session.
Fig.3 Network throughputs with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
Fig.4 Number of Retransmissions with increase in number of
attackers when using all three routing protocols (TCP-based
MANETs)
3. Effects of Increase Number of Attackers in UDP-
Based Manets
In the previous section, we have shown the effect of the
proposed attack on TCP-based transmissions over mobile ad-
hoc networks. In this section, we analyze the effects of the
proposed attack on the UDP-based transmissions. As we are
using UDP as a transport layer protocol therefore there is no
re-transmission of data packets so we have used different
metrics to analyze the effects of our proposed attack on the
source-destination pair and overall network.
To show through the simulation process that the attack is
independent on the routing protocol used, we have also
configure the OLSR and DSR as the routing protocols in
conjunction with the AODV protocol and the results are given
below. This change is due to their different types of route
discovery methods used for route discovery and different
levels of routing overhead. These factors affect the network
metrics values.
Figure 5 End-to-end delays with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
Figure 6: End-to-end delay with increase in number of
attackers in all three routing protocols (UDP-based MANETs)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 498
5. PROPOSED DETECTION METHOD FOR RE-
SHUFFLING DATA PACKET ATTACK
In this section, we will propose an efficient yet simple method
to detect the proposed Re-shuffling data packet attack. The
source node TCP protocol uses the time-stamps to detect
whether the re-transmission done by it is a false or true re-
transmission. If the re-transmission done by the source is true
than the TCP will work in the traditional way by applying its
methods to control the congestion and network flow rates. On
the other hand, if the re-transmission is detected as a false re-
transmission the source TCP will not enter into the congestion
control states. Due to this the network throughput of the
network is maintained during the attack periods.
The proposed method for the detection weather the current re-
transmission at the source is true or false type is explained
below with the help of the Figure
Figure 7 Detection methods for packet re-shuffling attack
When the source TCP sends a data packet, it also places a
time-stamp in that data packet. The value of the time stamp is
set equal to the current system time when the data packet is
transmitted into the network. Let’s assume that node A sends
four data packets with the time stamps t1, t2, t3 and t4
respectively. As, it can be seen in Figure 4.13 that the attacker
node re-shuffles the packets before forwarding them towards
the destination node When the receiver node E receives the
data packet with the time-stamped equal to t4 it generates the
duplicate ACK because it is waiting for the data packet which
has the timestamp equal to t1. In this way, the node E will
generate three duplicate ACKs for the first three received out
of order data packets.
CONCLUSIONS AND FUTURE WORK
In this section, we have presented the conclusion and future
work for the paper. As we are using UDP as a transport layer
protocol therefore there is no re-transmission of data packets
so we have used different metrics to analyze the effects of our
proposed attack on the source-destination pair and overall
network. For this we have studied all forms of existing attacks
over Mobile ad-hoc networks. The simulation results clearly
show the impact of proposed attack on the network
throughput, bandwidth wastage and received data quality. We
have also seen that the proposed attack is independent on the
underlying network protocol as the attack is done to interrupt
the usual working of the TCP protocol. The attack exploits the
TCP congestion avoidance algorithm and flow control process
to disturb the regular data transmission process.
In the paper, we have analyzed the impact of packet re-
ordering attack over various TCP-variants using the MANET
routing protocols named AODV and DSR. Although authors
claim that they have investigated various versions of TCP but
the simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
REFERENCES
[1] George Hoffman, Yoko Ono, Akiko Kawakami,
Kenichi Kusano, and Takashi Manabe Japan
Communications 2012 Top 10 Predictions
http://www.idc.com/getdoc.jsp?containerId=JP1376002
U.
[2] Trends — Survey Says Wireless Net- works Expand for
Mobile Growth.
http://edtechdigest.wordpress.com/2011/10/18/trends-
survey-says-wirele
[3] Raza, I. and Hussain, S.A. and Ali, A. and Hassan
Raza, M. : Persistent packet reordering attack in TCP
based Ad hoc wireless networks, Information and
Emerging Technologies (ICIET), 2010 International
Conference, 2010.
[4] C. Perkins and E. Royer. Ad hoc on-demand distance
vector routing. 1999.
[5] A. Mishra, R. Jaiswal, and S. Sharma. A novel
approach for detecting and eliminating cooperative
black hole attack using advanced dri table in ad hoc
network. In Advance Computing Conference (IACC),
2013 IEEE 3rd International, 2013.
[6] Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole
attacks in wireless networks," Selected Areas in
Communications, IEEE Journal on , vol.24, no.2,
pp.370,380, Feb. 2006.
[7] Hoang Lan Nguyen and Uyen Trang Nguyen. A study
of different types of attacks in mobile ad hoc networks.
In Electrical Computer Engineering (CCECE), 2012
25th IEEE Canadian Conference on, 2012.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 499
[8] M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy.
A reputation-based mechanism for isolating selfish
nodes in ad hoc networks. In International Conference
on Mobile and Ubiquitous Systems, Networking and
Services, July 2005.
[9] Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang,
"Resisting flooding attacks in ad hoc networks,"
Information Technology: Coding and Computing, 2005.
ITCC 2005. International Conference on , vol.2, no.,
pp.657,662 Vol. 2, 4-6 April 2005.
[10] Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of-
service attack-detection techniques," Internet
Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb.
2006.
[11] JOHNSON David B. The dynamic source routing
protocol for mobile ad hoc networks (dsr). Internet-
Draft, 2004.
[12] Chen, S., Nahrstedt, K.: Distributed quality-of-service
routing in ad hoc networks. Selected Areas in
Communications, IEEE Journal 17, 1488–1505 (1999).
[13] Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan
and Irwin, Angela and Hassan, Aamir,” Vehicular ad
hoc networks (VANETS): status, results,
and challenges”, Telecommunication Systems, Springer
US, 2012.
[14] Chakrabarti, S., Mishra, A.: QoS issues in ad hoc
wireless networks. Communications Magazine, IEEE
39, 142–148 (2001).
[15] Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu.
Mobile ad hoc networking: imperatives and challenges.
Ad Hoc Networks, 1(1):13 – 64, 2003.
[16] Tsu-Wei Chen and Gerla, M.: Global state routing: a
new routing scheme for ad-hoc wireless networks,
Communications, 1998. ICC 98. Conference Record.
1998 IEEE International Conference.
[17] E.M. Royer and Chai-Keong Toh. A review of current
routing protocols for ad hoc mobile wireless networks.
Personal Communications, IEEE, 6(2):46 –55, apr
1999.
[18] P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, and L. Viennot. Optimized link state routing
protocol for ad hoc networks. 3626, 2001.
[19] Charles E. Perkins and Pravin Bhagwat. Highly
dynamic destination-sequenced distance-vector routing
(dsdv) for mobile computers. SIGCOMM Comput.
Commun. Rev., 24:234–244, October 1994.

