NS3 projects

 

 

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we present the design, implementation, and evaluation of dynamic PID (D-PID), a framework that uses PIDs negotiated between the neighboring domains as inter-domain routing objects. In D-PID, the PID of an inter-domain path connecting the two…

Posted in NS2 Projects | Tagged , | Leave a comment

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network nodes (i.e., adding security messages to protocols) or by internal deduction of attack state. In this paper, we propose a method for minimizing the gray-hole DoS attack. Our solution assumes no explicit node collaboration, with…

Posted in NS2 Projects | Tagged , , | Leave a comment

Detection of node failure in mobile wireless networks A probablistic approach

Detection of node failure in mobile wireless networks A probablistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection schemes that systematically combine localized monitoring, location estimation and node collaboration. Extensive simulation results in both connected and disconnected networks demonstrate that our schemes achieve high failure detection rates (close to an upper bound) and…

Posted in NS2 Projects | Tagged , , | Leave a comment

Trust Based Certificate Revocation of Malicious Nodes in MANET

Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate the security threats, an efficient certificate revocation scheme is adopted to attain a secure communication. Conventional schemes in MANETs aims to achieve greater security by electing a Cluster Head (CH) for each clusters which governs…

Posted in NS2 Projects | Leave a comment

GradeTrust: A Secure Trust Based Routing Protocol For MANETs

Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic as well as improved packet delivery ratio. Preliminary simulation results have shown that trust compromise and packet delivery ratio is better in GradeTrust compared to traditional routing protocols,…

Posted in NS2 Projects | Tagged , , , | Leave a comment

Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs

The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs to increase the quality of service (QoS). The QoS of such WSNs is mainly affected by the failure of sensor nodes. Probability of sensor node failure increases with increase in number of sensors. In order…

Posted in NS2 Projects | Tagged | 1 Comment

Trust Based Secure Routing in Delay Tolerant Networks

There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP or the use of certificate revocation servers, to effectively transmit a message from source to destination in a secure manner. There are multiple trust and routing schemes proposed for use in Delay Tolerant Networks. Here,…

Posted in NS2 Projects | Tagged , , | Leave a comment

Content centric routing in IoT networks and its integration in RPL

Internet of Things (IoT) networks can be used for many applications across different industry domains in- cluding infrastructure monitoring, civil service, security and surveillance applications etc. However, gath- ering large amounts of data from such networks including images and videos often cause traffic con- gestion in the central network area. In order to solve this problem, we proposed the content centric routing (CCR) technology, where routing paths are determined by content. By routing the correlated data to intermediate relay nodes for processing, a higher data aggregation ratio can be obtained,…

Posted in NS2 Projects | Tagged , , , , | Leave a comment

Target Tracking in Wireless Sensor Network

Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for sending additional resources to the vicinity of the mobile target. Tracking mobile targets involves detection and localization of the object of interest by processing the information provided by the sensing nodes along with their location.…

Posted in NS2 Projects | Tagged , , , , , | Leave a comment

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, an attack model is identified to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement.…

Posted in NS2 Projects | Tagged , , , , , , , , , , | Leave a comment

Related links for NS3 Projects: