Improving Safety on Drivers for Vehicular Ad Hoc Networks
Improving Safety on Drivers for Vehicular Ad Hoc Networks Need for individualizing vehicular communications in order to improve safety for a highway scenario. Adapting a vehicular ad hoc network to both its individual driver’s characteristic and traffic conditions enables it to transmit in a smart manner to other vehicles. This radical improvement is now possible […]
Posted in NS2 Projects
Leave a comment
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we […]
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network […]
Detection of node failure in mobile wireless networks A probabilistic approach
Detection of node failure in mobile wireless networks A probabilistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection […]
Trust Based Certificate Revocation of Malicious Nodes in MANET
Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate […]
Posted in NS2 Projects
Leave a comment
GradeTrust: A Secure Trust Based Routing Protocol For MANETs
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks […]
Posted in NS2 Projects
Tagged black hole simulation in ns2, blackhole attack detection
Leave a comment
Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs
The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs […]
Trust Based Secure Routing in Delay Tolerant Networks
There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP […]
Target Tracking in Wireless Sensor Network
Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for […]
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. […]
Improving Safety on Drivers for Vehicular Ad Hoc Networks
Improving Safety on Drivers for Vehicular Ad Hoc Networks Need for individualizing vehicular communications in order to improve safety for a highway scenario. Adapting a vehicular ad hoc network to both its individual driver’s characteristic and traffic conditions enables it to transmit in a smart manner to other vehicles. This radical improvement is now possible […]
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we […]
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network […]
Detection of node failure in mobile wireless networks A probabilistic approach
Detection of node failure in mobile wireless networks A probabilistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection […]
Trust Based Certificate Revocation of Malicious Nodes in MANET
Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate […]
GradeTrust: A Secure Trust Based Routing Protocol For MANETs
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks […]
Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs
The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs […]
Trust Based Secure Routing in Delay Tolerant Networks
There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP […]
Target Tracking in Wireless Sensor Network
Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for […]
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. […]