Contenu connexe

Tendances

Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 

Tendances (16)

Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
 
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 

En vedette

Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...eSAT Publishing House
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
An innovative idea to discover the trend on multi dimensional spatio-temporal...
An innovative idea to discover the trend on multi dimensional spatio-temporal...An innovative idea to discover the trend on multi dimensional spatio-temporal...
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Publishing House
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Performance analysis of a liquid column in a chemical plant by using mpc
Performance analysis of a liquid column in a chemical plant by using mpcPerformance analysis of a liquid column in a chemical plant by using mpc
Performance analysis of a liquid column in a chemical plant by using mpceSAT Publishing House
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamseSAT Publishing House
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvletseSAT Publishing House
 
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...eSAT Publishing House
 
Pygmy deposit system through android cloud
Pygmy deposit system through android cloudPygmy deposit system through android cloud
Pygmy deposit system through android cloudeSAT Publishing House
 
An algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channelsAn algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channelseSAT Publishing House
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
Reliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engineReliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engineeSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetseSAT Publishing House
 
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographiceSAT Publishing House
 
Experimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete memberExperimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete membereSAT Publishing House
 
Desinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based onDesinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based oneSAT Publishing House
 

En vedette (20)

Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
An innovative idea to discover the trend on multi dimensional spatio-temporal...
An innovative idea to discover the trend on multi dimensional spatio-temporal...An innovative idea to discover the trend on multi dimensional spatio-temporal...
An innovative idea to discover the trend on multi dimensional spatio-temporal...
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Performance analysis of a liquid column in a chemical plant by using mpc
Performance analysis of a liquid column in a chemical plant by using mpcPerformance analysis of a liquid column in a chemical plant by using mpc
Performance analysis of a liquid column in a chemical plant by using mpc
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beams
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvlets
 
