1. Abstract: Wireless sensor networks is growing rapidly over the few decades. Due to its flexibility, wireless sensor networks has been in practice in many areas. Among various wireless networks, Mobile Ad hoc networks has been one of the unique network. Unlike other network architectures, MANETs have no central architecture; every node is free to work both as a transmitter and receiver. Every single node can communicate freely with every other node which is in their communication range. Otherwise, it depends on neighboring nodes to relay messages. Due to this nature, MANETs are used in many missionary applications like health care, military use and emergency recovery. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this paper we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. We compare the differences within the Enhanced Adaptive Acknowledgment before and after introducing the Hybrid cryptography approach
2. Introduction: The term MANET (Mobile Ad hoc Network) refers to a wireless network composed of a set of mobile nodes that can communicate with other nodes without using a fixed
MANET-“ A mobile ad-hoc network is a self-configuring infrastructure less network of mobile devices connected by wireless.”. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic.
MANETs (Mobile ad-hoc network) is defined as autonomous collection of wireless mobile nodes that are self-configure to construct a network that can communicate over relatively bandwidth constrained wireless links.
In Cellular Wireless, spaces are divided into cells. Each cell consists of base stations which is responsible to communicate with the hosts in its cell. Hosts moves from one cell to cell to another and hand off occurs, the new base station takes care of the communication. In Multi-hop wireless, mobility causes a change of route. Hence it need to traverse multiple links to reach destination. Ad hoc network is a self- organizing multi hop wireless network, which relies neither on infrastructure nor on the predetermined connectivity.
MANET comprises of portable stages (e.g.: a switch with various hosts and remote specialized gadgets) in this essentially alluded to as "hubs" which are allowed to move about subjectively the hubs may be situated in or on planes, boats, trucks, autos, maybe even on individuals or little gadgets, and there may be numerous hosts per switch. A MANET is a self-sufficient arrangement of versatile hubs. The framework may work in separation, or may have doors to and interface with an altered system.
In [11], Tamilselvan et al. proposed a solution for preventing blackhole attacks in MANETs based on AODV protocol. In their solution, the source node waits till other replies with the next hop details. When the source node receives the RREP packets, it records the sequence number along with the time the packet arrived in a collect route reply table (CRRT). After recording the route replies in the CRRT, it calculates the timeout value for each RREP based on the time first RREP arrived, then it checks the CRRT for any repeated next hop nodes. The path with the repeated next hop node is considered to be safe. If there is no repeated next hope node in the CRRT, the algorithm chooses a random path from the CRRT. The main drawback of this solution is that if there are no repeated next hop nodes in the CRRT, therefore the algorithm increases the risk of blackhole attack by choosing a random path.
Mobile Ad hoc Network”, discussed about a reputation system that relies on neighbors to monitor and identify misbehaving nodes.
Abstract: Security is always a main task to be performed in any network. Wireless Sensor Network are different from other networks.Hierarchical Routing Protocol are the best energy saving and efficient rout wireless sensor networks. Our Objective is to Provide End to End Confidentiality in LEACH and Performance measurement of leach protocol for various homomorphic encryptions. Leach is a very secure Protocol as cluster head changes in each round but sometimes data needs to be very confidential of some nodes to Base station. So the best technique used for providing this is Homomorphic Encryption.Our Objective is to apply Multiplicative Homomorphic Encryption in LEACH.So that need of decrypting data at cluster head is removed.
Wireless Ad hoc Network are important emerging technology that is low cost, most effective. Although a large amount of research has been done on mobile Ad hoc Network technology, yet truly understanding these networks has been low and the implementation of these networks is very less. This is because in some areas it is difficult to implement wireless networks as it is an expensive process and implementing new algorithm and new protocols is difficult replacing all the protocols that are currently used. Although the important fact is that these networks are not used to its full capacity. Large amount of research is going on the Ad hoc networks and exploit these networks in far more better way. Ad hoc network technology has many future applications. It can be used widely used for military application, can be used for UAV's , for detecting of the chemicals and materials underground.
Abstract— Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, we present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. Our approachs has been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.
central infrastructure and nodes are free to move, the neighboring nodes help in data transmission that are not in the communication range. This can be achieved by dividing the MANETs into two types of networks i.e. single hop network and multihop network. In a single hop wireless network all the nodes communicate directly with every other node. In multi hop network, the neighboring nodes help in transmitting the data that are not its communication range, which is an added advantage to MANETs. Due to this wide distribution of MANETs makes it vulnerable o malicious attacks. For example, due to lack of protection, attackers can easily induce malicious nodes in the network. In particular, nodes in MANETs assumes every other node to be ignorant and behaves cooperatively with other nodes. This makes attackers to easily compromise other nodes to achieve attacks. Furthermore, because of decentralized architecture of MANETs, a centralized detecting technique is no longer appropriate. Hence it is necessary to implement a detection system especially for MANETs.
This thesis primarily focuses on the safety problems from a network layer perspective. As mentioned in chapter 2, many routing protocols for MANETs exist although none of them address the foremost necessary issue, namely, security. So as to review the attacks and threats, and to plot a protocol that addresses them, an understanding of the operating setting is required. [10]
Designing a foolproof security for ad hoc network is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid node mobility, shared radio channel and limited availability of resources
Security is a more sensitive issue in MANETs than any other networks due to lack of infrastructure and the broadcast nature of the network. While MANETs can be quickly set up as needed, so they also need secure data transfer over the network. We provide encryption and decryption algorithm using Rijndael (AES) block cipher. It helps the message to secure
Abstract: Wireless sensor networks (WSN) have grabbed much attention in recent years due to their potential use in many applications. One such application is deploying WSN in underground mines to monitor the miner 's physical signals as well as the environment they are exposed to. However, due to the resource constraints of sensor nodes and the adhoc-formation of the network, in addition with an unattended deployment, pose un-conventional demands provoke the need for special techniques for design and management of WSN. Because of the restrictions caused by the lossy dielectric walls and ceilings in the underground mines, the radio signal propagation characteristics are significantly different from those of terrestrial wireless channels. In this paper, underground WSN is designed considering worker’s safety in under-ground, increased energy efficiency and productivity as main goals.
A Mobile Ad Hoc Network (MANET) consists of a set of mobile hosts that carry out basic networking functions like packet forwarding, routing, and service discovery without the help of an established infrastructure [1]. Nodes of an ad hoc network rely on one another in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. An ad hoc network uses no centralized administration. This ensures that the network will not cease functioning just because one of the mobile nodes moves out of the range of the others. Nodes should be able to enter and leave the network as they wish. Because of the limited transmitter range of the nodes, multiple hops are generally needed to reach other nodes. Every node in an ad hoc network must be willing to forward packets for other nodes. Thus, every node acts both as a host and as a router. The topology of ad hoc networks varies with time as nodes move, join or leave the network. This topological instability requires a routing protocol to run on each node to create and maintain routes among the nodes [21].