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
 
Pygmy deposit system through android cloud
Pygmy deposit system through android cloudPygmy deposit system through android cloud
Pygmy deposit system through android cloud
 
An algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channelsAn algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channels
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Reliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engineReliability assessment for a four cylinder diesel engine
Reliability assessment for a four cylinder diesel engine
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
An overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasetsAn overview on data mining designed for imbalanced datasets
An overview on data mining designed for imbalanced datasets
 
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
 
Experimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete memberExperimental investigation on behavior of bamboo reinforced concrete member
Experimental investigation on behavior of bamboo reinforced concrete member
 
Desinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based onDesinging dsp (0, 1) acceptance sampling plans based on
Desinging dsp (0, 1) acceptance sampling plans based on
 

Similaire à Performance investigation of re shuffling packet

Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...eSAT Journals
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingeSAT Publishing House
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 

Similaire à Performance investigation of re shuffling packet (20)

Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasing
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
B43011014
B43011014B43011014
B43011014
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
He3413241328
He3413241328He3413241328
He3413241328
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
M017248993
M017248993M017248993
M017248993
 
1705 1708
1705 17081705 1708
1705 1708
 
1705 1708
1705 17081705 1708
1705 1708
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 

Dernier (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

Performance investigation of re shuffling packet

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 494 PERFORMANCE INVESTIGATION OF RE-SHUFFLING PACKET ATTACK ON TRANSPORT LAYER PROTOCOL IN MANET Sonia Choudhary1 , Vandna Verma2 1, 2 Department of Computer Science and Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan, India, sonia.choudhary.14@gmail.com, vermamtech@gmail.com Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability; -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION MANET routing protocols in general lack security mechanisms. For proper operation of routing protocol, it is assumed that intermediate nodes included in routing paths are trustworthy and follow protocol rules. It is required that each node in the network generate and forward routing control traffic according to protocol specifications. Absolute trust on intermediate nodes is a significant issue in networks that are characterized by dynamic topology. It is comparatively easy to eavesdrop wireless communication and to physically capture and compromise legal nodes. Without appropriate network level or link-layer security provisions, routing protocols are susceptible to many form of malicious activity that can freeze the whole network. In this chapter we study various attacks that can be launched on MANETs by exploiting the vulnerabilities inherent in routing protocols. We study how basic routing protocol functions like packet or message forwarding and routing can easily jeopardize the whole network. This paper is organized in the following manner. In Section II, we present the related work done in our area which includes the papers that are proposed the effective routing methods. This is followed by the proposed work for efficient routing for delay-sensitive applications in Section III. We also summarize the key features, basic operation, as well as major pros and cons of our proposed approach. In Section IV, We will conclude the paper with present state of the art and future work. 2. RELATED WORK In this section, we discuss the past works done in MANET that includes the evolution of many new attacks. It is imperative to secure networks - wired or wireless for its proper functioning. Wireless ad hoc network is more vulnerable to security threats than wired network due to inherent characteristics and system constraints. The nodes are free to join, move and leave the network making it susceptible to attacks - both from inside or outside the network. The attacks can be launched by nodes within radio range or through compromised nodes. The compromised nodes exploit the flaws and inconsistencies present in routing protocol to destroy normal routing operation of the network. A compromised node may advertise nonexistent or fake links or flood honest nodes with routing traffic causing Denial of Service (DoS) attacks that may severely degrade network
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 495 performance. Thus we see that routing protocols are one of the main areas of vulnerability. There is a need to study the vulnerabilities in routing protocols that may be exploited by malicious nodes to launch attacks. In [1] and [2], the attack is one of the most serious attacks on MANETs. In wormhole attack at least two attackers are required to perform the attack very effectively. These two attackers resides on different areas of the network makes a tunnel through the network to communicate with each other. The attackers broadcast the wrong information to the other nodes in the network that the destination is only one hop away from them. Sometimes they also broadcast the wrong information that they are true neighbors of each other due to this the attacker one which is near to source node is easily selected on the route between the source destination pair when the route is discovered on the basis of lowest number of hops on the route. In [3], the attacker when received a route request (RREQ) message it modifies the sequence number in the RREQ message to perform the attack. The attacker increases the sequence number more than the usual number and reply back to the source to make it believe that it has the better and fresher route to the destination node. Once the source node got this reply it start the transmission of data packet on the route which consists of the attacker i.e., one of the intermediate node of the established route is the attacker. Till now half of the attack is performed by the attacker by spreading the false information and making himself the part of the route. Now when the data communication is started using the route the attacker will drop all the data packets that reaches to it that is when the attacker got the data packet for forwarding it drops the packet without forwarding any of the data packets. In [4], Flooding attack is the simplest attack to implement but it is one of the most dangerous attacks. In this attack, the attacker broadcast the false control or data packets in the network due to which the network bandwidth is wasted largely and the non-false packets are not able to reach their destinations. In [5]: As the communication in MANETs is multi hop therefore the intermediate nodes plays an important role in data communication over MANETs. The intermediate nodes can become selfish by either using the wireless channel unnecessary due to which the other nearby channels has to contend more time to access the channel. In [6] has analyzed the impact of packet re-ordering attack over various TCP-variants using the MANET routing protocols named AODV and DSR. Although authors claim that they have investigated various versions of TCP but the simulation results show graphs for TCP-Reno and TCP- NewReno. Furthermore, the effect of packet re-ordering is not analyzed in UDP-based data communications. Also, the author’s uses only network throughput as an metric for the performance evaluation but other important metric such as number of retransmissions which greatly increases network congestion and delay in the network is not examined. Finally, it is not understandable that why the authors uses and compares AODV and DSR routing protocols in his paper because the re-ordering attack is used to effect the close-loop attacks only and are independent on the underlying protocol used for the routing. 3. PROPOSED METHODOLOGY In proposed Re-shuffling data packet attack (RSA) an attacker node re-ordered a specified number of packets using a re- ordering buffer whose size is either selected randomly every time the buffer is empty or its size can be fixed at the start of the data communication and kept constant throughout the whole communication duration. To perform this attack the attacker node should be one of the intermediate nodes on the route between the source destination pair. The attacker can perform the proposed Re-shuffling data packet attack (RSA) using any one of the following two approaches: a) In this method, the attacker node uses a fixed size of buffer and wait till the number of packets are equal to the size of the buffer once the number of data packets are equal to the used re-order buffer size the attacker shuffles all the packets and forward them one-by-one. For example, if the re-order buffer size is set to 3 then as soon as the re-order buffer has 3 data packets stored in it the attacker shuffles them in any random or predefined order and forward the data packets. b) In the second method, the attacker node may vary the size of the reorder buffer during the communication duration and uses a random re-order buffer size for some duration while uses some other size for the rest or some other period. In this way, the attacker makes itself more secure from the detection mechanisms if applied by the source node to detect the attackers. To perform any attack method either first or second the attacker should be one of the intermediate nodes on the active TCP or UDP based route using for data communication process. Pseudo Code for proposed Delay-Aware Routing Protocol
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 496 Processing of Data Packet Received by an Attacker Node Shorthand used in the Algorithm: //////////////////////////////////// S = Source node D = Destination node A = Attacker node I = Intermediate node IP_OQ(N) = IP output queue of node N RO_buffer_size = x; where x is between 1 to 5 ////////////////////////////////// IF1 (I got a data packet) I check its AODV routing table IF2 (Route is present in the routing table) IF3 (I != A) I forward the data packets from its IP output queue using FIFO approach towards D ELSE //this node is an attacker node A checks whether the IP output queue has number of data packets that are greater than or equals to its RO_buffer_size IF4 (RO_buffer_size (A) >= number of packets in IP_OQ(A)) A either send the data packet or it pauses the data packet till the re-shuffle buffer of its IP output queue is filled with the required packets ELSE //attackers re-shuffle buffer is full A re-shuffle the data packets either using a fixed re-order pattern or randomly After re-shuffling send the packets from the re-order buffer using FIFO approach ENDIF4 ENDIF3 ENDIF2 ENDIF1 4. SIMULATION RESULTS AND PERFORMANCE EVALUATION In this section, we present the detailed performance analysis and impact analysis of the proposed Re-shuffling data packet attack (RSA) on different variants of TCP protocol over mobile ad-hoc networks. The network scenarios used in the simulation process are designed in such a way so that the effects of the wireless channel and environment can be mitigated. This is done to discover the exact impact of Re- shuffling data packet attack on the TCP-based MANETs. Therefore, we ignore the congestion and mobility induced situation from the network scenarios used for simulation process. As already mentioned above that the network simulator used for the simulation process is the trail version of the well knows network simulator called EXata. Table1. Simulation Parameter Table Parameters Values Simulator EXata Network Size 900 x 900 meter square Simulation time 750 Seconds Application Layer Process File transfer protocol (FTP) Transport Layer Protocols TCP (Tahoe, Reno, NewReno) and UDP Routing protocol AODV, DSR, OLSR Number of Nodes 30 Mobility model None MAC specification IEEE 802.11 Network Bandwidth 15 Mbps Performance Metrics Network Throughput, Packet Delivery Ratio end-to-end delay and Number of Retransmissions PHY Specification 802.11a/g Parameters Values A .Simulation Setup Furthermore, the performance measurement metrics used are as follows and the graphs will show that the attack is independent from the effect of routing protocol on both TCP as well as UDP: a) Network throughput: The network throughput is defined as the ratio of the total number of data bytes received to the total duration of the communication process. b) Packet delivery ratio (PDR): The ratio of the application data packets that are received without any error at destination nodes to the total data packets generated by the CBR sources are called Packet delivery ratio (PDR) of the network. c) Average end-to-end delay of data packets: This metric is calculated by the destination node whenever it receives a data packet. The destination node will calculate the delay of each received data packet by using its send timestamp and its received timestamp at the destination. d) Number of retransmission (NOR): This is the important evaluation metric as we are using TCP- based MANETs. In TCP a data packet is re- transmitted when its retransmission timer expires or the TCP receives the three acknowledgment packets for the same data packet. These retransmissions waste network bandwidth and lead to lower network throughput.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 497 B. Performance Evaluation 1. Effects of Increase in Re-Shuffle Buffer Size In this section, the effects of increase in the size of the re- shuffle buffer of an attacker node are analyzed using the two metrics (i.e., network throughput and number of retransmissions). Fig.1 Network throughputs with increase in shuffle size when using all three routing protocols (TCP-based MANETs) Fig.2 Number of Retransmissions with increase in shuffle size when using all three routing protocols (TCP-based MANETs) 2. Effects of Increase Number of Attackers in TCP- Based Manets In this section, we analyze the performance of three TCP protocol variants with the increase in the number of attackers in an active route between any source-destination pair. The metrics used for the analysis are network throughput and number of re-transmissions caused during the whole duration of data communication of a data session. Fig.3 Network throughputs with increase in number of attackers when using all three routing protocols (TCP-based MANETs) Fig.4 Number of Retransmissions with increase in number of attackers when using all three routing protocols (TCP-based MANETs) 3. Effects of Increase Number of Attackers in UDP- Based Manets In the previous section, we have shown the effect of the proposed attack on TCP-based transmissions over mobile ad- hoc networks. In this section, we analyze the effects of the proposed attack on the UDP-based transmissions. As we are using UDP as a transport layer protocol therefore there is no re-transmission of data packets so we have used different metrics to analyze the effects of our proposed attack on the source-destination pair and overall network. To show through the simulation process that the attack is independent on the routing protocol used, we have also configure the OLSR and DSR as the routing protocols in conjunction with the AODV protocol and the results are given below. This change is due to their different types of route discovery methods used for route discovery and different levels of routing overhead. These factors affect the network metrics values. Figure 5 End-to-end delays with increase in number of attackers in all three routing protocols (UDP-based MANETs) Figure 6: End-to-end delay with increase in number of attackers in all three routing protocols (UDP-based MANETs)
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 498 5. PROPOSED DETECTION METHOD FOR RE- SHUFFLING DATA PACKET ATTACK In this section, we will propose an efficient yet simple method to detect the proposed Re-shuffling data packet attack. The source node TCP protocol uses the time-stamps to detect whether the re-transmission done by it is a false or true re- transmission. If the re-transmission done by the source is true than the TCP will work in the traditional way by applying its methods to control the congestion and network flow rates. On the other hand, if the re-transmission is detected as a false re- transmission the source TCP will not enter into the congestion control states. Due to this the network throughput of the network is maintained during the attack periods. The proposed method for the detection weather the current re- transmission at the source is true or false type is explained below with the help of the Figure Figure 7 Detection methods for packet re-shuffling attack When the source TCP sends a data packet, it also places a time-stamp in that data packet. The value of the time stamp is set equal to the current system time when the data packet is transmitted into the network. Let’s assume that node A sends four data packets with the time stamps t1, t2, t3 and t4 respectively. As, it can be seen in Figure 4.13 that the attacker node re-shuffles the packets before forwarding them towards the destination node When the receiver node E receives the data packet with the time-stamped equal to t4 it generates the duplicate ACK because it is waiting for the data packet which has the timestamp equal to t1. In this way, the node E will generate three duplicate ACKs for the first three received out of order data packets. CONCLUSIONS AND FUTURE WORK In this section, we have presented the conclusion and future work for the paper. As we are using UDP as a transport layer protocol therefore there is no re-transmission of data packets so we have used different metrics to analyze the effects of our proposed attack on the source-destination pair and overall network. For this we have studied all forms of existing attacks over Mobile ad-hoc networks. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. We have also seen that the proposed attack is independent on the underlying network protocol as the attack is done to interrupt the usual working of the TCP protocol. The attack exploits the TCP congestion avoidance algorithm and flow control process to disturb the regular data transmission process. In the paper, we have analyzed the impact of packet re- ordering attack over various TCP-variants using the MANET routing protocols named AODV and DSR. Although authors claim that they have investigated various versions of TCP but the simulation results show graphs for TCP-Reno and TCP- NewReno. Furthermore, the effect of packet re-ordering is not analyzed in UDP-based data communications. Also, the author’s uses only network throughput as an metric for the performance evaluation but other important metric such as number of retransmissions which greatly increases network congestion and delay in the network is not examined. Finally, it is not understandable that why the authors uses and compares AODV and DSR routing protocols in his paper because the re-ordering attack is used to effect the close-loop attacks only and are independent on the underlying protocol used for the routing. REFERENCES [1] George Hoffman, Yoko Ono, Akiko Kawakami, Kenichi Kusano, and Takashi Manabe Japan Communications 2012 Top 10 Predictions http://www.idc.com/getdoc.jsp?containerId=JP1376002 U. [2] Trends — Survey Says Wireless Net- works Expand for Mobile Growth. http://edtechdigest.wordpress.com/2011/10/18/trends- survey-says-wirele [3] Raza, I. and Hussain, S.A. and Ali, A. and Hassan Raza, M. : Persistent packet reordering attack in TCP based Ad hoc wireless networks, Information and Emerging Technologies (ICIET), 2010 International Conference, 2010. [4] C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999. [5] A. Mishra, R. Jaiswal, and S. Sharma. A novel approach for detecting and eliminating cooperative black hole attack using advanced dri table in ad hoc network. In Advance Computing Conference (IACC), 2013 IEEE 3rd International, 2013. [6] Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on , vol.24, no.2, pp.370,380, Feb. 2006. [7] Hoang Lan Nguyen and Uyen Trang Nguyen. A study of different types of attacks in mobile ad hoc networks. In Electrical Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on, 2012.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 499 [8] M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy. A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In International Conference on Mobile and Ubiquitous Systems, Networking and Services, July 2005. [9] Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang, "Resisting flooding attacks in ad hoc networks," Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on , vol.2, no., pp.657,662 Vol. 2, 4-6 April 2005. [10] Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of- service attack-detection techniques," Internet Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb. 2006. [11] JOHNSON David B. The dynamic source routing protocol for mobile ad hoc networks (dsr). Internet- Draft, 2004. [12] Chen, S., Nahrstedt, K.: Distributed quality-of-service routing in ad hoc networks. Selected Areas in Communications, IEEE Journal 17, 1488–1505 (1999). [13] Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan and Irwin, Angela and Hassan, Aamir,” Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommunication Systems, Springer US, 2012. [14] Chakrabarti, S., Mishra, A.: QoS issues in ad hoc wireless networks. Communications Magazine, IEEE 39, 142–148 (2001). [15] Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1):13 – 64, 2003. [16] Tsu-Wei Chen and Gerla, M.: Global state routing: a new routing scheme for ad-hoc wireless networks, Communications, 1998. ICC 98. Conference Record. 1998 IEEE International Conference. [17] E.M. Royer and Chai-Keong Toh. A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2):46 –55, apr 1999. [18] P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. 3626, 2001. [19] Charles E. Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev., 24:234–244, October 1994.